Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe

Overview

General Information

Sample name:SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
Analysis ID:1546907
MD5:17563cfba0842038f0a8bd7f15c89e2e
SHA1:34b5dbfe3bfcdd033d256fe66c87864bc3c61aaa
SHA256:7ef8b3f4ca7db60e350a0b51dd7c284248a94a073735a25a00f85f9072d48143
Tags:AdwareGenericexe
Infos:

Detection

Score:32
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Yara detected AntiVM3
May drop file containing decryption instructions (likely related to ransomware)
Monitors registry run keys for changes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected potential crypto function
Drops PE files
Enables security privileges
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Use Short Name Path in Command Line
Steals Internet Explorer cookies
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe (PID: 3800 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe" MD5: 17563CFBA0842038F0A8BD7F15C89E2E)
    • SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp (PID: 2080 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe" MD5: 023C73AD61BF1C58697C2C09C09E521F)
      • SPONotifications.exe (PID: 7476 cmdline: "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe" MD5: ADBB7F96A4A14023CE27D2F8D6710736)
      • SmartPCOptimizer.exe (PID: 7528 cmdline: "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer" /START MD5: 89943B083FEE6DA392A6668D6EE260BB)
  • SPONotifications.exe (PID: 8068 cmdline: "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe" MD5: ADBB7F96A4A14023CE27D2F8D6710736)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    Process Memory Space: SmartPCOptimizer.exe PID: 7528JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, NewProcessName: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, OriginalFileName: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, ParentProcessId: 3800, ParentProcessName: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe" , ProcessId: 2080, ProcessName: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-01T17:29:25.352359+010020229301A Network Trojan was detected52.149.20.212443192.168.2.749730TCP
      2024-11-01T17:30:05.474200+010020229301A Network Trojan was detected20.12.23.50443192.168.2.749947TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-01T17:29:16.753695+010020283713Unknown Traffic192.168.2.749703116.203.251.147443TCP
      2024-11-01T17:29:18.566135+010020283713Unknown Traffic192.168.2.749705178.63.52.39443TCP
      2024-11-01T17:29:19.899521+010020283713Unknown Traffic192.168.2.749711178.63.52.39443TCP

      Click to jump to signature section

      Show All Signature Results
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic PE information: certificate valid
      Source: unknownHTTPS traffic detected: 116.203.251.147:443 -> 192.168.2.7:49703 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 178.63.52.39:443 -> 192.168.2.7:49705 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 178.63.52.39:443 -> 192.168.2.7:49711 version: TLS 1.2
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49703 -> 116.203.251.147:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49705 -> 178.63.52.39:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49711 -> 178.63.52.39:443
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49730
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.7:49947
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /debug.txt HTTP/1.1Connection: Keep-AliveUser-Agent: Embarcadero URI Client/1.0Host: collect.avqtools.com
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: gacy_cookie_access":{},"local_fonts":{},"media_engagement":{},"media_stream_camera":{},"media_stream_mic":{},"midi":{},"midi_sysex":{},"mixed_script":{},"nfc_devices":{},"notification_interactions":{},"notification_permission_review":{},"notifications":{},"password_protection":{},"payment_handler":{},"permission_autoblocking_data":{},"permission_autorevocation_data":{},"popups":{},"private_network_chooser_data":{},"private_network_guard":{},"protected_media_identifier":{},"protocol_handler":{},"reduced_accept_language":{},"safe_browsing_url_check_data":{},"sensors":{},"serial_chooser_data":{},"serial_guard":{},"site_engagement":{},"sound":{},"ssl_cert_decisions":{},"storage_access":{},"subresource_filter":{},"subresource_filter_data":{},"third_party_storage_partitioning":{},"top_level_storage_access":{},"unused_site_permissions":{},"usb_chooser_data":{},"usb_guard":{},"vr":{},"webid_api":{},"webid_auto_reauthn":{},"window_placement":{}},"pref_version":1},"created_by_version":"117.0.5938.134","creation_time":"13340965310820162","exit_type":"normal","icon_version":10,"managed":{"banner_state":2},"managed_user_id":"","name":"person 1","password_account_storage_settings":{}},"protection":{"macs":{}},"safebrowsing":{"enabled":false,"enhanced":false,"event_timestamps":{},"metrics_last_log_time":"13340965310"},"sessions":{"event_log":[{"crashed":false,"time":"13340965310874395","type":0},{"did_schedule_command":true,"first_session_service":true,"tab_count":1,"time":"13340965314121830","type":2,"window_count":1},{"crashed":false,"time":"13340965340486488","type":0},{"did_schedule_command":true,"first_session_service":true,"tab_count":1,"time":"13340965347697726","type":2,"window_count":1},{"crashed":false,"time":"13340965894520000","type":0},{"did_schedule_command":false,"first_session_service":true,"tab_count":0,"time":"13340965895529112","type":2,"window_count":0},{"crashed":false,"time":"13340965896647302","type":0},{"did_schedule_command":false,"first_session_service":true,"tab_count":0,"time":"13340965897562572","type":2,"window_count":0},{"crashed":false,"time":"13340965899453521","type":0},{"did_schedule_command":false,"first_session_service":true,"tab_count":0,"time":"13340965900388040","type":2,"window_count":0},{"crashed":false,"time":"13340965902527967","type":0},{"did_schedule_command":false,"first_session_service":true,"tab_count":0,"time":"13340965907495322","type":2,"window_count":0},{"crashed":false,"time":"13340965909466868","type":0},{"did_schedule_command":false,"first_session_service":true,"tab_count":0,"time":"13340965910838554","type":2,"window_count":0},{"crashed":false,"time":"13340965912890131","type":0},{"did_schedule_command":false,"first_session_service":true,"tab_count":0,"time":"13340965913778449","type":2,"window_count":0}],"session_data_status":5},"settings":{"a11y":{"apply_page_colors_only_on_increased_contrast":true}},"signin":{"allowed":true},"spellcheck":{"dictionaries":["en-us"],"dictionary":""},"supervised_user":{"me
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: taskmde.youtube.superpop.http.www.youtube.comtaskmgra equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: collect.avqtools.com
      Source: global trafficDNS traffic detected: DNS query: collect.smartpcupdate.com
      Source: unknownHTTP traffic detected: POST /api/collect HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; charset=utf-8User-Agent: Embarcadero URI Client/1.0Content-Length: 286Host: collect.smartpcupdate.com
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
      Source: SPONotifications.exe, 0000000B.00000002.2507651152.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000003.1388024357.0000000000AE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://find.naupoint.com
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://find.naupoint.comE-4
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://find.naupoint.comStart
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr606
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
      Source: SmartPCOptimizer.exe, 0000000C.00000000.1320145194.0000000000D16000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.gimp.org/xmp/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/search?q=
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.000000000536C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000000.1313420497.0000000000401000.00000020.00000001.01000000.00000008.sdmp, SPONotifications.exe, 0000000B.00000002.2509454654.00000000025D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.indyproject.org/
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.2501139691.00000000065D1000.00000004.00000020.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.lienvandekelder.be
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.lienvandekelder.beQ
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.lienvandekelder.com
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.lienvandekelder.com/
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com:443
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005B17000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore/
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005B17000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://chromewebstore.google.com/
      Source: SPONotifications.exe, 0000000B.00000002.2506307194.0000000000AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://collect.avqtools.com/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000000.1313420497.0000000000401000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://collect.avqtools.com/api/debug?program=pchs_cleaner_v
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000000.1313420497.0000000000401000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://collect.avqtools.com/api/debugU
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000000.1313420497.0000000000401000.00000020.00000001.01000000.00000008.sdmp, SPONotifications.exe, 0000000B.00000002.2506307194.0000000000AB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://collect.avqtools.com/debug.txt
      Source: SPONotifications.exe, 0000000B.00000002.2506307194.0000000000A68000.00000004.00000020.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000002.2506307194.0000000000AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://collect.smartpcupdate.com/
      Source: SPONotifications.exe, 0000000B.00000003.1388024357.0000000000AE4000.00000004.00000020.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000002.2506307194.0000000000AB9000.00000004.00000020.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2509629250.00000000029CD000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://collect.smartpcupdate.com/api/collect
      Source: SPONotifications.exe, 0000000B.00000002.2507651152.0000000000B35000.00000004.00000020.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000003.1387909516.0000000000B35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://collect.smartpcupdate.com/k
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/installwebapp?usp=chrome_default
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/installwebapp?usp=chrome_default
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/installwebapp?usp=chrome_default
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/drive/installwebapp?usp=chrome_default
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000000.1254764925.0000000000401000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/installwebapp?usp=chrome_default
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023FC000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.0000000002491000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023C5000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1334297281.0000000003720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/eula/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023A1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/files/drivermanager.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2509629250.0000000002920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/files/drivermanager.exel
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000248A000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023C5000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1334297281.0000000003720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/privacy-policy/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/privacy-policy/S
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/smart-driver-manager/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005AC7000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/smart-pc-optimizer/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000240D000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/smart-pc-optimizer/A
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000247C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://smartpctools.com/support/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000238C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.0000000002406000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2509629250.00000000029BE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://store.payproglobal.com/checkout?products
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000236B000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2509629250.000000000293E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://store.payproglobal.com/checkout?products%5b1%5d%5bid%5d=90862&page-template=18224&products%5
      Source: SPONotifications.exe, 0000000B.00000002.2509454654.0000000002646000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005B77000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://subscriptions.smartpctools.com
      Source: SPONotifications.exe, 0000000B.00000002.2509454654.0000000002646000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://techsupport.smartpcupdate.com
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2509629250.00000000029BE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/chromewebstore
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2509629250.00000000029BE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2509629250.00000000029BE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/sierra
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2509629250.00000000029BE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002690000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000000.1258247883.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.innosetup.com/
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002690000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000000.1258247883.0000000000401000.00000020.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.remobjects.com/ps
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/s/notifications/manifest/cr_install.html
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownHTTPS traffic detected: 116.203.251.147:443 -> 192.168.2.7:49703 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 178.63.52.39:443 -> 192.168.2.7:49705 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 178.63.52.39:443 -> 192.168.2.7:49711 version: TLS 1.2

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.HTML
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.HTML
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.HTML
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.TXT
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.TXT
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.TXT
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.TXT
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.TXT
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.TXT
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.TXT
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.PNG
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HELP_DECRYPT.HTML
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_609661C716_2_609661C7
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094E1C516_2_6094E1C5
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096311516_2_60963115
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094B2EA16_2_6094B2EA
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6092126F16_2_6092126F
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6093A38C16_2_6093A38C
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6093E3D516_2_6093E3D5
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095432A16_2_6095432A
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_609654DA16_2_609654DA
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095047916_2_60950479
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096861416_2_60968614
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095161816_2_60951618
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095462C16_2_6095462C
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6093267716_2_60932677
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095B71516_2_6095B715
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096686216_2_60966862
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_609699C416_2_609699C4
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_609609C116_2_609609C1
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60953AA416_2_60953AA4
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6092EAC116_2_6092EAC1
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60931AC416_2_60931AC4
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096CA4C16_2_6096CA4C
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6093EA7F16_2_6093EA7F
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095FA6716_2_6095FA67
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60936BAA16_2_60936BAA
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60963BE716_2_60963BE7
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094FB3116_2_6094FB31
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60954C9816_2_60954C98
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60912CE016_2_60912CE0
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60915DB916_2_60915DB9
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60935DAF16_2_60935DAF
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60930DD516_2_60930DD5
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096CE9016_2_6096CE90
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60909E0B16_2_60909E0B
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094CE2C16_2_6094CE2C
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess token adjusted: SecurityJump to behavior
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: is-0G7HO.tmp.2.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
      Source: is-5C8ME.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
      Source: is-UJHD8.tmp.2.drStatic PE information: Number of sections : 20 > 10
      Source: is-0G7HO.tmp.2.drStatic PE information: Number of sections : 11 > 10
      Source: is-RADPK.tmp.2.drStatic PE information: Number of sections : 11 > 10
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000000.1254865877.00000000004C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1354868787.0000000002358000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: classification engineClassification label: sus32.rans.spyw.evad.winEXE@8/65@2/2
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC SolutionsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeMutant created: \Sessions\1\BaseNamedObjects\AF54E2DC-EE25-4757-87F6-A1880E22042B
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeMutant created: \Sessions\1\BaseNamedObjects\dbcc15e2c3e24edf018ffd1269d25c9a
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeFile created: C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmpJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile read: C:\Program Files (x86)\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1403819133.00000000063E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';m
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [mdns] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [ipid] INTEGER NULL, [query] TEXT NULL, [answer] BLOB NULL);
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1389743593.0000000003930000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE vacuum_db.[ma-s] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT,[Pattern] TEXT NULL,[Name] TEXT NULL,[Address] TEXT NULL);
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2501139691.0000000006639000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: INSERT INTO 'vacuum_db'.sqlite_master VALUES('index','sqlite_autoindex_passwords_1','passwords',#4,NULL);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [scans] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [date] REAL NULL, [network] TEXT NULL, [win] TEXT NULL, [scantime] INTEGER NULL, [vultime] INTEGER NULL);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [files] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [scanid] INTEGER NULL, [name] TEXT NULL, [data] TEXT NULL);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [dhcpnames] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [scanid] INTEGER NULL, [mac] TEXT NULL, [hostname] TEXT NULL, [vendorident] TEXT NULL);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.1403819133.00000000063E1000.00000004.00000020.00020000.00000000.sdmp, SPONotifications.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [ports] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [ipid] INTEGER NULL, [port] INTEGER NULL, [protocol] INTEGER NULL, [string] TEXT NULL);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: insert into [resources] ([ipid], [Name], [Description], [Path], [ServerName], [Password], [ResourceType], [Special], [Temporary]) values (?, ?, ?, ?, ?, ?, ?, ?, ?);SQh
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [vulnerability] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [portid] INTEGER NULL, [vultype] INTEGER NULL, [text1] TEXT NULL, [text2] TEXT NULL);U
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [hosts] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [scanid] INTEGER NULL, [ip] TEXT NULL, [mac] TEXT NULL, [scantime] INTEGER NULL, [vultime] INTEGER NULL, [vpassed] INTEGER NULL);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1389743593.0000000003923000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: INSERT INTO 'vacuum_db'.sqlite_master VALUES('index','acports_index','acports',#1,'CREATE INDEX [acports_index] on [acports] ([Port] desc)');
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [names] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [ipid] INTEGER NULL, [type] INTEGER NULL, [value] TEXT NULL);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: create table if not exists [resources] ([id] INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, [ipid] INTEGER NULL, [Name] TEXT NULL, [Description] TEXT NULL, [Path] TEXT NULL, [ServerName] TEXT NULL,[Password] TEXT NULL, [ResourceType] INTEGER NULL, [Special] INTEGER NULL, [Temporary] INTEGER NULL, [Access] INTEGER NULL);
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe "C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe"
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeProcess created: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp "C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer" /START
      Source: unknownProcess created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeProcess created: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp "C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe" Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer" /STARTJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: explorerframe.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: sfc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: sfc_os.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: linkinfo.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: ntshrui.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: cscapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpSection loaded: apphelp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: crtdll.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: version.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: sqlite3.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: security.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: olepro32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: webio.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: version.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: sqlite3.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wlanapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: crtdll.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: security.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: shunimpl.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: olepro32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: dataexchange.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: dcomp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: firewallapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: fwbase.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: fwpolicyiomgr.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: napinsp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: wshbth.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: nlaapi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: winrnr.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: crtdll.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: version.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: sqlite3.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: security.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeSection loaded: olepro32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
      Source: Smart PC Optimizer.lnk.2.drLNK file: ..\..\..\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
      Source: Smart PC Optimizer.lnk0.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
      Source: Uninstall Smart PC Optimizer.lnk.2.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\unins000.exe
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile written: C:\Users\user\AppData\Roaming\Smart PC Optimizer\Backup\Extensions.iniJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpWindow found: window name: TMainFormJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpAutomated click: Install
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpAutomated click: Next
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic PE information: certificate valid
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic file information: File size 6716192 > 1048576
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096C33C _winmajor,LoadLibraryA,GetProcAddress,GetProcAddress,FreeLibrary,16_2_6096C33C
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeStatic PE information: section name: .didata
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp.0.drStatic PE information: section name: .didata
      Source: is-0G7HO.tmp.2.drStatic PE information: section name: .didata
      Source: is-5C8ME.tmp.2.drStatic PE information: section name: .didata
      Source: is-RADPK.tmp.2.drStatic PE information: section name: .didata
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /4
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /19
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /35
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /51
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /63
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /77
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /89
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /102
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /113
      Source: is-UJHD8.tmp.2.drStatic PE information: section name: /124
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60989267 pushad ; retn 0009h16_2_60989269
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096CD38 push eax; ret 16_2_6096CD68
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60911E87 push ecx; mov dword ptr [esp], ebx16_2_60911EBC
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\unins000.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Users\user\AppData\Local\Temp\is-TJ8GA.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-0G7HO.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\sqlite3.dll (copy)Jump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-5C8ME.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-RADPK.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-UJHD8.tmpJump to dropped file
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeFile created: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpJump to dropped file

      Boot Survival

      barindex
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeRegistry key monitored: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeRegistry key monitored: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeRegistry key monitored: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeRegistry key monitored: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Smart PC OptimizerJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Smart PC Optimizer\Smart PC Optimizer.lnkJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Smart PC Optimizer\Uninstall Smart PC Optimizer.lnkJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: SmartPCOptimizer.exe PID: 7528, type: MEMORYSTR
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEA
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIECTRL.EXESANDBOXIECONTROL
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500883197.000000000651A000.00000004.00000020.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 5-SUPERANTISPYWARE.EXESUPERANTISPYWARE
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXEREGISTRY MONITOR
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE9
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXEFILE PROTECTION MONITOR
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEPROCMON
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEPROCESS HACKER 2
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFFER.EXESYSTEMWIZARD SNIFFER
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: REGMON.EXEQ8
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.00000000065D1000.00000004.00000020.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.2501139691.00000000065D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXEWINDOWS DEBUGGER
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.00000000065D1000.00000004.00000020.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.2501139691.00000000065D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE*MANAGRMEDIAMICRO
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMUSRVC.EXEVPCUSERSERVICES
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-TJ8GA.tmp\_isetup\_setup64.tmpJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpDropped PE file which has not been started: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-UJHD8.tmpJump to dropped file
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Fonts34.exeVMware admin Tool
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxTray.exeVBoxTray#
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: spooles.exeVmwares-
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: _VMwareHostd=Part of VMware Workstation. If you do not use VMware, this service can be disabled.
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hqtray.exeVMware Workstation9
      Source: SPONotifications.exe, 0000000B.00000002.2506307194.0000000000AA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMUSBArbService=VMware USB Arbitration service. If you do not use VMware, this service can be disabled.
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware process Tool
      Source: SPONotifications.exe, 0000000B.00000003.1388024357.0000000000AE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware-unity.exevmware-unity$
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ^VMware NAT Service=VMware NAT Service. If you do not use VMware, this service can be disabled.g
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Help.exeVMware process Tool%
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmnethcp.exeMicrosoft Routing Utilities
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmicshutdown
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware hptray7a
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMAuthdService=VMware Authorization Service. If you do not use VMware, this service can be disabled.
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hpmon.exeVMware hptray
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware hptray
      Source: SPONotifications.exe, 0000000B.00000002.2509454654.0000000002671000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMWARE=
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware admin Tool
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMwareHostd=Part of VMware Workstation. If you do not use VMware, this service can be disabled.
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMnetDHCPP
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware [UserName] process
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: addins2.exeVMWARE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMwareHostdP
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware Workstation
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VBoxService=Oracle's VirtualBox Virtual Machine service. If you do not use VirtualBox, this service can be disabled.
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware-tray.exevmware-tray.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware Workstation1-
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxService.exeVBoxService.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: explorer.exe,vmware-tray.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMUSrvc.exeVPCUserServices
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: explorer.exe,vmware-tray.exe5
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmnetdhcp.exevmnetdhcp%
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: sVMnetDHCP=VMware VMnet DHCP service for VMware Workstation. If you do not use VMware, this service can be disabled.##fn`
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware.exeWorkstation Ver 5.0!
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2506935990.0000000001003000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware admin Tool225
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1343856549.0000000003ABA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 000C29VMware, Inc.
      Source: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1343673699.00000000007F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware NAT Service=VMware NAT Service. If you do not use VMware, this service can be disabled.
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMware process ToolFAA{
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1392026070.00000000065BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 005056VMware, Inc.
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1343856549.0000000003ABA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 000569VMware, Inc.
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VBoxServiceP
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmremotems.exevmware remotemks
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc..exeVMware, Inc.
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMnetDHCP=VMware VMnet DHCP service for VMware Workstation. If you do not use VMware, this service can be disabled.
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: tVBoxService=Oracle's VirtualBox Virtual Machine service. If you do not use VirtualBox, this service can be disabled.iq`
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1392026070.00000000065BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 001C14VMware, Inc.;
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmvctr6.exeVMware vCenter6
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: explorer.exe,vmware-tray.exeShell
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpProcess information queried: ProcessInformationJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096C33C _winmajor,LoadLibraryA,GetProcAddress,GetProcAddress,FreeLibrary,16_2_6096C33C
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: progman.exeA
      Source: SmartPCOptimizer.exe, 0000000C.00000003.2499863229.00000000064E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: progman.exeCS5YFRYIG0TV65APDE8=
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: progman.exe
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmpQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ALMon.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: procmon.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: mcagent.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KavPFW.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: guard.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: hackmon.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: kav32.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: APVXDWIN.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: bdss.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Ashwebsv.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2533654031.000000000768D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AVGnt.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KAVStart.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: kavsvc.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RAVMOND.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgemc.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AVGEMC.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: iefix.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: QOELoader.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: MSASCui.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: almon.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: RavTask.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: livesrv.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PSIMSVC.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Nod32.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgnt.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KPFWSvc.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Inicio.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000003.1643265911.0000000007889000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ashServ.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: HijackThis.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: mbam.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: mcvsshld.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: op_mon.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: McUpdate.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Drwebscd.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: nod32cc.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: mcvsrte.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: GDFirewallTray.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AVKTray.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: nod32kui.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KPFW32.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: emlproxy.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: nod32.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2533654031.000000000768D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AVGAMSVR.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: kav.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KAV.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgui.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: nod32krn.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: mcupdate.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: bdagent.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgas.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avguard.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: APVXDWIN.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Guard.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2533654031.000000000768D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: zlclient.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: AVGuard.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Kav.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: pg2.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: K7SysTry.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: EMLPROUI.EXE
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Avgamsvr.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: pctsTray.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgtray.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Nod32krn.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: nspsvc.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: PavFnSvr.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ashmaisv.exe
      Source: SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: regmon.exe
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

      Stealing of Sensitive Information

      barindex
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shmJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-walJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PreferencesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\SiteSecurityServiceState.txtJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exeFile read: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\Cookies.txtJump to behavior
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095E09B sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,16_2_6095E09B
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095F08D sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,16_2_6095F08D
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094B05B sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,16_2_6094B05B
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094A1DE sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,16_2_6094A1DE
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_609661C7 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,16_2_609661C7
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094B1FC sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,16_2_6094B1FC
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094C159 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,16_2_6094C159
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096914B sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,16_2_6096914B
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095F16D sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,16_2_6095F16D
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6090C16E sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,16_2_6090C16E
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094B273 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,16_2_6094B273
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094A3AD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,16_2_6094A3AD
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094C3D1 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,16_2_6094C3D1
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6090F358 sqlite3_bind_parameter_index,16_2_6090F358
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095F371 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,16_2_6095F371
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_609654DA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,16_2_609654DA
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094A444 sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,16_2_6094A444
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6096250A sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,16_2_6096250A
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60969693 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,16_2_60969693
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60968614 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,16_2_60968614
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6090573E sqlite3_bind_parameter_count,16_2_6090573E
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60905750 sqlite3_bind_parameter_name,16_2_60905750
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60969762 sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,16_2_60969762
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60966862 sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,16_2_60966862
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_609699C4 sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,16_2_609699C4
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DA91 sqlite3_bind_zeroblob,sqlite3_mutex_leave,16_2_6091DA91
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6090EA12 sqlite3_transfer_bindings,16_2_6090EA12
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DBB8 sqlite3_mutex_leave,sqlite3_bind_text16,16_2_6091DBB8
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DBE3 sqlite3_bind_text,16_2_6091DBE3
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60961BE5 sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,16_2_60961BE5
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095EBEC sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,16_2_6095EBEC
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60967B7D sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,16_2_60967B7D
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095EB67 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,16_2_6095EB67
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DCCD sqlite3_bind_int,sqlite3_bind_int64,16_2_6091DCCD
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DCF3 sqlite3_bind_double,sqlite3_mutex_leave,16_2_6091DCF3
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_60964C1A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,16_2_60964C1A
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DC0E sqlite3_bind_blob,16_2_6091DC0E
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DC39 sqlite3_bind_null,sqlite3_mutex_leave,16_2_6091DC39
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095EC78 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,16_2_6095EC78
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DC6A sqlite3_bind_int64,sqlite3_mutex_leave,16_2_6091DC6A
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095EDA2 sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,16_2_6095EDA2
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6091DD64 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,16_2_6091DD64
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6095EF8D sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,16_2_6095EF8D
      Source: C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exeCode function: 16_2_6094AF16 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,16_2_6094AF16
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      Registry Run Keys / Startup Folder
      2
      Process Injection
      2
      Masquerading
      1
      OS Credential Dumping
      1
      Query Registry
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      Data Encrypted for Impact
      CredentialsDomainsDefault Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Registry Run Keys / Startup Folder
      2
      Process Injection
      1
      Credentials In Files
      121
      Security Software Discovery
      Remote Desktop Protocol11
      Data from Local System
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Obfuscated Files or Information
      Security Account Manager2
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDS2
      System Owner/User Discovery
      Distributed Component Object ModelInput Capture4
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets3
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials32
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546907 Sample: SecuriteInfo.com.Program.Un... Startdate: 01/11/2024 Architecture: WINDOWS Score: 32 32 collect.smartpcupdate.com 2->32 34 collect.avqtools.com 2->34 48 Yara detected AntiVM3 2->48 8 SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe 2 2->8         started        11 SPONotifications.exe 2->11         started        signatures3 process4 file5 22 SecuriteInfo.com.P...533.30107.22661.tmp, PE32 8->22 dropped 13 SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp 45 40 8->13         started        process6 file7 24 C:\...\SmartPCOptimizer.exe (copy), PE32 13->24 dropped 26 C:\...\SPONotifications.exe (copy), PE32 13->26 dropped 28 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->28 dropped 30 6 other files (none is malicious) 13->30 dropped 16 SmartPCOptimizer.exe 18 33 13->16         started        19 SPONotifications.exe 52 3 13->19         started        process8 dnsIp9 40 May drop file containing decryption instructions (likely related to ransomware) 16->40 42 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->42 44 Tries to harvest and steal browser information (history, passwords, etc) 16->44 36 collect.avqtools.com 116.203.251.147, 443, 49703 HETZNER-ASDE Germany 19->36 38 collect.smartpcupdate.com 178.63.52.39, 443, 49705, 49711 HETZNER-ASDE Germany 19->38 46 Monitors registry run keys for changes 19->46 signatures10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe0%ReversingLabs
      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe (copy)4%ReversingLabs
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe (copy)8%ReversingLabs
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-0G7HO.tmp8%ReversingLabs
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-5C8ME.tmp3%ReversingLabs
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-RADPK.tmp4%ReversingLabs
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\is-UJHD8.tmp3%ReversingLabs
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\sqlite3.dll (copy)3%ReversingLabs
      C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\unins000.exe (copy)3%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp3%ReversingLabs
      C:\Users\user\AppData\Local\Temp\is-TJ8GA.tmp\_isetup\_setup64.tmp0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://www.gimp.org/xmp/0%URL Reputationsafe
      http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
      http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
      http://www.indyproject.org/0%URL Reputationsafe
      https://www.remobjects.com/ps0%URL Reputationsafe
      https://www.innosetup.com/0%URL Reputationsafe
      http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
      https://chromewebstore.google.com/0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      collect.smartpcupdate.com
      178.63.52.39
      truefalse
        unknown
        collect.avqtools.com
        116.203.251.147
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://collect.smartpcupdate.com/api/collectfalse
            unknown
            https://collect.avqtools.com/debug.txtfalse
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://collect.smartpcupdate.com/SPONotifications.exe, 0000000B.00000002.2506307194.0000000000A68000.00000004.00000020.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000002.2506307194.0000000000AA5000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000000.1254764925.0000000000401000.00000020.00000001.01000000.00000003.sdmpfalse
                  unknown
                  https://subscriptions.smartpctools.comSPONotifications.exe, 0000000B.00000002.2509454654.0000000002646000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005B77000.00000004.00001000.00020000.00000000.sdmpfalse
                    unknown
                    https://smartpctools.com/privacy-policy/SSecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                      unknown
                      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.sectigo.com0SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://mail.google.com/mail/installwebapp?usp=chrome_defaultSmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                        unknown
                        http://find.naupoint.comSmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                          unknown
                          https://smartpctools.com/smart-pc-optimizer/ASecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000240D000.00000004.00001000.00020000.00000000.sdmpfalse
                            unknown
                            http://www.gimp.org/xmp/SmartPCOptimizer.exe, 0000000C.00000000.1320145194.0000000000D16000.00000002.00000001.01000000.0000000A.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.lienvandekelder.comSmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpfalse
                              unknown
                              https://drive.google.com/drive/installwebapp?usp=chrome_defaultSmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                                unknown
                                http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/soap/envelope/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://smartpctools.com/files/drivermanager.exelSmartPCOptimizer.exe, 0000000C.00000002.2509629250.0000000002920000.00000004.00001000.00020000.00000000.sdmpfalse
                                  unknown
                                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.indyproject.org/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.000000000536C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000000.1313420497.0000000000401000.00000020.00000001.01000000.00000008.sdmp, SPONotifications.exe, 0000000B.00000002.2509454654.00000000025D0000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://docs.google.com/document/installwebapp?usp=chrome_defaultSmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                                    unknown
                                    https://docs.google.com/presentation/installwebapp?usp=chrome_defaultSmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                                      unknown
                                      http://find.naupoint.comE-4SmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.lienvandekelder.beSmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.2501139691.00000000065D1000.00000004.00000020.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000003.2500615100.000000000663B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.remobjects.com/psSecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002690000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000000.1258247883.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://collect.avqtools.com/api/debugUSecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000000.1313420497.0000000000401000.00000020.00000001.01000000.00000008.sdmpfalse
                                            unknown
                                            https://techsupport.smartpcupdate.comSPONotifications.exe, 0000000B.00000002.2509454654.0000000002646000.00000004.00001000.00020000.00000000.sdmpfalse
                                              unknown
                                              https://www.innosetup.com/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002690000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FB40000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000000.1258247883.0000000000401000.00000020.00000001.01000000.00000004.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://smartpctools.com/smart-driver-manager/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                unknown
                                                https://smartpctools.com/privacy-policy/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000248A000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023C5000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1334297281.0000000003720000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://www.youtube.com/s/notifications/manifest/cr_install.htmlSmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://www.lienvandekelder.beQSmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://ocsp.sectigo.com0/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://sectigo.com/CPS0SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1256648179.0000000002788000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe, 00000000.00000003.1257004586.000000007FE35000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://smartpctools.com/eula/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023FC000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.0000000002491000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023C5000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1334297281.0000000003720000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://schemas.xmlsoap.org/soap/encoding/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.lienvandekelder.com/SmartPCOptimizer.exe, 0000000C.00000002.2527191299.0000000006F60000.00000004.00001000.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://collect.smartpcupdate.com/kSPONotifications.exe, 0000000B.00000002.2507651152.0000000000B35000.00000004.00000020.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000003.1387909516.0000000000B35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://find.naupoint.comStartSmartPCOptimizer.exe, 0000000C.00000003.2498149093.0000000006591000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                http://www.google.com/search?q=SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.00000000053EE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://smartpctools.com/files/drivermanager.exeSecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.00000000023A1000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://smartpctools.com/support/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000247C000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://collect.avqtools.com/api/debug?program=pchs_cleaner_vSecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1322343239.0000000004FD0000.00000004.00001000.00020000.00000000.sdmp, SPONotifications.exe, 0000000B.00000000.1313420497.0000000000401000.00000020.00000001.01000000.00000008.sdmpfalse
                                                                        unknown
                                                                        https://collect.avqtools.com/SPONotifications.exe, 0000000B.00000002.2506307194.0000000000AA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://docs.google.com/spreadsheets/installwebapp?usp=chrome_defaultSmartPCOptimizer.exe, 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://store.payproglobal.com/checkout?products%5b1%5d%5bid%5d=90862&page-template=18224&products%5SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000236B000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2509629250.000000000293E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://smartpctools.com/smart-pc-optimizer/SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005AC7000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://chromewebstore.google.com/SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005B17000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://chrome.google.com/webstore/SmartPCOptimizer.exe, 0000000C.00000002.2520880012.0000000005B17000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://store.payproglobal.com/checkout?productsSecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1259962441.0000000003490000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.000000000238C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp, 00000002.00000003.1340185099.0000000002406000.00000004.00001000.00020000.00000000.sdmp, SmartPCOptimizer.exe, 0000000C.00000002.2509629250.00000000029BE000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    116.203.251.147
                                                                                    collect.avqtools.comGermany
                                                                                    24940HETZNER-ASDEfalse
                                                                                    178.63.52.39
                                                                                    collect.smartpcupdate.comGermany
                                                                                    24940HETZNER-ASDEfalse
                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                    Analysis ID:1546907
                                                                                    Start date and time:2024-11-01 17:28:12 +01:00
                                                                                    Joe Sandbox product:CloudBasic
                                                                                    Overall analysis duration:0h 7m 6s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                    Number of analysed new started processes analysed:21
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:0
                                                                                    Technologies:
                                                                                    • HCA enabled
                                                                                    • EGA enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Sample name:SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
                                                                                    Detection:SUS
                                                                                    Classification:sus32.rans.spyw.evad.winEXE@8/65@2/2
                                                                                    EGA Information:Failed
                                                                                    HCA Information:
                                                                                    • Successful, ratio: 100%
                                                                                    • Number of executed functions: 0
                                                                                    • Number of non-executed functions: 204
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .exe
                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                                    • Execution Graph export aborted for target SPONotifications.exe, PID 8068 because there are no executed function
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                                    • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                    • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                    • VT rate limit hit for: SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
                                                                                    TimeTypeDescription
                                                                                    12:29:12API Interceptor2x Sleep call for process: SPONotifications.exe modified
                                                                                    17:29:23Task SchedulerRun new task: Smart PC Optimizer automatic scan and notifications path: "C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    116.203.251.147Setup_WinThruster_2021.exeGet hashmaliciousUnknownBrowse
                                                                                      No context
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      HETZNER-ASDEfile.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                      • 176.9.38.121
                                                                                      https://www.miroslavska.com/pvt/language-prefs?return_url=https:///alrbanyon.com/..&lng=en&return_url=/plain-flange_red.thick./dn-800/glatter-flansch-dn-800:813x20-pn-10-id-8195-mmGet hashmaliciousHTMLPhisherBrowse
                                                                                      • 136.243.61.174
                                                                                      Fattura (3).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      Fattura (4).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      Fattura (3).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      Fattura (4).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      ORDER REF_47806798 .exeGet hashmaliciousXWormBrowse
                                                                                      • 176.9.162.125
                                                                                      http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                                                      • 5.9.110.184
                                                                                      http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                                                      • 5.9.110.184
                                                                                      http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                                                      • 5.9.110.184
                                                                                      HETZNER-ASDEfile.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                      • 176.9.38.121
                                                                                      https://www.miroslavska.com/pvt/language-prefs?return_url=https:///alrbanyon.com/..&lng=en&return_url=/plain-flange_red.thick./dn-800/glatter-flansch-dn-800:813x20-pn-10-id-8195-mmGet hashmaliciousHTMLPhisherBrowse
                                                                                      • 136.243.61.174
                                                                                      Fattura (3).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      Fattura (4).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      Fattura (3).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      Fattura (4).jarGet hashmaliciousUnknownBrowse
                                                                                      • 116.203.56.216
                                                                                      ORDER REF_47806798 .exeGet hashmaliciousXWormBrowse
                                                                                      • 176.9.162.125
                                                                                      http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                                                      • 5.9.110.184
                                                                                      http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                                                      • 5.9.110.184
                                                                                      http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                                                      • 5.9.110.184
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      SecuriteInfo.com.Trojan.PWS.Lumma.775.32093.2339.exeGet hashmaliciousLummaCBrowse
                                                                                      • 178.63.52.39
                                                                                      • 116.203.251.147
                                                                                      No context
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:GIF image data, version 89a, 48 x 48
                                                                                      Category:dropped
                                                                                      Size (bytes):3965
                                                                                      Entropy (8bit):7.40982595860968
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:I796+qTY+rVj7rP0G3Vd3AbHAEv5+XBBWFVUUfkkVcya3Bu:I79bqk6nL987GBERc2h0u
                                                                                      MD5:915F2CE934FD4789216B91BF9C2609FD
                                                                                      SHA1:CB942F9E699D07F85A008E8131BB8A92A3974F87
                                                                                      SHA-256:135D81FEEF8BC93E48F3D929D9249ABE56E8B0A566F51964C8CAD28602219250
                                                                                      SHA-512:273A720A72EB1EF150B3EE33ED39DDF5356753EA09E23726B44223CE4CC2A13CA94AF6E08CB9CD84352A71EC8FA0D6E17B6FC51643E1D9D7A1DAB66B33695C01
                                                                                      Malicious:false
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview:GIF89a0.0..U................cdfstv.........................................................................................................................{|~.......mnp.............................................................................wwy....................................................................................................................................!..NETSCAPE2.0.....!.....U.,....0.0.....T......................3..3..............'..%-%............-..-.%.%...........2...0.G.*.*.'.0.........................P.F...).O..Q....`...$.tPa...C.Z. ...].......(S.k....=..."@...W$H.B.%.6mrX.c....n...bQ.....[.K...;c.K!"D9F1:t.....B...H...._:5 R.@........R..uk-...@.K!...,....#.M(..R.....r0.3.B.D..4..fY.;K(...J....>;.H...Ix.9......7...!.....U.,....%.&.....T.....-..R............T................)............%.2..6..6....T..............3.3................!..#...1+..5.....5......."..._?*L....A....).... ..... .)P@h....+$. I..D...1.#..,
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):245
                                                                                      Entropy (8bit):4.2187986967942805
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:I6DRnGNKyZCvM30eDKyZTeToj5K4YIKZ8x:I6DRnGNT0EXZTekj5o9ZI
                                                                                      MD5:F64C612CF669E719DFABC162FBDD61E5
                                                                                      SHA1:A3018CAAD39AB800F8F7E5DF6B7DE136E873E5D6
                                                                                      SHA-256:A193F2EBA15CEF7FE439E4F0292AF90BD46EEE89730BD390E04C365F3E62DEB4
                                                                                      SHA-512:62922CE844B4B4285D6EB30B7515FC0F1C6552D5825AAA33D2D9CDC091D68CFD503C2D521BC3E26765DF0600652487532F9CE8AB788F9931BF1CDD7BD045CEC2
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:google.com..gmail.com..youtube.com..aol.com..bing.com..yahoo.com..login.live..outlook.com..microsoft.com..twitter.com..facebook.com..instagram.com..linkedin.com..paypal.com..netflix.com..fatmedia.io..doubleclick.net..clarity.ms..pchelpsoft.com..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:Generic INItialization configuration [Actions]
                                                                                      Category:dropped
                                                                                      Size (bytes):82524
                                                                                      Entropy (8bit):4.870936846608852
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:LIusiZO9ZArZFhk/Y9ODFOK+XvW8EeOeO7NC5u8FzoLO4mzNFaqxTWdUcqkhQjh2:swY+ZASXW7NC5u8FzAOjNxT7zg/
                                                                                      MD5:8A8467E8891FE1F0C29F479EC8AF05EC
                                                                                      SHA1:EA96338CB7096FE529B394DB5524B1A21665250C
                                                                                      SHA-256:EB14177FCD5B1B373E076F9D2AC60C6EB1AA3E38F756386C5ED46FDD798279E2
                                                                                      SHA-512:4092ABE45B52C9DE0E259AB741DD7E38C5A5291EA6846D19739C4ABF410151EBD01C5929A8C7AA585A405A4C929CFA17889DB0BD7BBDD5E57DE9D2305A2F67DB
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:..[Buttons]..Minimize=Minimize..Close=Close..Exit=Exit..Help=Help..StartScan=Start Scan..Cancel=Cancel..Details=Details..MoreInfo=More info..Fix=Fix..SelectAll=Select all..DeselectAll=Deselect all..SelectCustom=Select custom..Scan=Scan..Find=Find..Search=Search..Remove=Remove..Save=Save..AddItem=Add item..RemoveItem=Remove item..RemoveItems=Remove items..ClearAll=Clear all..Add=Add..Edit=Edit..Delete=Delete..Back=Back..Next=Next..Refresh=Refresh..CheckAll=Check all..UncheckAll=Uncheck all..SaveClose=Save && Close..OK=OK..No=No..OkThanks=OK, thanks..NoThanks=No, thanks..Yes=Yes..Apply=Apply..Excluded=Excluded....[Actions]..Actions=Actions..Action1=Home..Action2=Clean Up..Action3=Security..Action3Hint=Protect your computer and your personal information..Action4=Toolbox..Action4Hint=Tools and Applications to help you safely manage your computer..Action5=Optimize..Action5a=Optimization..Action5Hint=Check for ways to optimize your PC..Action6=Settings..Action6a=Program settings....[Messages
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):357381
                                                                                      Entropy (8bit):5.041504026663943
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:41LPwkFKOwigTWlekAVZrtZR+JZ+TSPLJ+C/YQICk5QTWuORT3R1bavX+9oMsv3o:8PwkFKuAVBtrwnJ+C/YOORzR5qF43T
                                                                                      MD5:1276E1DAB8F69BF8730FE2598059338C
                                                                                      SHA1:CD8E127E154DE44574AB9FE391338E8834EA4C9E
                                                                                      SHA-256:C21419FB42DFB8422AA07EBAFC1F68CE5BFA51032307F4AB1364BDE4AF91E2A3
                                                                                      SHA-512:B6BAB548BC2839BE718F2415AED940FE40A634E3710BF1B08AEE94A2A6F4E3AA255C7FB87A8A78CF47163CB70B4A50D754DE13643103C8C769E9469606076969
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:Obnf$Qvcmjtifs$Wfstjpo$Ibti!JE$Sfdpnnfoe!up!Sfnpwf$Opu!po!Bqq!Tupsf$Ofhbujwf!Gffecbdl$Tfbsdi!Npofuj{bujpo$BqqFtuffn..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41392$kcmedpnggpknllkccmidfcfjdcodnkqg$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:2$fpdoopbdlpekbhecbpeeikclqkbcjnfe$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:5/2:/25:1:$plneloifkkjjdildqqpqqebloflkflpb$2$1$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41392$fpdoopbdlpekbhecbpeeikclqkbcjnfe$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:2$jpipqcnckgomdknngcghfemndfmcgkmj$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41398$mhgfigcopgjggmbeeodphgpcjnfbmplq$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:2$cnkcgnpgjfijhkidqbpcigpqofmboecp$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41799$jmnfiqnhpepjqffdjikccbdjfpoegbbi$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/295/28/46799$mhgfigcopgjggmbeeodphgpcjnfbmplq$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:1$ihbempeefnqnfnfjooqnigpqlmijbfei$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:1$cl
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:MS Windows 95 Internet shortcut text (URL=<https:/smartpctools.com/>), ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):48
                                                                                      Entropy (8bit):4.371115365169273
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:HRAbABGQYm2fNJz0zK:HRYFVm4NSm
                                                                                      MD5:5698C49EC9F5B58135AED230518DB988
                                                                                      SHA1:AFC273962D2E5BEA41EC40BFCD2531C32BF527E7
                                                                                      SHA-256:F1BC05445EEF31639635AADAFE6B2743030240B1A5A56A894E66734275B87ACC
                                                                                      SHA-512:7713657AF7DCECD99912699D5A4410ABA99A1BD33DAF33C46B0E24DFFB0030FC8FC93A67660B9A9B9B5052FF13DE046D26C96B981689202F8F0F3CAA4ADEE746
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:[InternetShortcut]..URL=https:/smartpctools.com/
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1050
                                                                                      Entropy (8bit):4.544556686156469
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:KqxHibUFGQSU6ifMyQW6wGtTwpTdTiToZT+T6rLTA:KqxHI4l2woTcTdTiTUT+T6rLTA
                                                                                      MD5:82B0C12AFC82BB2CE9FE25055032012A
                                                                                      SHA1:C1686583E644F810495B49FFDDE585AB53F5AE1E
                                                                                      SHA-256:C1DB4573E9D2A9C4FED3AF2B14214C2A1A38DB79FC72A77BD5239FC2C6C561B6
                                                                                      SHA-512:EA825B3E8D3877E94FE3F6D14026E9C45F4F4B4CFF7FDDA7E935A23456289D8891D234AD0E72A04ACED9D0A79610C94C270CC073E82FA2564FAC41551C95684B
                                                                                      Malicious:false
                                                                                      Preview:bhsffnfou>Bhsffnfout..bhsffnfout>Bhsffnfout..cfofgjdjbsjft>Bhsffnfout..cfofgjdjbsz>Bhsffnfout..dpousbdut>Bhsffnfout..dpousbdu>Bhsffnfout..dpogjefoujbm>Bhsffnfout..mbtu!xjmm!boe!uftubnfou>Bhsffnfout..mbtu!xjmm>Bhsffnfout..cboljoh>Gjobodjbm..cbolt>Gjobodjbm..cbol>Gjobodjbm..cvehfufe>Gjobodjbm..cvehfut>Gjobodjbm..cvehfu>Gjobodjbm..efcut>Gjobodjbm..efcu>Gjobodjbm..gvoe>Gjobodjbm..qbzdifdlt>Gjobodjbm..qbzdifdl>Gjobodjbm..ubyft>Gjobodjbm..uby>Gjobodjbm..dsfeju!dbset>Gjobodjbm..dsfeju!dbse>Gjobodjbm..ejsfdu!efqptjut>Gjobodjbm..ejsfdu!efqptju>Gjobodjbm..OOOO.OOOO.OOOO.OOOO>Gjobodjbm..OOOO!OOOO!OOOO!OOOO>Gjobodjbm..OOOO!OOOOOO!OOOOO>Gjobodjbm..OOOO.OOOOOO.OOOOO>Gjobodjbm..OOO.OO.OOOO>Gjobodjbm..OOO!OO!OOOO>Gjobodjbm..21:6.b>Gjobodjbm..2151>Gjobodjbm..21::>Gjobodjbm..21:9>Gjobodjbm..x.5>Gjobodjbm..x.3>Gjobodjbm..l.2>Gjobodjbm..x5>Gjobodjbm..x3>Gjobodjbm..l2>Gjobodjbm..qbttxpset>QfstpobmJEt..qbttxpse>QfstpobmJEt..tpdjbm!tfdvsjuz>QfstpobmJEt..tto>QfstpobmJEt..esjwfs!mjdfotft>QfstpobmJEt..esjwfs!mj
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3011000, page size 1024, file counter 3, database pages 1069, cookie 0x18, schema 4, UTF-8, version-valid-for 3
                                                                                      Category:dropped
                                                                                      Size (bytes):1094656
                                                                                      Entropy (8bit):6.128977552298963
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:WY8IyylDzjpmRFQn0g5cqhJWT2mZws7noPrbLT:JrlhyLu
                                                                                      MD5:DDBBFDA211ED1460D616A48FE1EF9676
                                                                                      SHA1:5306FBA67448AB0C1C3E55808D13B1F900E82493
                                                                                      SHA-256:B59785F62C26B60CE5D6E30E88946BFFC3D7EB8C0F572359D36985CA8EE4BC48
                                                                                      SHA-512:28CE666FF970741145B26C7850DA551FFF4BEE95881981637C877E82E10A2AEDA2304FE7580AC06FE3CDE175BC51C97502060769B7FA358EB2F82126A520ED38
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ .......-.................................................................-.......x..x...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................atablestartupstartup.CREATE TABLE startup (id integer PRIMARY KEY, file varchar(40), title varchar(40),
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:Non-ISO extended-ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):78404
                                                                                      Entropy (8bit):4.988369074396747
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:T/JMTzd9uV34FyoAS9rTu4CVzvC3W8ocJm96S000fWcYXAwt7o5cEfw2rEhUS8ws:ThVSX3JV40n3wYcwjSXAiyCAmJQ2r3O
                                                                                      MD5:09B6922B17F86EFA7AEEC676370F7388
                                                                                      SHA1:E24C2F1357EB8B35F2EFA4C0FDB81C94B5A0D0F3
                                                                                      SHA-256:8483B5889DFD3874901657719770157B528A9B54543FC766E256F983890191FE
                                                                                      SHA-512:8E89B647587E6A54B34313D17ABFA04F3634EA6CFF62C0183CDD4AB6BABF86F2DA819F725932C298170E5FA521062D2CC84D1447F685F5CEA727A7C4A37E684B
                                                                                      Malicious:false
                                                                                      Preview:\BWQsphsbnt^..XJOEPXTEFGFOEFS>Njdsptpgu!nbmxbsf!qspufdujpo!jodmvefe!xjui!boe!cvjmu!joup!Xjoepxt!tubsujoh!xjui!Xjoepxt!9/!Uijt!tpguxbsf!ifmqt!jefoujgz!boe!sfnpwf!wjsvtft-!tqzxbsf!boe!puifs!nbmjdjpvt!tpguxbsf/..BWBTU>Qbsu!pg!Bwbtu!boujwjsvt!qsphsbn/!Ju!jt!jnqpsubou!up!lffq!bdujwf!up!fotvsf!uibu!zpvs!boujwjsvt!jt!bmxbzt!vq!up!ebuf/..BWHOU>Tztufn!Usbz!Opujgjfs!gps!Bwjsb!BoujWjs!boujwjsvt!qspevdut/!Mfbwf!bdujwf!jo!zpvs!tubsuvq!nfov!up!fotvsf!zpvs!boujwjsvt!jt!bmxbzt!vq!up!ebuf!boe!uibu!zpv!sfdfjwf!opujgjdbujpot!pg!boz!qspcmfnt/..BWH`USBZ>Tztufn!Usbz!bddftt!gps!BWH!bojujwjsvt!qspevdut/!Mfbwf!bdujwf!jo!zpvs!tubsuvq!nfov!up!fotvsf!uibu!zpvs!boujwjsvt!jt!bmxbzt!vq!up!ebuf!boe!uibu!zpv!sfdfjwf!opujgjdbujpot!pg!boz!qpufoujbm!qspcmfnt/..BWH`VJ>Tztufn!usbz!bddftt!boe!opujgjdbujpot!gps!joufsofu!tfdvsjuz!qspevdut!gspn!BWH/!Mfbwf!bdujwf!jo!tubsuvq!up!fotvsf!boujwjsvt!jt!vq!up!ebuf!boe!up!sfdfjwf!opujgjdbujpot!pg!qpufoujbm!qspcmfnt/..BWH>BWH!boujwjsvt..SPD`SPD`TTM>Qbsu!pg!BWH!Tfdvsf!Tfbsdi!xijdi!bmfsut
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):5051136
                                                                                      Entropy (8bit):6.701398349056225
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:BE8NPv7SyRiqA3MmraHCP1BJyi8p2i2wLJnX3Se:e8N5JT
                                                                                      MD5:ADBB7F96A4A14023CE27D2F8D6710736
                                                                                      SHA1:314642F41F1C74A1E3BEA362CA408F15809ACF4D
                                                                                      SHA-256:01DBE551409B6514B41CF2284F6261F08C0A4AAB70C31E0078DFA2D431A79800
                                                                                      SHA-512:ED2167A59C0EB5B2400AB037BB76B416941FF0A1620CABE0A5FC5A0B86A01801D09D042917761779991D4C5780F4C30FB50F59FBA161B36489B5E53BDE6A3243
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...+.af................. :..........$:......@:...@...........................M.....H.M...@......@...................0=.......<..;....B...............L..-...`=.pR...........................P=.....................L.<...... =......................text.....9.......9................. ..`.itext...A....9..B....9............. ..`.data........@:......$:.............@....bss.....z...`<..........................idata...;....<..<...@<.............@....didata...... =......|<.............@....edata.......0=.......<.............@..@.tls....X....@=..........................rdata..]....P=.......<.............@..@.reloc..pR...`=..T....<.............@..B.rsrc.........B.......A.............@..@..............M.......L.............@..@................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):6621
                                                                                      Entropy (8bit):4.880527609740299
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:iPHHfnYHvvC2bKUdsjMXYcUSmexdNYzjsMc:iPf2vC2zUfexdN/
                                                                                      MD5:21F0385202E665599896F483A3733F69
                                                                                      SHA1:8A3707CE3168D90C0C69B64D4C525E753FB6D418
                                                                                      SHA-256:51C826196A662BEE9181965FF94703E76C422AD7B5406A53E347FEB516E70AAD
                                                                                      SHA-512:DE43613C47C196BE7677424235552183FAD6EA443F9EBC86724F8E2358316190A33485951A1199B6F190A58CD8A66CE99810661D3F7A77AE3DEE1770324DBFCB
                                                                                      Malicious:false
                                                                                      Preview:[Tasks]..Adobe Acrobat Update Task=Adobe Acrobat Update Task. You can disable this task...Adobe Flash Player PPAPI Notifier=Task of Adobe Flash Player. You can disable this...Adobe Flash Player Updater=Adobe Flash Player Updater. You can disable this task...AdobeAAMUpdater=Updater of Adobe products. This program does not need to automatically start. ..Antivirus Emergency Update=Part of an AVG automatic update. Keep it enabled...AppleSoftwareUpdate=Apple Software Update. If you do not use Apple products on Windows, this service can be disabled...ASC11_PerformanceMonitor=Advanced SystemCare Monitor from IObit. You can disable this task...AtomicAlarmClock=Launch Atomic Alarm Clock. If you do not use this product, this service can be disabled...Auslogics=Task of one from Auslogics products. You can disable this task...Avast settings backup=Task of Avast antivirus. Keep it enabled...AVG EUpdate Task=Task of antivirus AVG. Keep it enabled...Asus AISuite=Part of Asus AI Suite. Keep it enabled
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):3317
                                                                                      Entropy (8bit):4.908513539175229
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:zXOk/Ty2JCNSwdT4BaA+Gm8Rfcyz0U+fs1qV:zXOkBJCIwdTA+GQK0U+fs1+
                                                                                      MD5:21BC09207F237DD262112401584E3B8F
                                                                                      SHA1:7AA202D5D392E9C3B04C0113381D165A3B12FF61
                                                                                      SHA-256:95D33968B745174744E07207E8003B8A615E1BC5E10676A2F4E81F3E5ABF4980
                                                                                      SHA-512:EF11CEFD953FB0FA91931B81400438A4C38C65B05A7581F8343CC3F7EF0FA0AEBA9DFEC68F7862DCA5C06783A104F8FB47852D84CCB4A8A7C9DE94799B1A3FB7
                                                                                      Malicious:false
                                                                                      Preview:WwanSvc..wudfsvc..wuauserv..WSService..WSearch..wscsvc..WPDBusEnum..WPCSvc..WMPNetworkSvc..wmiApSrv..wlidsvc..WlanSvc..WinRM..Winmgmt..WinHttpAutoProxySvc..WinDefend..WiaRpc..WerSvc..wercplsupport..Wecsvc..WebClient..WdiSystemHost..WdiServiceHost..WcsPlugInService..wcncsvc..Wcmsvc..WbioSrvc..wbengine..W32Time..VSS..vmicvss..vmictimesync..vmicshutdown..vmicrdv..vmickvpexchange..vmicheartbeat..vds..VaultSvc..upnphost..UmRdpService..UI0Detect..TrustedInstaller..TrkWks..TimeBroker..THREADORDER..Themes..TermService..TapiSrv..TabletInputService..SystemEventsBroker..SysMain..swprv..svsvc..StorSvc..stisvc..SstpSvc..SSDPSRV..sppsvc..Spooler..SNMPTRAP..ShellHWDetection..SharedAccess..SessionEnv..SensrSvc..SENS..seclogon..SDRSVC..SCPolicySvc..Schedule..SCardSvr..SamSs..RpcSs..RpcLocator..RpcEptMapper..RemoteRegistry..RemoteAccess..RasMan..RasAuto..QWAVE..ProfSvc..PrintNotify..Power..PolicyAgent..PNRPsvc..PNRPAutoReg..PlugPlay..pla..PerfHost..PeerDistSvc..PcaSvc..p2psvc..p2pimsvc..nsi..NlaSvc..Net
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):14579
                                                                                      Entropy (8bit):4.841093110997302
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:4u4y64zqfQY0/XDeBZkJVPhbC6UJw3OaeOd9CYp1NKMU2SmwqC55BwSLhLLwtwYR:NY48Aefk12T/5YzpftOC+WNB5/fXGaZ
                                                                                      MD5:6D885D79C99B9B8D409C4684BCEA54D2
                                                                                      SHA1:20EDDB02737AAD8EC88407E19777534A8ED8E766
                                                                                      SHA-256:1923ED5B39D3248FCBC245EB60FC05116FD439E62F2271FB5B7D42FEA8545CBD
                                                                                      SHA-512:BB17D8901281FC39A2594BAE85EB81E161BAA74A9A954121A433A37190557580040702E9308B2734CC3B695AE3F8DFE04AFBCCF88D1AEADB6DC939E07FD54C63
                                                                                      Malicious:false
                                                                                      Preview:[Services]..ACDaemon=ArcSoft Connection Service..Adguard Service=Part of AdGuard product, it blocks ads and dangerous websites. If you use ADGuard keep it enabled...AdobeARMservice=Adobe Acrobat Update Service. This service is not required to start automatically as it can be run manually when needed...Adobe LM service=Adobe Licensing Service. If you do not uses Adobe products, this service can be disabled...AdobeFlashPlayerUpdateSvc=Adobe Flash Player Update Service. This service is not required to start automatically as it can be run manually when needed...AdvancedSystemCareService11=Advanced SystemCare Service. This service is not required to start automatically as it can be run manually when needed...AMD External Events Utility=AMD External Events Utility...AMPPALR3=Intel Wireless Bluetooth Service. Keep enabled. ..AnviCsbSvc=Anvisoft Cloud System Booster Service. AnviCsbSvc is not essential for the Windows OS and can be disabled...Apple Mobile Device=Apple Mobile Device Service. Pa
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):4351
                                                                                      Entropy (8bit):4.401618076790458
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:kxXH+TBvERKDzCxLg+lQm+zHj6DnojA4MCBhqmhEWl7GMCdM9:kReFE0DzgMn3zD6DnomCZhEWl7GMGe
                                                                                      MD5:023938522A2335379044391C1B83656A
                                                                                      SHA1:1761B2DCADB48689C7C052393490043E050E5FEA
                                                                                      SHA-256:66AAE467EF3636628B6EB4C4DC2E210990BB6440653CC3AAFB7800B89A8DA1EC
                                                                                      SHA-512:0F88726EE74A9D51DFD888120D0E0DC1C66949374388EF4A394B4A2CD59056DBADA68FE75929F4374B4441CFD8B8100E5EDFAAA2982DBA9F02D0322F1D1DD389
                                                                                      Malicious:false
                                                                                      Preview:abc.es..actualidad.rt.com..ad.nl..adaware.com..alibaba.com..allrecipes.com..apost.com..apps.facebook.com..ar.pinterest.com..as.com..asahi.com..assure.ameli.fr..atrapalo.com..atrapalo.com.ar..aujardin.info..auto-doc.fr..auto-doc.it..auto-motor-und-sport.de..autodoc.de..autodoc.es..autoparti.it..badoo.com..banggood.com..bestday.com.ar..bilibili.com..blog.giallozafferano.it..bolavip.com..bonial.fr..book.lufthansa.com..boxil.jp..br.pinterest.com..brigitte.de..businessinsider.de..calendar.google.com..canaltech.com.br..case.trovit.it..cbssports.com..chinatimes.com..cnet.com..comingsoon.it..commonhealth.com.tw..computerbild.de..conforama.fr..consoglobe.com..cronica.com.ar..cw.com.tw..dafiti.com.br..daily.co.jp..dailymail.co.uk..derwesten.de..diariosur.es..digitaltrends.com..dn.pt..donnamoderna.com..dresslily.com..drive.google.com..duo.google.com..duolingo.com..ecologiaverde.com..economia.uol.com.br..elcorreo.com..elindependiente.com..ellitoral.com..elperiodico.com..endesaclientes.com..erecipe
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:MS Windows HtmlHelp Data
                                                                                      Category:dropped
                                                                                      Size (bytes):37246
                                                                                      Entropy (8bit):7.072071227239875
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:SYXuFRuS16AA/Z2J2POjPgPmYHXtCclZbD:SYenuSIRIJ2yDY3tCclZ3
                                                                                      MD5:E99B7A1AEED3EDDED1C4BBE40DBB7748
                                                                                      SHA1:178EB6DB86E0E755B506B60CD64BF0DC5DA142B4
                                                                                      SHA-256:DC65D3C6901F681E66407A8FCEA2EC101CF7911AF33CC2F32D4BB027257275BB
                                                                                      SHA-512:47BF20DE91A177F6A513DAF3A11613D35ECC0EED1899AE58C4695FEDAACC88881665A0B63F3953C49DEA3BD57091918A80301BBAB03AFB0979A84049F3BD75F5
                                                                                      Malicious:false
                                                                                      Preview:ITSF....`.......^[........|.{.......".....|.{......."..`.......(.......*q......T ......................~.......................,...................j..].!......."..T.....................U.n.c.o.m.p.r.e.s.s.e.d.....M.S.C.o.m.p.r.e.s.s.e.d...{.7.F.C.2.8.9.4.0.-.9.D.3.1.-.1.1.D.0.............LZXC..........................!up4..o.....cf.B{..M....1lm.....3......n...vw....L...z-.%T.=.%|.*C.....Q F..4#.V.......}.{...o.....IM.....U..s...[..n.nZs..7mU.j..J...i........,C2....X.....B..?........!..n...-.,.....8..9a...S.F>...w.....1..,..qN...J..N.h$........&0.B).=Ht\F..<u.g.7.......'#M.S....&....{......iH.........g.K..T....l.......<.N...N......r..&....|.$Q.q.c.....w.NNBu...O""....|..*............~...*.. .M....-...j1......r.w.b...U.olS~..&9.~..3/.P.K.9...{a..8.......Z.Q@...P.@.....`t.qB._.8V..V.+0i.P....Uf.L......L..804.PtU.PL..)..1..Vg.8PD&...i....fq....P.6.cE....p.qP.^....4.-.Q....<.1..`.B..Q....OJ..m*z..E .....J.......H..R....D.._.h.Lq....a.....F.@%.X .Q..5..TF....g.k...F
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):10108672
                                                                                      Entropy (8bit):6.757489138086671
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:W5JOQk/47fPnOdDyZg0Nw2MIZsdwwTrLXt66lUYaMjWzqaDnU4:oq/JODxwb06lUHTXrx
                                                                                      MD5:89943B083FEE6DA392A6668D6EE260BB
                                                                                      SHA1:94C36D1A364D4A5F728CF97DE62684D3DF23DC9E
                                                                                      SHA-256:056630B4F9675319E28C07A19AD19AE416D6B2C41F5F23210E47BD5FF26B58F5
                                                                                      SHA-512:833BEDBBD4B74C82C683373F488F2B6D28AD8808D9BE8499B939C0626122449ADB65B72F10E77C98428C43D0051D5630AC977F0D4BA3B70065E200B0416E26FE
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...;.af.................<m...,......Bm......`m...@.......................................@......@....................p......pp..O....z..~ ..............-....q..r............................q.....................H~p.@.....p.\....................text.....l.......l................. ..`.itext.. P....m..R....l............. ..`.data....t...`m..t...@m.............@....bss....0.....o..........................idata...O...pp..P....o.............@....didata.\.....p.......p.............@....edata........p.......p.............@..@.tls....\.....p..........................rdata..].....q.......p.............@..@.reloc...r....q..t... p.............@..B.rsrc....~ ...z..~ ...y.............@..@....................................@..@................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):10108672
                                                                                      Entropy (8bit):6.757489138086671
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:W5JOQk/47fPnOdDyZg0Nw2MIZsdwwTrLXt66lUYaMjWzqaDnU4:oq/JODxwb06lUHTXrx
                                                                                      MD5:89943B083FEE6DA392A6668D6EE260BB
                                                                                      SHA1:94C36D1A364D4A5F728CF97DE62684D3DF23DC9E
                                                                                      SHA-256:056630B4F9675319E28C07A19AD19AE416D6B2C41F5F23210E47BD5FF26B58F5
                                                                                      SHA-512:833BEDBBD4B74C82C683373F488F2B6D28AD8808D9BE8499B939C0626122449ADB65B72F10E77C98428C43D0051D5630AC977F0D4BA3B70065E200B0416E26FE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 8%
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...;.af.................<m...,......Bm......`m...@.......................................@......@....................p......pp..O....z..~ ..............-....q..r............................q.....................H~p.@.....p.\....................text.....l.......l................. ..`.itext.. P....m..R....l............. ..`.data....t...`m..t...@m.............@....bss....0.....o..........................idata...O...pp..P....o.............@....didata.\.....p.......p.............@....edata........p.......p.............@..@.tls....\.....p..........................rdata..].....q.......p.............@..@.reloc...r....q..t... p.............@..B.rsrc....~ ...z..~ ...y.............@..@....................................@..@................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:Non-ISO extended-ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):78404
                                                                                      Entropy (8bit):4.988369074396747
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:T/JMTzd9uV34FyoAS9rTu4CVzvC3W8ocJm96S000fWcYXAwt7o5cEfw2rEhUS8ws:ThVSX3JV40n3wYcwjSXAiyCAmJQ2r3O
                                                                                      MD5:09B6922B17F86EFA7AEEC676370F7388
                                                                                      SHA1:E24C2F1357EB8B35F2EFA4C0FDB81C94B5A0D0F3
                                                                                      SHA-256:8483B5889DFD3874901657719770157B528A9B54543FC766E256F983890191FE
                                                                                      SHA-512:8E89B647587E6A54B34313D17ABFA04F3634EA6CFF62C0183CDD4AB6BABF86F2DA819F725932C298170E5FA521062D2CC84D1447F685F5CEA727A7C4A37E684B
                                                                                      Malicious:false
                                                                                      Preview:\BWQsphsbnt^..XJOEPXTEFGFOEFS>Njdsptpgu!nbmxbsf!qspufdujpo!jodmvefe!xjui!boe!cvjmu!joup!Xjoepxt!tubsujoh!xjui!Xjoepxt!9/!Uijt!tpguxbsf!ifmqt!jefoujgz!boe!sfnpwf!wjsvtft-!tqzxbsf!boe!puifs!nbmjdjpvt!tpguxbsf/..BWBTU>Qbsu!pg!Bwbtu!boujwjsvt!qsphsbn/!Ju!jt!jnqpsubou!up!lffq!bdujwf!up!fotvsf!uibu!zpvs!boujwjsvt!jt!bmxbzt!vq!up!ebuf/..BWHOU>Tztufn!Usbz!Opujgjfs!gps!Bwjsb!BoujWjs!boujwjsvt!qspevdut/!Mfbwf!bdujwf!jo!zpvs!tubsuvq!nfov!up!fotvsf!zpvs!boujwjsvt!jt!bmxbzt!vq!up!ebuf!boe!uibu!zpv!sfdfjwf!opujgjdbujpot!pg!boz!qspcmfnt/..BWH`USBZ>Tztufn!Usbz!bddftt!gps!BWH!bojujwjsvt!qspevdut/!Mfbwf!bdujwf!jo!zpvs!tubsuvq!nfov!up!fotvsf!uibu!zpvs!boujwjsvt!jt!bmxbzt!vq!up!ebuf!boe!uibu!zpv!sfdfjwf!opujgjdbujpot!pg!boz!qpufoujbm!qspcmfnt/..BWH`VJ>Tztufn!usbz!bddftt!boe!opujgjdbujpot!gps!joufsofu!tfdvsjuz!qspevdut!gspn!BWH/!Mfbwf!bdujwf!jo!tubsuvq!up!fotvsf!boujwjsvt!jt!vq!up!ebuf!boe!up!sfdfjwf!opujgjdbujpot!pg!qpufoujbm!qspcmfnt/..BWH>BWH!boujwjsvt..SPD`SPD`TTM>Qbsu!pg!BWH!Tfdvsf!Tfbsdi!xijdi!bmfsut
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):3211008
                                                                                      Entropy (8bit):6.3336734602472395
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:TWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbQ333TYI:ttLutqgwh4NYxtJpkxhGj333Tr
                                                                                      MD5:023C73AD61BF1C58697C2C09C09E521F
                                                                                      SHA1:E822900B983141C031552C6F8D5AAC97715E1C92
                                                                                      SHA-256:E84F27FDDEA22C9B4A3F70017E560659BFBE66845AE451CDCA5F9EBD0EC910F4
                                                                                      SHA-512:2D973D9D056C96CB277D477862823BC5E2E382FD387186B205246CC668B12EF0579942481801F44444F2D54462D9D470D59F556DE6E334A4F220C255ADB6165F
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,.........hf,......p,...@...........................1.....r.1...@......@....................-.......-..9....................0..-...........................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc.................-.............@..@..............1.......0.............@..@........................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):6621
                                                                                      Entropy (8bit):4.880527609740299
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:iPHHfnYHvvC2bKUdsjMXYcUSmexdNYzjsMc:iPf2vC2zUfexdN/
                                                                                      MD5:21F0385202E665599896F483A3733F69
                                                                                      SHA1:8A3707CE3168D90C0C69B64D4C525E753FB6D418
                                                                                      SHA-256:51C826196A662BEE9181965FF94703E76C422AD7B5406A53E347FEB516E70AAD
                                                                                      SHA-512:DE43613C47C196BE7677424235552183FAD6EA443F9EBC86724F8E2358316190A33485951A1199B6F190A58CD8A66CE99810661D3F7A77AE3DEE1770324DBFCB
                                                                                      Malicious:false
                                                                                      Preview:[Tasks]..Adobe Acrobat Update Task=Adobe Acrobat Update Task. You can disable this task...Adobe Flash Player PPAPI Notifier=Task of Adobe Flash Player. You can disable this...Adobe Flash Player Updater=Adobe Flash Player Updater. You can disable this task...AdobeAAMUpdater=Updater of Adobe products. This program does not need to automatically start. ..Antivirus Emergency Update=Part of an AVG automatic update. Keep it enabled...AppleSoftwareUpdate=Apple Software Update. If you do not use Apple products on Windows, this service can be disabled...ASC11_PerformanceMonitor=Advanced SystemCare Monitor from IObit. You can disable this task...AtomicAlarmClock=Launch Atomic Alarm Clock. If you do not use this product, this service can be disabled...Auslogics=Task of one from Auslogics products. You can disable this task...Avast settings backup=Task of Avast antivirus. Keep it enabled...AVG EUpdate Task=Task of antivirus AVG. Keep it enabled...Asus AISuite=Part of Asus AI Suite. Keep it enabled
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:GIF image data, version 89a, 48 x 48
                                                                                      Category:dropped
                                                                                      Size (bytes):3965
                                                                                      Entropy (8bit):7.40982595860968
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:I796+qTY+rVj7rP0G3Vd3AbHAEv5+XBBWFVUUfkkVcya3Bu:I79bqk6nL987GBERc2h0u
                                                                                      MD5:915F2CE934FD4789216B91BF9C2609FD
                                                                                      SHA1:CB942F9E699D07F85A008E8131BB8A92A3974F87
                                                                                      SHA-256:135D81FEEF8BC93E48F3D929D9249ABE56E8B0A566F51964C8CAD28602219250
                                                                                      SHA-512:273A720A72EB1EF150B3EE33ED39DDF5356753EA09E23726B44223CE4CC2A13CA94AF6E08CB9CD84352A71EC8FA0D6E17B6FC51643E1D9D7A1DAB66B33695C01
                                                                                      Malicious:false
                                                                                      Preview:GIF89a0.0..U................cdfstv.........................................................................................................................{|~.......mnp.............................................................................wwy....................................................................................................................................!..NETSCAPE2.0.....!.....U.,....0.0.....T......................3..3..............'..%-%............-..-.%.%...........2...0.G.*.*.'.0.........................P.F...).O..Q....`...$.tPa...C.Z. ...].......(S.k....=..."@...W$H.B.%.6mrX.c....n...bQ.....[.K...;c.K!"D9F1:t.....B...H...._:5 R.@........R..uk-...@.K!...,....#.M(..R.....r0.3.B.D..4..fY.;K(...J....>;.H...Ix.9......7...!.....U.,....%.&.....T.....-..R............T................)............%.2..6..6....T..............3.3................!..#...1+..5.....5......."..._?*L....A....).... ..... .)P@h....+$. I..D...1.#..,
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):245
                                                                                      Entropy (8bit):4.2187986967942805
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:I6DRnGNKyZCvM30eDKyZTeToj5K4YIKZ8x:I6DRnGNT0EXZTekj5o9ZI
                                                                                      MD5:F64C612CF669E719DFABC162FBDD61E5
                                                                                      SHA1:A3018CAAD39AB800F8F7E5DF6B7DE136E873E5D6
                                                                                      SHA-256:A193F2EBA15CEF7FE439E4F0292AF90BD46EEE89730BD390E04C365F3E62DEB4
                                                                                      SHA-512:62922CE844B4B4285D6EB30B7515FC0F1C6552D5825AAA33D2D9CDC091D68CFD503C2D521BC3E26765DF0600652487532F9CE8AB788F9931BF1CDD7BD045CEC2
                                                                                      Malicious:false
                                                                                      Preview:google.com..gmail.com..youtube.com..aol.com..bing.com..yahoo.com..login.live..outlook.com..microsoft.com..twitter.com..facebook.com..instagram.com..linkedin.com..paypal.com..netflix.com..fatmedia.io..doubleclick.net..clarity.ms..pchelpsoft.com..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1050
                                                                                      Entropy (8bit):4.544556686156469
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:KqxHibUFGQSU6ifMyQW6wGtTwpTdTiToZT+T6rLTA:KqxHI4l2woTcTdTiTUT+T6rLTA
                                                                                      MD5:82B0C12AFC82BB2CE9FE25055032012A
                                                                                      SHA1:C1686583E644F810495B49FFDDE585AB53F5AE1E
                                                                                      SHA-256:C1DB4573E9D2A9C4FED3AF2B14214C2A1A38DB79FC72A77BD5239FC2C6C561B6
                                                                                      SHA-512:EA825B3E8D3877E94FE3F6D14026E9C45F4F4B4CFF7FDDA7E935A23456289D8891D234AD0E72A04ACED9D0A79610C94C270CC073E82FA2564FAC41551C95684B
                                                                                      Malicious:false
                                                                                      Preview:bhsffnfou>Bhsffnfout..bhsffnfout>Bhsffnfout..cfofgjdjbsjft>Bhsffnfout..cfofgjdjbsz>Bhsffnfout..dpousbdut>Bhsffnfout..dpousbdu>Bhsffnfout..dpogjefoujbm>Bhsffnfout..mbtu!xjmm!boe!uftubnfou>Bhsffnfout..mbtu!xjmm>Bhsffnfout..cboljoh>Gjobodjbm..cbolt>Gjobodjbm..cbol>Gjobodjbm..cvehfufe>Gjobodjbm..cvehfut>Gjobodjbm..cvehfu>Gjobodjbm..efcut>Gjobodjbm..efcu>Gjobodjbm..gvoe>Gjobodjbm..qbzdifdlt>Gjobodjbm..qbzdifdl>Gjobodjbm..ubyft>Gjobodjbm..uby>Gjobodjbm..dsfeju!dbset>Gjobodjbm..dsfeju!dbse>Gjobodjbm..ejsfdu!efqptjut>Gjobodjbm..ejsfdu!efqptju>Gjobodjbm..OOOO.OOOO.OOOO.OOOO>Gjobodjbm..OOOO!OOOO!OOOO!OOOO>Gjobodjbm..OOOO!OOOOOO!OOOOO>Gjobodjbm..OOOO.OOOOOO.OOOOO>Gjobodjbm..OOO.OO.OOOO>Gjobodjbm..OOO!OO!OOOO>Gjobodjbm..21:6.b>Gjobodjbm..2151>Gjobodjbm..21::>Gjobodjbm..21:9>Gjobodjbm..x.5>Gjobodjbm..x.3>Gjobodjbm..l.2>Gjobodjbm..x5>Gjobodjbm..x3>Gjobodjbm..l2>Gjobodjbm..qbttxpset>QfstpobmJEt..qbttxpse>QfstpobmJEt..tpdjbm!tfdvsjuz>QfstpobmJEt..tto>QfstpobmJEt..esjwfs!mjdfotft>QfstpobmJEt..esjwfs!mj
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):14579
                                                                                      Entropy (8bit):4.841093110997302
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:4u4y64zqfQY0/XDeBZkJVPhbC6UJw3OaeOd9CYp1NKMU2SmwqC55BwSLhLLwtwYR:NY48Aefk12T/5YzpftOC+WNB5/fXGaZ
                                                                                      MD5:6D885D79C99B9B8D409C4684BCEA54D2
                                                                                      SHA1:20EDDB02737AAD8EC88407E19777534A8ED8E766
                                                                                      SHA-256:1923ED5B39D3248FCBC245EB60FC05116FD439E62F2271FB5B7D42FEA8545CBD
                                                                                      SHA-512:BB17D8901281FC39A2594BAE85EB81E161BAA74A9A954121A433A37190557580040702E9308B2734CC3B695AE3F8DFE04AFBCCF88D1AEADB6DC939E07FD54C63
                                                                                      Malicious:false
                                                                                      Preview:[Services]..ACDaemon=ArcSoft Connection Service..Adguard Service=Part of AdGuard product, it blocks ads and dangerous websites. If you use ADGuard keep it enabled...AdobeARMservice=Adobe Acrobat Update Service. This service is not required to start automatically as it can be run manually when needed...Adobe LM service=Adobe Licensing Service. If you do not uses Adobe products, this service can be disabled...AdobeFlashPlayerUpdateSvc=Adobe Flash Player Update Service. This service is not required to start automatically as it can be run manually when needed...AdvancedSystemCareService11=Advanced SystemCare Service. This service is not required to start automatically as it can be run manually when needed...AMD External Events Utility=AMD External Events Utility...AMPPALR3=Intel Wireless Bluetooth Service. Keep enabled. ..AnviCsbSvc=Anvisoft Cloud System Booster Service. AnviCsbSvc is not essential for the Windows OS and can be disabled...Apple Mobile Device=Apple Mobile Device Service. Pa
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):4351
                                                                                      Entropy (8bit):4.401618076790458
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:kxXH+TBvERKDzCxLg+lQm+zHj6DnojA4MCBhqmhEWl7GMCdM9:kReFE0DzgMn3zD6DnomCZhEWl7GMGe
                                                                                      MD5:023938522A2335379044391C1B83656A
                                                                                      SHA1:1761B2DCADB48689C7C052393490043E050E5FEA
                                                                                      SHA-256:66AAE467EF3636628B6EB4C4DC2E210990BB6440653CC3AAFB7800B89A8DA1EC
                                                                                      SHA-512:0F88726EE74A9D51DFD888120D0E0DC1C66949374388EF4A394B4A2CD59056DBADA68FE75929F4374B4441CFD8B8100E5EDFAAA2982DBA9F02D0322F1D1DD389
                                                                                      Malicious:false
                                                                                      Preview:abc.es..actualidad.rt.com..ad.nl..adaware.com..alibaba.com..allrecipes.com..apost.com..apps.facebook.com..ar.pinterest.com..as.com..asahi.com..assure.ameli.fr..atrapalo.com..atrapalo.com.ar..aujardin.info..auto-doc.fr..auto-doc.it..auto-motor-und-sport.de..autodoc.de..autodoc.es..autoparti.it..badoo.com..banggood.com..bestday.com.ar..bilibili.com..blog.giallozafferano.it..bolavip.com..bonial.fr..book.lufthansa.com..boxil.jp..br.pinterest.com..brigitte.de..businessinsider.de..calendar.google.com..canaltech.com.br..case.trovit.it..cbssports.com..chinatimes.com..cnet.com..comingsoon.it..commonhealth.com.tw..computerbild.de..conforama.fr..consoglobe.com..cronica.com.ar..cw.com.tw..dafiti.com.br..daily.co.jp..dailymail.co.uk..derwesten.de..diariosur.es..digitaltrends.com..dn.pt..donnamoderna.com..dresslily.com..drive.google.com..duo.google.com..duolingo.com..ecologiaverde.com..economia.uol.com.br..elcorreo.com..elindependiente.com..ellitoral.com..elperiodico.com..endesaclientes.com..erecipe
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3034000, file counter 37, database pages 366, cookie 0x1a, schema 4, UTF-8, version-valid-for 37
                                                                                      Category:dropped
                                                                                      Size (bytes):1499136
                                                                                      Entropy (8bit):6.371788540768014
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:9KaOirgE5nkCS790LzifWRNuxPLdDwdnaUbn0VqDgESh7LMx/UApkuQSVvIQ/w81:9KaOirx5nZSp0LzifuUPLdDw59bnCqDv
                                                                                      MD5:A59CF386E89C3726389A58AC9301E174
                                                                                      SHA1:8B8A4CD4184D38A2FC3594633E3CEFD2EEB3E81A
                                                                                      SHA-256:F02FA210DE3BD77D561C232764BF917538E6543352CA2AC81EAB8522572F9C29
                                                                                      SHA-512:7F62D04AD851C2BD66BEFA785CE67AD566C023EAB670527C7C51D233CC62E2D2E33669D46197161D96124103D26FA8DF97DD5545EFCDD041B9B8E317D17CCA79
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ...%...n...............................................................%..K..........j.......7.....i.....<......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:MS Windows 95 Internet shortcut text (URL=<https:/smartpctools.com/>), ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):48
                                                                                      Entropy (8bit):4.371115365169273
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:HRAbABGQYm2fNJz0zK:HRYFVm4NSm
                                                                                      MD5:5698C49EC9F5B58135AED230518DB988
                                                                                      SHA1:AFC273962D2E5BEA41EC40BFCD2531C32BF527E7
                                                                                      SHA-256:F1BC05445EEF31639635AADAFE6B2743030240B1A5A56A894E66734275B87ACC
                                                                                      SHA-512:7713657AF7DCECD99912699D5A4410ABA99A1BD33DAF33C46B0E24DFFB0030FC8FC93A67660B9A9B9B5052FF13DE046D26C96B981689202F8F0F3CAA4ADEE746
                                                                                      Malicious:false
                                                                                      Preview:[InternetShortcut]..URL=https:/smartpctools.com/
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:Generic INItialization configuration [Actions]
                                                                                      Category:dropped
                                                                                      Size (bytes):82524
                                                                                      Entropy (8bit):4.870936846608852
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:LIusiZO9ZArZFhk/Y9ODFOK+XvW8EeOeO7NC5u8FzoLO4mzNFaqxTWdUcqkhQjh2:swY+ZASXW7NC5u8FzAOjNxT7zg/
                                                                                      MD5:8A8467E8891FE1F0C29F479EC8AF05EC
                                                                                      SHA1:EA96338CB7096FE529B394DB5524B1A21665250C
                                                                                      SHA-256:EB14177FCD5B1B373E076F9D2AC60C6EB1AA3E38F756386C5ED46FDD798279E2
                                                                                      SHA-512:4092ABE45B52C9DE0E259AB741DD7E38C5A5291EA6846D19739C4ABF410151EBD01C5929A8C7AA585A405A4C929CFA17889DB0BD7BBDD5E57DE9D2305A2F67DB
                                                                                      Malicious:false
                                                                                      Preview:..[Buttons]..Minimize=Minimize..Close=Close..Exit=Exit..Help=Help..StartScan=Start Scan..Cancel=Cancel..Details=Details..MoreInfo=More info..Fix=Fix..SelectAll=Select all..DeselectAll=Deselect all..SelectCustom=Select custom..Scan=Scan..Find=Find..Search=Search..Remove=Remove..Save=Save..AddItem=Add item..RemoveItem=Remove item..RemoveItems=Remove items..ClearAll=Clear all..Add=Add..Edit=Edit..Delete=Delete..Back=Back..Next=Next..Refresh=Refresh..CheckAll=Check all..UncheckAll=Uncheck all..SaveClose=Save && Close..OK=OK..No=No..OkThanks=OK, thanks..NoThanks=No, thanks..Yes=Yes..Apply=Apply..Excluded=Excluded....[Actions]..Actions=Actions..Action1=Home..Action2=Clean Up..Action3=Security..Action3Hint=Protect your computer and your personal information..Action4=Toolbox..Action4Hint=Tools and Applications to help you safely manage your computer..Action5=Optimize..Action5a=Optimization..Action5Hint=Check for ways to optimize your PC..Action6=Settings..Action6a=Program settings....[Messages
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:MS Windows HtmlHelp Data
                                                                                      Category:dropped
                                                                                      Size (bytes):37246
                                                                                      Entropy (8bit):7.072071227239875
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:SYXuFRuS16AA/Z2J2POjPgPmYHXtCclZbD:SYenuSIRIJ2yDY3tCclZ3
                                                                                      MD5:E99B7A1AEED3EDDED1C4BBE40DBB7748
                                                                                      SHA1:178EB6DB86E0E755B506B60CD64BF0DC5DA142B4
                                                                                      SHA-256:DC65D3C6901F681E66407A8FCEA2EC101CF7911AF33CC2F32D4BB027257275BB
                                                                                      SHA-512:47BF20DE91A177F6A513DAF3A11613D35ECC0EED1899AE58C4695FEDAACC88881665A0B63F3953C49DEA3BD57091918A80301BBAB03AFB0979A84049F3BD75F5
                                                                                      Malicious:false
                                                                                      Preview:ITSF....`.......^[........|.{.......".....|.{......."..`.......(.......*q......T ......................~.......................,...................j..].!......."..T.....................U.n.c.o.m.p.r.e.s.s.e.d.....M.S.C.o.m.p.r.e.s.s.e.d...{.7.F.C.2.8.9.4.0.-.9.D.3.1.-.1.1.D.0.............LZXC..........................!up4..o.....cf.B{..M....1lm.....3......n...vw....L...z-.%T.=.%|.*C.....Q F..4#.V.......}.{...o.....IM.....U..s...[..n.nZs..7mU.j..J...i........,C2....X.....B..?........!..n...-.,.....8..9a...S.F>...w.....1..,..qN...J..N.h$........&0.B).=Ht\F..<u.g.7.......'#M.S....&....{......iH.........g.K..T....l.......<.N...N......r..&....|.$Q.q.c.....w.NNBu...O""....|..*............~...*.. .M....-...j1......r.w.b...U.olS~..&9.~..3/.P.K.9...{a..8.......Z.Q@...P.@.....`t.qB._.8V..V.+0i.P....Uf.L......L..804.PtU.PL..)..1..Vg.8PD&...i....fq....P.6.cE....p.qP.^....4.-.Q....<.1..`.B..Q....OJ..m*z..E .....J.......H..R....D.._.h.Lq....a.....F.@%.X .Q..5..TF....g.k...F
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3011000, page size 1024, file counter 3, database pages 1069, cookie 0x18, schema 4, UTF-8, version-valid-for 3
                                                                                      Category:dropped
                                                                                      Size (bytes):1094656
                                                                                      Entropy (8bit):6.128977552298963
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:WY8IyylDzjpmRFQn0g5cqhJWT2mZws7noPrbLT:JrlhyLu
                                                                                      MD5:DDBBFDA211ED1460D616A48FE1EF9676
                                                                                      SHA1:5306FBA67448AB0C1C3E55808D13B1F900E82493
                                                                                      SHA-256:B59785F62C26B60CE5D6E30E88946BFFC3D7EB8C0F572359D36985CA8EE4BC48
                                                                                      SHA-512:28CE666FF970741145B26C7850DA551FFF4BEE95881981637C877E82E10A2AEDA2304FE7580AC06FE3CDE175BC51C97502060769B7FA358EB2F82126A520ED38
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ .......-.................................................................-.......x..x...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................atablestartupstartup.CREATE TABLE startup (id integer PRIMARY KEY, file varchar(40), title varchar(40),
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):5051136
                                                                                      Entropy (8bit):6.701398349056225
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:BE8NPv7SyRiqA3MmraHCP1BJyi8p2i2wLJnX3Se:e8N5JT
                                                                                      MD5:ADBB7F96A4A14023CE27D2F8D6710736
                                                                                      SHA1:314642F41F1C74A1E3BEA362CA408F15809ACF4D
                                                                                      SHA-256:01DBE551409B6514B41CF2284F6261F08C0A4AAB70C31E0078DFA2D431A79800
                                                                                      SHA-512:ED2167A59C0EB5B2400AB037BB76B416941FF0A1620CABE0A5FC5A0B86A01801D09D042917761779991D4C5780F4C30FB50F59FBA161B36489B5E53BDE6A3243
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 4%
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...+.af................. :..........$:......@:...@...........................M.....H.M...@......@...................0=.......<..;....B...............L..-...`=.pR...........................P=.....................L.<...... =......................text.....9.......9................. ..`.itext...A....9..B....9............. ..`.data........@:......$:.............@....bss.....z...`<..........................idata...;....<..<...@<.............@....didata...... =......|<.............@....edata.......0=.......<.............@..@.tls....X....@=..........................rdata..]....P=.......<.............@..@.reloc..pR...`=..T....<.............@..B.rsrc.........B.......A.............@..@..............M.......L.............@..@................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):3317
                                                                                      Entropy (8bit):4.908513539175229
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:zXOk/Ty2JCNSwdT4BaA+Gm8Rfcyz0U+fs1qV:zXOkBJCIwdTA+GQK0U+fs1+
                                                                                      MD5:21BC09207F237DD262112401584E3B8F
                                                                                      SHA1:7AA202D5D392E9C3B04C0113381D165A3B12FF61
                                                                                      SHA-256:95D33968B745174744E07207E8003B8A615E1BC5E10676A2F4E81F3E5ABF4980
                                                                                      SHA-512:EF11CEFD953FB0FA91931B81400438A4C38C65B05A7581F8343CC3F7EF0FA0AEBA9DFEC68F7862DCA5C06783A104F8FB47852D84CCB4A8A7C9DE94799B1A3FB7
                                                                                      Malicious:false
                                                                                      Preview:WwanSvc..wudfsvc..wuauserv..WSService..WSearch..wscsvc..WPDBusEnum..WPCSvc..WMPNetworkSvc..wmiApSrv..wlidsvc..WlanSvc..WinRM..Winmgmt..WinHttpAutoProxySvc..WinDefend..WiaRpc..WerSvc..wercplsupport..Wecsvc..WebClient..WdiSystemHost..WdiServiceHost..WcsPlugInService..wcncsvc..Wcmsvc..WbioSrvc..wbengine..W32Time..VSS..vmicvss..vmictimesync..vmicshutdown..vmicrdv..vmickvpexchange..vmicheartbeat..vds..VaultSvc..upnphost..UmRdpService..UI0Detect..TrustedInstaller..TrkWks..TimeBroker..THREADORDER..Themes..TermService..TapiSrv..TabletInputService..SystemEventsBroker..SysMain..swprv..svsvc..StorSvc..stisvc..SstpSvc..SSDPSRV..sppsvc..Spooler..SNMPTRAP..ShellHWDetection..SharedAccess..SessionEnv..SensrSvc..SENS..seclogon..SDRSVC..SCPolicySvc..Schedule..SCardSvr..SamSs..RpcSs..RpcLocator..RpcEptMapper..RemoteRegistry..RemoteAccess..RasMan..RasAuto..QWAVE..ProfSvc..PrintNotify..Power..PolicyAgent..PNRPsvc..PNRPAutoReg..PlugPlay..pla..PerfHost..PeerDistSvc..PcaSvc..p2psvc..p2pimsvc..nsi..NlaSvc..Net
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):654560
                                                                                      Entropy (8bit):6.524736583462048
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:geONzd6F2nsCwZ+yPyCGwRGcdMoWOtg2JW8eM86K4KjttxxdIyX:ghRnsCwZ+yPRRGCvWh2/986KJdIyX
                                                                                      MD5:F9E1E4CC550481C83819EF06DEE3FF51
                                                                                      SHA1:1A4E6DA60A53051E5FA43855B8D0DB9E4B185F54
                                                                                      SHA-256:AEB2B1323262524FE1C313E2265E3314346FF988A4902E4A50EFFA18C93C28DC
                                                                                      SHA-512:59AC4F79B8C7AA88D8C1C01813CDB3F36596FA4442716805860C1233EC13CFA3F998D9124B2A1253D83A5F210170B787AF051B7D3BF11263102CDE59895862A8
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....R.j..2......!................X..............`.........................0............... .................................L.... ...................-.......'......................................................p............................text...h...........................`.0`.data...............................@.@..rdata..\...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................,..............@..B/77..................:..............@..B/89..................F..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):357381
                                                                                      Entropy (8bit):5.041504026663943
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:41LPwkFKOwigTWlekAVZrtZR+JZ+TSPLJ+C/YQICk5QTWuORT3R1bavX+9oMsv3o:8PwkFKuAVBtrwnJ+C/YOORzR5qF43T
                                                                                      MD5:1276E1DAB8F69BF8730FE2598059338C
                                                                                      SHA1:CD8E127E154DE44574AB9FE391338E8834EA4C9E
                                                                                      SHA-256:C21419FB42DFB8422AA07EBAFC1F68CE5BFA51032307F4AB1364BDE4AF91E2A3
                                                                                      SHA-512:B6BAB548BC2839BE718F2415AED940FE40A634E3710BF1B08AEE94A2A6F4E3AA255C7FB87A8A78CF47163CB70B4A50D754DE13643103C8C769E9469606076969
                                                                                      Malicious:false
                                                                                      Preview:Obnf$Qvcmjtifs$Wfstjpo$Ibti!JE$Sfdpnnfoe!up!Sfnpwf$Opu!po!Bqq!Tupsf$Ofhbujwf!Gffecbdl$Tfbsdi!Npofuj{bujpo$BqqFtuffn..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41392$kcmedpnggpknllkccmidfcfjdcodnkqg$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:2$fpdoopbdlpekbhecbpeeikclqkbcjnfe$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:5/2:/25:1:$plneloifkkjjdildqqpqqebloflkflpb$2$1$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41392$fpdoopbdlpekbhecbpeeikclqkbcjnfe$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:2$jpipqcnckgomdknngcghfemndfmcgkmj$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41398$mhgfigcopgjggmbeeodphgpcjnfbmplq$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:2$cnkcgnpgjfijhkidqbpcigpqofmboecp$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/29:/29/41799$jmnfiqnhpepjqffdjikccbdjfpoegbbi$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/295/28/46799$mhgfigcopgjggmbeeodphgpcjnfbmplq$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:1$ihbempeefnqnfnfjooqnigpqlmijbfei$2$2$2$2$..Tfbsdi!Fyufotjpo!cz!Btl$$61/2:2/29/714:1$cl
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3008002, file counter 46, database pages 495, cookie 0x23, schema 4, UTF-8, version-valid-for 46
                                                                                      Category:dropped
                                                                                      Size (bytes):2027520
                                                                                      Entropy (8bit):6.455599348180268
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:XKaOirx5nZSp0LzifuUPLdDw59bnCqDgEShLMCgktSVvIQ/w+8/FsIYcoiyslcTC:UgOQ21
                                                                                      MD5:415E63A17BBA38C2B207DCEB9E04550C
                                                                                      SHA1:0D6480A332ED099A0B501DBF3DD2965E6B527CA6
                                                                                      SHA-256:270A6B73FFFAA59FD1247544C7474C6AD522E845ECB3D6B19C7761781A800E9D
                                                                                      SHA-512:8089A138625E941E9744CEAE83EF90848D9E8FD10732D911B31B0B50CD60DC5BE6D901F778BD6CF079D7E788B9E9A66B88E37D3711D5E7DFF89982950BD2BA3F
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ...................#.....................................................-........T..j.......7.....m.....@...E.....T............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:SQLite Rollback Journal
                                                                                      Category:dropped
                                                                                      Size (bytes):2031992
                                                                                      Entropy (8bit):6.457872687023359
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:1c3Oa81U6E0/GrzXRMJz3xBPRZbbfbkGES+LRm121R+DD04MimFMYxS3XCHS5Kcz:ahEppN
                                                                                      MD5:36F75364C2AB5E357402BE1988FDA94F
                                                                                      SHA1:1D9D179A270CA582F379AA80A232B2B0EAE15230
                                                                                      SHA-256:E8C7CC4D514DC4B4815802F145D43589B7C92A1CE9C7E3CABDDEF0AFA2FCCDDF
                                                                                      SHA-512:90ED3D3608A4AB73595AF20572A173374A059429C582381EA51C5B87D5BF9573ABDBBC764D1785A27BB38F19ABE988F8857BC36307C95E709CC31BE92340DC4E
                                                                                      Malicious:false
                                                                                      Preview:.... .c.....5\......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ ...-..............."...................................................-.-........T..j.......7.....m.....@...E.....T........................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):654560
                                                                                      Entropy (8bit):6.524736583462048
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:geONzd6F2nsCwZ+yPyCGwRGcdMoWOtg2JW8eM86K4KjttxxdIyX:ghRnsCwZ+yPRRGCvWh2/986KJdIyX
                                                                                      MD5:F9E1E4CC550481C83819EF06DEE3FF51
                                                                                      SHA1:1A4E6DA60A53051E5FA43855B8D0DB9E4B185F54
                                                                                      SHA-256:AEB2B1323262524FE1C313E2265E3314346FF988A4902E4A50EFFA18C93C28DC
                                                                                      SHA-512:59AC4F79B8C7AA88D8C1C01813CDB3F36596FA4442716805860C1233EC13CFA3F998D9124B2A1253D83A5F210170B787AF051B7D3BF11263102CDE59895862A8
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....R.j..2......!................X..............`.........................0............... .................................L.... ...................-.......'......................................................p............................text...h...........................`.0`.data...............................@.@..rdata..\...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................,..............@..B/77..................:..............@..B/89..................F..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:InnoSetup Log Smart PC Optimizer, version 0x418, 33246 bytes, 320946\37\user, C:\Program Files (x86)\Smart PC Solutions\
                                                                                      Category:modified
                                                                                      Size (bytes):33246
                                                                                      Entropy (8bit):3.8997702583844545
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:fbHEnXSu0b7uVuOFfl8iZyQezhBbPIBr3BgaZgvpHY:fbmSrQEbyJ
                                                                                      MD5:7C05B13836C2B2219CA187FFD552A940
                                                                                      SHA1:992DEF1DD038834637A5CCC68CA2C24E81DEF529
                                                                                      SHA-256:49BF80B66F4D73E9B35F6E22195909D0070572CDAB0E61F148B27FC9C161CD7D
                                                                                      SHA-512:EBC62B752CAD6C6C805E1D69C210099B8BE047D608117201DA5FDC4484F18B75B5B8F9ECEB1991521F4B185D3237946CA37C921069901991DA69F0282426B853
                                                                                      Malicious:false
                                                                                      Preview:Inno Setup Uninstall Log (b)....................................Smart PC Optimizer..............................................................................................................Smart PC Optimizer..................................................................................................................%...................................................................................................................................'}...............3.2.0.9.4.6......f.r.o.n.t.d.e.s.k......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.\.S.m.a.r.t. .P.C. .O.p.t.i.m.i.z.e.r....................{.. .....6i......IFPS....>...b....................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TMAINFORM....TMAINFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):3211008
                                                                                      Entropy (8bit):6.3336734602472395
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:TWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbQ333TYI:ttLutqgwh4NYxtJpkxhGj333Tr
                                                                                      MD5:023C73AD61BF1C58697C2C09C09E521F
                                                                                      SHA1:E822900B983141C031552C6F8D5AAC97715E1C92
                                                                                      SHA-256:E84F27FDDEA22C9B4A3F70017E560659BFBE66845AE451CDCA5F9EBD0EC910F4
                                                                                      SHA-512:2D973D9D056C96CB277D477862823BC5E2E382FD387186B205246CC668B12EF0579942481801F44444F2D54462D9D470D59F556DE6E334A4F220C255ADB6165F
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,.........hf,......p,...@...........................1.....r.1...@......@....................-.......-..9....................0..-...........................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc.................-.............@..@..............1.......0.............@..@........................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
                                                                                      Category:dropped
                                                                                      Size (bytes):24097
                                                                                      Entropy (8bit):3.2754883918216606
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:b1EjNSCkf3SCqsTr6CCPanAG1tznL7VF+Iqfc51U5YQDztXfbKJG/Bfvg:b1EK6CHr6fSX+7Q1U5YQDztB/B3g
                                                                                      MD5:D3690E7E35CEA79B66D17A069C3B947B
                                                                                      SHA1:CEE595DE103E3E46CEE46D7E303A1B7876E44874
                                                                                      SHA-256:5C3A688B292CE9CD98290BC1F4C525CCF42E3537CA704555C8BF058FDEF10D27
                                                                                      SHA-512:0A198D4A9FEFEA8CBC49AEBB7117CBF65CD85601CCE56896482B4E2A67942095C08127DBDC52A4D86FB07CEC398FB86B2B436DD834B9365E2626D56E5B0E40A2
                                                                                      Malicious:false
                                                                                      Preview:Inno Setup Messages (6.0.0) (u)......................................]..+..... .C.a.n.c.e.l. .i.n.s.t.a.l.l.a.t.i.o.n...S.e.l.e.c.t. .a.c.t.i.o.n...&.I.g.n.o.r.e. .t.h.e. .e.r.r.o.r. .a.n.d. .c.o.n.t.i.n.u.e...&.T.r.y. .a.g.a.i.n...&.A.b.o.u.t. .S.e.t.u.p.........%.1. .v.e.r.s.i.o.n. .%.2.....%.3.........%.1. .h.o.m.e. .p.a.g.e.:.....%.4.....A.b.o.u.t. .S.e.t.u.p...Y.o.u. .m.u.s.t. .b.e. .l.o.g.g.e.d. .i.n. .a.s. .a.n. .a.d.m.i.n.i.s.t.r.a.t.o.r. .w.h.e.n. .i.n.s.t.a.l.l.i.n.g. .t.h.i.s. .p.r.o.g.r.a.m.....T.h.e. .f.o.l.l.o.w.i.n.g. .a.p.p.l.i.c.a.t.i.o.n.s. .a.r.e. .u.s.i.n.g. .f.i.l.e.s. .t.h.a.t. .n.e.e.d. .t.o. .b.e. .u.p.d.a.t.e.d. .b.y. .S.e.t.u.p... .I.t. .i.s. .r.e.c.o.m.m.e.n.d.e.d. .t.h.a.t. .y.o.u. .a.l.l.o.w. .S.e.t.u.p. .t.o. .a.u.t.o.m.a.t.i.c.a.l.l.y. .c.l.o.s.e. .t.h.e.s.e. .a.p.p.l.i.c.a.t.i.o.n.s.....T.h.e. .f.o.l.l.o.w.i.n.g. .a.p.p.l.i.c.a.t.i.o.n.s. .a.r.e. .u.s.i.n.g. .f.i.l.e.s. .t.h.a.t. .n.e.e.d. .t.o. .b.e. .u.p.d.a.t.e.d. .b.y. .S.e.t.u.p... .I.t. .i.s. .r.e.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Nov 1 15:29:11 2024, mtime=Fri Nov 1 15:29:12 2024, atime=Thu Jun 6 16:01:34 2024, length=10108672, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):1413
                                                                                      Entropy (8bit):4.5719077343642045
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8mhMIEydOEAnlm2QUfwl9q0Ov0AJ7uCA/v85d02QUU0GsuDd02QUU0YUU3uFJBJn:8mhMbydORncJqwyV0AVO/vsd0JN4yd0T
                                                                                      MD5:106E197BB2C9288642016F99DC61569E
                                                                                      SHA1:2C8EB6208A7045F07315D42136708940AB89486B
                                                                                      SHA-256:5937A33F41AAD0AA6682B3352EE29A10341D3F1CF495354CFE77114BB2830542
                                                                                      SHA-512:DC969308E8641944BE290007AB3160B78B9903E3FE1C8E30047FD19090A40C99589BEDC4D9EF385937475F0E20837F3C7C9349182637345F00D2349E3F6982C9
                                                                                      Malicious:false
                                                                                      Preview:L..................F.... ...WT..{,...4/{,....v/3....?...........................P.O. .:i.....+00.../C:\.....................1.....aY....PROGRA~2.........O.IaY......................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....n.1.....aY....SMARTP~1..V......aY..aY......G.........................S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.....n.1.....aY....SMARTP~1..V......aY..aY......H......................<..S.m.a.r.t. .P.C. .O.p.t.i.m.i.z.e.r.....v.2..?...X1. .SMARTP~1.EXE..Z......aY..aY................................S.m.a.r.t.P.C.O.p.t.i.m.i.z.e.r...e.x.e.......................-...........................C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe..`.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.\.S.m.a.r.t. .P.C. .O.p.t.i.m.i.z.e.r.\.S.m.a.r.t.P.C.O.p.t.i.m.i.z.e.r...e.x.e.<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.m.a.r.t. .P.C
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Nov 1 15:29:11 2024, mtime=Fri Nov 1 15:29:11 2024, atime=Fri Nov 1 15:29:06 2024, length=3211008, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):1373
                                                                                      Entropy (8bit):4.57801314265715
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8mU7MIEydOEAnlm2QUfwl9q0Nv0n8MhsUAnv8eid02QUU0+xd02QUU0YUU3uuTJA:8mU7MbydORncJqwyi0Kjnvgd0JN1xd0/
                                                                                      MD5:22171A6220F37FE86C385E7499BFB3B2
                                                                                      SHA1:CC14D7C1472068E2C903ECB1BA3E107543D1C946
                                                                                      SHA-256:4B2DB8C53F29398E974847DCCA1A5D2D84043D26D12CFE14CE69A2D244E996F8
                                                                                      SHA-512:4AD7D56AFDF1D5B4A3F2CA43936F72924A797CAF94C4A8AF7FC7F4B7BA03F3271CC07AE2AE6C1137C1958EC9CF4D5D3FA318231F262F93A14170186B9A515992
                                                                                      Malicious:false
                                                                                      Preview:L..................F.... ...m...{,..m...{,..U..+{,....0..........................P.O. .:i.....+00.../C:\.....................1.....aY....PROGRA~2.........O.IaY......................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....n.1.....aY....SMARTP~1..V......aY..aY......G.........................S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.....n.1.....aY....SMARTP~1..V......aY..aY......H......................<..S.m.a.r.t. .P.C. .O.p.t.i.m.i.z.e.r.....f.2...0.aY.. .unins000.exe..J......aY..aY......J.........................u.n.i.n.s.0.0.0...e.x.e.......x...............-.......w...................C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\unins000.exe..X.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.\.S.m.a.r.t. .P.C. .O.p.t.i.m.i.z.e.r.\.u.n.i.n.s.0.0.0...e.x.e.<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.\.S.m.a.r.t. .P.C.
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):245
                                                                                      Entropy (8bit):4.2187986967942805
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:I6DRnGNKyZCvM30eDKyZTeToj5K4YIKZ8x:I6DRnGNT0EXZTekj5o9ZI
                                                                                      MD5:F64C612CF669E719DFABC162FBDD61E5
                                                                                      SHA1:A3018CAAD39AB800F8F7E5DF6B7DE136E873E5D6
                                                                                      SHA-256:A193F2EBA15CEF7FE439E4F0292AF90BD46EEE89730BD390E04C365F3E62DEB4
                                                                                      SHA-512:62922CE844B4B4285D6EB30B7515FC0F1C6552D5825AAA33D2D9CDC091D68CFD503C2D521BC3E26765DF0600652487532F9CE8AB788F9931BF1CDD7BD045CEC2
                                                                                      Malicious:false
                                                                                      Preview:google.com..gmail.com..youtube.com..aol.com..bing.com..yahoo.com..login.live..outlook.com..microsoft.com..twitter.com..facebook.com..instagram.com..linkedin.com..paypal.com..netflix.com..fatmedia.io..doubleclick.net..clarity.ms..pchelpsoft.com..
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1050
                                                                                      Entropy (8bit):4.544556686156469
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:KqxHibUFGQSU6ifMyQW6wGtTwpTdTiToZT+T6rLTA:KqxHI4l2woTcTdTiTUT+T6rLTA
                                                                                      MD5:82B0C12AFC82BB2CE9FE25055032012A
                                                                                      SHA1:C1686583E644F810495B49FFDDE585AB53F5AE1E
                                                                                      SHA-256:C1DB4573E9D2A9C4FED3AF2B14214C2A1A38DB79FC72A77BD5239FC2C6C561B6
                                                                                      SHA-512:EA825B3E8D3877E94FE3F6D14026E9C45F4F4B4CFF7FDDA7E935A23456289D8891D234AD0E72A04ACED9D0A79610C94C270CC073E82FA2564FAC41551C95684B
                                                                                      Malicious:false
                                                                                      Preview:bhsffnfou>Bhsffnfout..bhsffnfout>Bhsffnfout..cfofgjdjbsjft>Bhsffnfout..cfofgjdjbsz>Bhsffnfout..dpousbdut>Bhsffnfout..dpousbdu>Bhsffnfout..dpogjefoujbm>Bhsffnfout..mbtu!xjmm!boe!uftubnfou>Bhsffnfout..mbtu!xjmm>Bhsffnfout..cboljoh>Gjobodjbm..cbolt>Gjobodjbm..cbol>Gjobodjbm..cvehfufe>Gjobodjbm..cvehfut>Gjobodjbm..cvehfu>Gjobodjbm..efcut>Gjobodjbm..efcu>Gjobodjbm..gvoe>Gjobodjbm..qbzdifdlt>Gjobodjbm..qbzdifdl>Gjobodjbm..ubyft>Gjobodjbm..uby>Gjobodjbm..dsfeju!dbset>Gjobodjbm..dsfeju!dbse>Gjobodjbm..ejsfdu!efqptjut>Gjobodjbm..ejsfdu!efqptju>Gjobodjbm..OOOO.OOOO.OOOO.OOOO>Gjobodjbm..OOOO!OOOO!OOOO!OOOO>Gjobodjbm..OOOO!OOOOOO!OOOOO>Gjobodjbm..OOOO.OOOOOO.OOOOO>Gjobodjbm..OOO.OO.OOOO>Gjobodjbm..OOO!OO!OOOO>Gjobodjbm..21:6.b>Gjobodjbm..2151>Gjobodjbm..21::>Gjobodjbm..21:9>Gjobodjbm..x.5>Gjobodjbm..x.3>Gjobodjbm..l.2>Gjobodjbm..x5>Gjobodjbm..x3>Gjobodjbm..l2>Gjobodjbm..qbttxpset>QfstpobmJEt..qbttxpse>QfstpobmJEt..tpdjbm!tfdvsjuz>QfstpobmJEt..tto>QfstpobmJEt..esjwfs!mjdfotft>QfstpobmJEt..esjwfs!mj
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):4351
                                                                                      Entropy (8bit):4.401618076790458
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:kxXH+TBvERKDzCxLg+lQm+zHj6DnojA4MCBhqmhEWl7GMCdM9:kReFE0DzgMn3zD6DnomCZhEWl7GMGe
                                                                                      MD5:023938522A2335379044391C1B83656A
                                                                                      SHA1:1761B2DCADB48689C7C052393490043E050E5FEA
                                                                                      SHA-256:66AAE467EF3636628B6EB4C4DC2E210990BB6440653CC3AAFB7800B89A8DA1EC
                                                                                      SHA-512:0F88726EE74A9D51DFD888120D0E0DC1C66949374388EF4A394B4A2CD59056DBADA68FE75929F4374B4441CFD8B8100E5EDFAAA2982DBA9F02D0322F1D1DD389
                                                                                      Malicious:false
                                                                                      Preview:abc.es..actualidad.rt.com..ad.nl..adaware.com..alibaba.com..allrecipes.com..apost.com..apps.facebook.com..ar.pinterest.com..as.com..asahi.com..assure.ameli.fr..atrapalo.com..atrapalo.com.ar..aujardin.info..auto-doc.fr..auto-doc.it..auto-motor-und-sport.de..autodoc.de..autodoc.es..autoparti.it..badoo.com..banggood.com..bestday.com.ar..bilibili.com..blog.giallozafferano.it..bolavip.com..bonial.fr..book.lufthansa.com..boxil.jp..br.pinterest.com..brigitte.de..businessinsider.de..calendar.google.com..canaltech.com.br..case.trovit.it..cbssports.com..chinatimes.com..cnet.com..comingsoon.it..commonhealth.com.tw..computerbild.de..conforama.fr..consoglobe.com..cronica.com.ar..cw.com.tw..dafiti.com.br..daily.co.jp..dailymail.co.uk..derwesten.de..diariosur.es..digitaltrends.com..dn.pt..donnamoderna.com..dresslily.com..drive.google.com..duo.google.com..duolingo.com..ecologiaverde.com..economia.uol.com.br..elcorreo.com..elindependiente.com..ellitoral.com..elperiodico.com..endesaclientes.com..erecipe
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x22, schema 4, UTF-8, version-valid-for 1
                                                                                      Category:dropped
                                                                                      Size (bytes):2027520
                                                                                      Entropy (8bit):6.455601944033047
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:KKaOirx5nZSp0LzifuUPLdDw59bnCqDgEShLMCgktSVvIQ/w+8/FsIYcoiyslcTC:tgOQ21
                                                                                      MD5:39DAEC1A439D82D3DED30B9372A25D8E
                                                                                      SHA1:A4BB3070C55E9A13D22321FFF09F7A00FBEB98F6
                                                                                      SHA-256:D7885200FC906E6580EA5506E1EC9B0A13E4D94A5A406013F3F1991A2063E3D2
                                                                                      SHA-512:2B8222F3115FDD9A1801140B2008C1FF21BA1B39526AC686BD6E75D72F876BE4E3535D8720140AACB93EEB05F99430D4F1A6FBA318D91C213620C4CBD34A66C8
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ...................".....................................................-........T..j.......7.....m.....@...E.....T............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):16400
                                                                                      Entropy (8bit):0.03467525285055763
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:b/fllL1XllFNllTqC/tlWnIEgnC:b/5SnIEgnC
                                                                                      MD5:1122208AF2D352167F66EC0913A91F34
                                                                                      SHA1:74C9D318C5B50479B290E108CEE7D70A54823E5D
                                                                                      SHA-256:9EDBC6A561D9CF28B055EE0B62F80184B1EDDBA744089724D09D1703B764156B
                                                                                      SHA-512:DA9711241D9BA44AB110107766FDB5C5DFE7586800B9604A1DB93BF483A2843AEDE388DA34D8C25B8BB0F5F07A36A2F92FE5F7EE6CC6E4B9D314E33FEBE5CDAF
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):16400
                                                                                      Entropy (8bit):0.03467525285055763
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:b/fllL1XllFNllTqC/tlWnIEgnC:b/5SnIEgnC
                                                                                      MD5:1122208AF2D352167F66EC0913A91F34
                                                                                      SHA1:74C9D318C5B50479B290E108CEE7D70A54823E5D
                                                                                      SHA-256:9EDBC6A561D9CF28B055EE0B62F80184B1EDDBA744089724D09D1703B764156B
                                                                                      SHA-512:DA9711241D9BA44AB110107766FDB5C5DFE7586800B9604A1DB93BF483A2843AEDE388DA34D8C25B8BB0F5F07A36A2F92FE5F7EE6CC6E4B9D314E33FEBE5CDAF
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x23, schema 4, UTF-8, version-valid-for 1
                                                                                      Category:dropped
                                                                                      Size (bytes):2027520
                                                                                      Entropy (8bit):6.455601526304985
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:nKaOirx5nZSp0LzifuUPLdDw59bnCqDgEShLMCgktSVvIQ/w+8/FsIYcoiyslcTC:EgOQ21
                                                                                      MD5:8108FF72256D8DFC8C250AC9ED870463
                                                                                      SHA1:FFFB7E801277C1A5C9A3B7D1AFF68AFB8BA98650
                                                                                      SHA-256:136A90F2EBE90204F40FF3CC766BEE5A507266FB905F60A85BB758A159681055
                                                                                      SHA-512:C1B224E1F0668C2A67D1D68655A1E2434E692F8820A7A69B17362C2EAACE20C9E52ADB4583A30320766579E7E783869912D58CB6CFF72F3BAD8023D5205F61AC
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ...................#.....................................................-........T..j.......7.....m.....@...E.....T............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):16400
                                                                                      Entropy (8bit):0.03467525285055763
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:b/fllL1XllFNllTqC/tlWnIEgnC:b/5SnIEgnC
                                                                                      MD5:1122208AF2D352167F66EC0913A91F34
                                                                                      SHA1:74C9D318C5B50479B290E108CEE7D70A54823E5D
                                                                                      SHA-256:9EDBC6A561D9CF28B055EE0B62F80184B1EDDBA744089724D09D1703B764156B
                                                                                      SHA-512:DA9711241D9BA44AB110107766FDB5C5DFE7586800B9604A1DB93BF483A2843AEDE388DA34D8C25B8BB0F5F07A36A2F92FE5F7EE6CC6E4B9D314E33FEBE5CDAF
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):512
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                      Malicious:false
                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):16400
                                                                                      Entropy (8bit):0.03467525285055763
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:b/fllL1XllFNllTqC/tlWnIEgnC:b/5SnIEgnC
                                                                                      MD5:1122208AF2D352167F66EC0913A91F34
                                                                                      SHA1:74C9D318C5B50479B290E108CEE7D70A54823E5D
                                                                                      SHA-256:9EDBC6A561D9CF28B055EE0B62F80184B1EDDBA744089724D09D1703B764156B
                                                                                      SHA-512:DA9711241D9BA44AB110107766FDB5C5DFE7586800B9604A1DB93BF483A2843AEDE388DA34D8C25B8BB0F5F07A36A2F92FE5F7EE6CC6E4B9D314E33FEBE5CDAF
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x21, schema 4, UTF-8, version-valid-for 1
                                                                                      Category:dropped
                                                                                      Size (bytes):2027520
                                                                                      Entropy (8bit):6.4556016995225445
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:RKaOirx5nZSp0LzifuUPLdDw59bnCqDgEShLMCgktSVvIQ/w+8/FsIYcoiyslcTC:+gOQ21
                                                                                      MD5:B7575E2B4470A702FE78EBFB18BFB458
                                                                                      SHA1:3A43F30648948B7EE08E462BA262237598024D40
                                                                                      SHA-256:84917F6AED199D216BEC15215D3C69A9EE7AAA3B9810E0F87DE44EDCDB26E47C
                                                                                      SHA-512:29911DDB80EBE045CBB158C7AFD846B9FEEDA47F5A762F799F1EA0CE8EEF9EBACA60098EBE066A870E9BEACBB22D85C7AFA758C836696BAC66EE0497473B07DD
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ...................!.....................................................-........T..j.......7.....m.....@...E.....T............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3008002, file counter 1, database pages 495, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                                                                      Category:dropped
                                                                                      Size (bytes):2027520
                                                                                      Entropy (8bit):6.455599440633062
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:UKaOirx5nZSp0LzifuUPLdDw59bnCqDgEShLMCgktSVvIQ/w+8/FsIYcoiyslcTC:HgOQ21
                                                                                      MD5:7A8AC3C157F6196C8059B089CE2D5F67
                                                                                      SHA1:C0A2368AA4ACCB2980B22F5C256A03AF5B42C892
                                                                                      SHA-256:BBD601A6B845607D55DF95D9E29BA9CEF7D12C6167534A022355E1F7EDB9C29F
                                                                                      SHA-512:F1C0317185BC919CC02316E7D0B4EA0AEE1E65186A6BFF69FDC313B00E81CE97B1D1A1E4FE147A974735398BB5F3284CD0E00E7E963FAB97812971850C84BB4A
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ................... .....................................................-........T..j.......7.....m.....@...E.....T............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
                                                                                      Category:dropped
                                                                                      Size (bytes):171
                                                                                      Entropy (8bit):6.195005424838259
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:yionv//thPlrptjT2+yxkTE8Vu3Sfu7vVmEIpv7T686Ssn8pziJDUogp0mbih984:6v/lhPOezo3SG7NzUv72Rn8pzFp0mbih
                                                                                      MD5:95A48DE3F4B96BBCADE12FFE75EFD3D1
                                                                                      SHA1:A86189ABB2B1759788634F2BE074B3C5A9020C6D
                                                                                      SHA-256:480AC0C12BC05BDB2ECE058A59CC72EFAD0BA2943A65653327FF4E8C475CFFB9
                                                                                      SHA-512:7A0A898F1EC859F8D35BCBFE726A573A6125DC6D129EC8E1786D18E4E9322E38ADAFC51C51F883F7B559F1869E8DA434EF76DF31F80235BD9F0432474EC0C8CE
                                                                                      Malicious:false
                                                                                      Preview:.PNG........IHDR..............l;...rIDATx.c...va``H..P...@<..h.**..7.d..*......k...IX0.!?.....v.....<..a.w..........g.f.3...zaL..#l.@.L>....j.Ie....sw..[.....IEND.B`.
                                                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:modified
                                                                                      Size (bytes):3211008
                                                                                      Entropy (8bit):6.3336734602472395
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:TWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbQ333TYI:ttLutqgwh4NYxtJpkxhGj333Tr
                                                                                      MD5:023C73AD61BF1C58697C2C09C09E521F
                                                                                      SHA1:E822900B983141C031552C6F8D5AAC97715E1C92
                                                                                      SHA-256:E84F27FDDEA22C9B4A3F70017E560659BFBE66845AE451CDCA5F9EBD0EC910F4
                                                                                      SHA-512:2D973D9D056C96CB277D477862823BC5E2E382FD387186B205246CC668B12EF0579942481801F44444F2D54462D9D470D59F556DE6E334A4F220C255ADB6165F
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......c.................L,.........hf,......p,...@...........................1.....r.1...@......@....................-.......-..9....................0..-...........................................................-.......-......................text.... ,......",................. ..`.itext...(...@,..*...&,............. ..`.data...X....p,......P,.............@....bss.....y....-..........................idata...9....-..:....,.............@....didata.......-.......-.............@....edata........-......*-.............@..@.tls....L.....-..........................rdata..]............,-.............@..@.rsrc.................-.............@..@..............1.......0.............@..@........................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PC bitmap, Windows 3.x format, 453 x 56 x 24, image size 76162, resolution 2834 x 2834 px/m, cbSize 76216, bits offset 54
                                                                                      Category:dropped
                                                                                      Size (bytes):76216
                                                                                      Entropy (8bit):1.4866841797765298
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:PS3l3rGs8r4nAFsqEmVsT0uvsXLZ3WEs6N2wshIws1KUds8oxcmUZsNQnQE457WY:PS3lbGs8cNEHA3ahg3hexfYoXhcB
                                                                                      MD5:50A0BC3E462CD65E40D8D0764E3ABF95
                                                                                      SHA1:F3D85A1C527FC5407B2E87192CD1DFBC90660CD2
                                                                                      SHA-256:507AB99656D6E97887B8D0FDDCFA01861B5B690883137523C0758BC4D7324689
                                                                                      SHA-512:54519A1793C900AF71EC3B806C44B4E4F82BCD284067FF7811508926B1AE1267E22E7F6CD6A84775C4A82ED8D0D290F27C9DDE73ABBA46122D3B55D1EA0EAD13
                                                                                      Malicious:false
                                                                                      Preview:BM.)......6...(.......8............)....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):6144
                                                                                      Entropy (8bit):4.720366600008286
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):0.017262956703125623
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                      MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                      SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                      SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                      SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                      Malicious:false
                                                                                      Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      File Type:Generic INItialization configuration [4Edge relevant text changes]
                                                                                      Category:modified
                                                                                      Size (bytes):1380
                                                                                      Entropy (8bit):5.109785653891252
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:aZ+XW8DMrXFYeb+Xj/6vwoYeb+XJNxJZYeb+X2Qu+7sMKQN/8DM5KQNWYeb0KQNu:aAXW8ArXFDb+XjSvlDb+XBrDb+X2Rn6Y
                                                                                      MD5:1AE772A69BE36A0FBB7085A234BD5915
                                                                                      SHA1:4BFB5AB61E1B0973871A0B6DF6FD23B2E2B8328D
                                                                                      SHA-256:D81ADE0B991BFE9EDB82CC2EE89B591E221E05C3446E8B1FE79AFCC817E3891E
                                                                                      SHA-512:ACAD9EDE74C46DC060012DCDAF7B0E7B3E28C4D3F178609AAFB097A1A8EC09F29E7A4A9BDA885DF873D40CE31D8806472902AA6331A321BD3842989E03CC7262
                                                                                      Malicious:false
                                                                                      Preview:[4Google Docs Offline]..Id=ghbmnnjooekpmoecnnnilnnbdlolhkhi..DisplayedPath=Edge Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi..Path=C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\..Profile=Default..PathToFile=C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\manifest.json..Description=Edit, create, and view your documents, spreadsheets, and presentations . all without internet access...Publisher=..Version=..Icon=C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\128.png..Status=Disabled..Owner=4....[4Edge relevant text changes]..Id=jmjflgjpcpepeafmmgdpfkogkghcpiha..DisplayedPath=Edge Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha..Path=C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.0_0\..Profile=Default..PathToFile=C:\U
                                                                                      Process:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):49019
                                                                                      Entropy (8bit):2.641277722462331
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:LSMMMMMMMM5QQQQQQQQ8ddddddddBLgAKoTMKmYrIS:LwQQQQQQQQcLgpoT1mYrB
                                                                                      MD5:F4AFA5826681F7E29B91B87575305AD0
                                                                                      SHA1:9121B3208BEBC6E0A1A12DA728CF3FB63267358D
                                                                                      SHA-256:0EBA5194C1528C2C7771A072CA43AD4143CD0148E76842CD5E1FFCD3778CD8E8
                                                                                      SHA-512:ABF11F5AB7D3E85C55CBF4A4AB3E5B9497DED0BFD06D92AAD7A996D692BE71DFCE43352B3F0766877021EB032B63A18EC26E30A317AF3F3E3D696EF91FA948C2
                                                                                      Malicious:false
                                                                                      Preview:01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:11 [Timer]: --------------------------- Tick ------------------------------- ..01/11/2024 12:30:10 [Timer]: -----------
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri Nov 1 15:29:11 2024, mtime=Fri Nov 1 15:29:11 2024, atime=Thu Jun 6 16:01:34 2024, length=10108672, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):1395
                                                                                      Entropy (8bit):4.591382912783005
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8m5GEvdOEAnlv0O2QUfwl9q0Ov0AJ7uCA/v87ed02QUU0GsuDd02QUU0YUU3uFJP:8m55vdORnB0OJqwyV0AVO/vMed0JN4ya
                                                                                      MD5:776BE252BBF3B6915648B77E98B20489
                                                                                      SHA1:A1307218AC867C39624A942D3421ECBBA4A514F1
                                                                                      SHA-256:B2105D19D1010BA750D6F3A871BD3885E16BFDB5DB0D608C30373AD6FBD102CE
                                                                                      SHA-512:A3EC91F13978792D8DC5118BDCE2896A54C29D85EC1EB002C21F32235F3F74A1DFF72398A8A54A135DC87803F8D92F6EADA407FA19582906791F76B22047C1D7
                                                                                      Malicious:false
                                                                                      Preview:L..................F.... ...WT..{,.....{,....v/3....?...........................P.O. .:i.....+00.../C:\.....................1.....aY....PROGRA~2.........O.IaY......................V.....;...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....n.1.....aY....SMARTP~1..V......aY..aY......G.........................S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.....n.1.....aY....SMARTP~1..V......aY..aY......H......................<..S.m.a.r.t. .P.C. .O.p.t.i.m.i.z.e.r.....v.2..?...X1. .SMARTP~1.EXE..Z......aY..aY................................S.m.a.r.t.P.C.O.p.t.i.m.i.z.e.r...e.x.e.......................-...........................C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe..W.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n.s.\.S.m.a.r.t. .P.C. .O.p.t.i.m.i.z.e.r.\.S.m.a.r.t.P.C.O.p.t.i.m.i.z.e.r...e.x.e.<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.S.m.a.r.t. .P.C. .S.o.l.u.t.i.o.n
                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.932100617954777
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) a (10002005/4) 98.04%
                                                                                      • Inno Setup installer (109748/4) 1.08%
                                                                                      • InstallShield setup (43055/19) 0.42%
                                                                                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                      File name:SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
                                                                                      File size:6'716'192 bytes
                                                                                      MD5:17563cfba0842038f0a8bd7f15c89e2e
                                                                                      SHA1:34b5dbfe3bfcdd033d256fe66c87864bc3c61aaa
                                                                                      SHA256:7ef8b3f4ca7db60e350a0b51dd7c284248a94a073735a25a00f85f9072d48143
                                                                                      SHA512:db072b3dcca9a385f8de292a3df998943b7a1fac3b8a44d1db9b682be003afcbad41ace7950cfb11f099dbeee9e93ee955936af87f09b4bdfeaefee6fab0c534
                                                                                      SSDEEP:196608:OwR2wZV86IxV8dO797AZHX6lgSUk6CspWd:r5V86kV8dOB8ZoZFd
                                                                                      TLSH:A966123BF2A8A13ED56E1B3216B382109577BA61B81A8C0F47FC350DCF765601E3B656
                                                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                      Icon Hash:0c0c2d33ceec80aa
                                                                                      Entrypoint:0x4b5eec
                                                                                      Entrypoint Section:.itext
                                                                                      Digitally signed:true
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x63ECF218 [Wed Feb 15 14:54:16 2023 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:6
                                                                                      OS Version Minor:1
                                                                                      File Version Major:6
                                                                                      File Version Minor:1
                                                                                      Subsystem Version Major:6
                                                                                      Subsystem Version Minor:1
                                                                                      Import Hash:e569e6f445d32ba23766ad67d1e3787f
                                                                                      Signature Valid:true
                                                                                      Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                                                                                      Signature Validation Error:The operation completed successfully
                                                                                      Error Number:0
                                                                                      Not Before, Not After
                                                                                      • 02/04/2024 20:00:00 03/04/2027 19:59:59
                                                                                      Subject Chain
                                                                                      • CN="Smart PC Solutions, Inc.", O="Smart PC Solutions, Inc.", S=Virginia, C=US, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Virginia, OID.1.3.6.1.4.1.311.60.2.1.3=US, SERIALNUMBER=06617963
                                                                                      Version:3
                                                                                      Thumbprint MD5:D75462CA6859BD6C49D8BA18DAA83194
                                                                                      Thumbprint SHA-1:F3C4B2D7A42BFC96528CC64C24E4E608B15DB3E4
                                                                                      Thumbprint SHA-256:9E402A6D5BB9B94685FEBADB1850718EEB68F98C1454EC8414522005BF2942DA
                                                                                      Serial:009CAC973DABD90752F8B50482FF8AE46C
                                                                                      Instruction
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      add esp, FFFFFFA4h
                                                                                      push ebx
                                                                                      push esi
                                                                                      push edi
                                                                                      xor eax, eax
                                                                                      mov dword ptr [ebp-3Ch], eax
                                                                                      mov dword ptr [ebp-40h], eax
                                                                                      mov dword ptr [ebp-5Ch], eax
                                                                                      mov dword ptr [ebp-30h], eax
                                                                                      mov dword ptr [ebp-38h], eax
                                                                                      mov dword ptr [ebp-34h], eax
                                                                                      mov dword ptr [ebp-2Ch], eax
                                                                                      mov dword ptr [ebp-28h], eax
                                                                                      mov dword ptr [ebp-14h], eax
                                                                                      mov eax, 004B14B8h
                                                                                      call 00007F803CB3B145h
                                                                                      xor eax, eax
                                                                                      push ebp
                                                                                      push 004B65E2h
                                                                                      push dword ptr fs:[eax]
                                                                                      mov dword ptr fs:[eax], esp
                                                                                      xor edx, edx
                                                                                      push ebp
                                                                                      push 004B659Eh
                                                                                      push dword ptr fs:[edx]
                                                                                      mov dword ptr fs:[edx], esp
                                                                                      mov eax, dword ptr [004BE634h]
                                                                                      call 00007F803CBDDC37h
                                                                                      call 00007F803CBDD78Ah
                                                                                      lea edx, dword ptr [ebp-14h]
                                                                                      xor eax, eax
                                                                                      call 00007F803CB50BE4h
                                                                                      mov edx, dword ptr [ebp-14h]
                                                                                      mov eax, 004C1D84h
                                                                                      call 00007F803CB35D37h
                                                                                      push 00000002h
                                                                                      push 00000000h
                                                                                      push 00000001h
                                                                                      mov ecx, dword ptr [004C1D84h]
                                                                                      mov dl, 01h
                                                                                      mov eax, dword ptr [004238ECh]
                                                                                      call 00007F803CB51D67h
                                                                                      mov dword ptr [004C1D88h], eax
                                                                                      xor edx, edx
                                                                                      push ebp
                                                                                      push 004B654Ah
                                                                                      push dword ptr fs:[edx]
                                                                                      mov dword ptr fs:[edx], esp
                                                                                      call 00007F803CBDDCBFh
                                                                                      mov dword ptr [004C1D90h], eax
                                                                                      mov eax, dword ptr [004C1D90h]
                                                                                      cmp dword ptr [eax+0Ch], 01h
                                                                                      jne 00007F803CBE3EDAh
                                                                                      mov eax, dword ptr [004C1D90h]
                                                                                      mov edx, 00000028h
                                                                                      call 00007F803CB5265Ch
                                                                                      mov edx, dword ptr [004C1D90h]
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xfdc.idata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x11000.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x664e200x2d00
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xc22f40x254.idata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000xb39e40xb3a0043af0a9476ca224d8e8461f1e22c94daFalse0.34525867693110646data6.357635049994181IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .itext0xb50000x16880x1800185e04b9a1f554e31f7f848515dc890cFalse0.54443359375data5.971425428435973IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .data0xb70000x37a40x3800cab2107c933b696aa5cf0cc6c3fd3980False0.36097935267857145data5.048648594372454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .idata0xc20000xfdc0x1000e7d1635e2624b124cfdce6c360ac21cdFalse0.3798828125data5.029087481102678IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .didata0xc30000x1a40x2008ced971d8a7705c98b173e255d8c9aa7False0.345703125data2.7509822285969876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .edata0xc40000x9a0x2008d4e1e508031afe235bf121c80fd7d5fFalse0.2578125data1.877162954504408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0xc70000x110000x11000f777a13af5bb60a30315fd7de5d17ddaFalse0.1860064338235294data3.695720174861222IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      RT_ICON0xc76780xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.1174924924924925
                                                                                      RT_ICON0xc80e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.15792682926829268
                                                                                      RT_ICON0xc87480x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.23387096774193547
                                                                                      RT_ICON0xc8a300x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.39864864864864863
                                                                                      RT_ICON0xc8b580x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.08339210155148095
                                                                                      RT_ICON0xca1800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.1023454157782516
                                                                                      RT_ICON0xcb0280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.10649819494584838
                                                                                      RT_ICON0xcb8d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.10838150289017341
                                                                                      RT_ICON0xcbe380x12e5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8712011577424024
                                                                                      RT_ICON0xcd1200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.05668398677373642
                                                                                      RT_ICON0xd13480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08475103734439834
                                                                                      RT_ICON0xd38f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.09920262664165103
                                                                                      RT_ICON0xd49980x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2047872340425532
                                                                                      RT_STRING0xd4e000x360data0.34375
                                                                                      RT_STRING0xd51600x260data0.3256578947368421
                                                                                      RT_STRING0xd53c00x45cdata0.4068100358422939
                                                                                      RT_STRING0xd581c0x40cdata0.3754826254826255
                                                                                      RT_STRING0xd5c280x2d4data0.39226519337016574
                                                                                      RT_STRING0xd5efc0xb8data0.6467391304347826
                                                                                      RT_STRING0xd5fb40x9cdata0.6410256410256411
                                                                                      RT_STRING0xd60500x374data0.4230769230769231
                                                                                      RT_STRING0xd63c40x398data0.3358695652173913
                                                                                      RT_STRING0xd675c0x368data0.3795871559633027
                                                                                      RT_STRING0xd6ac40x2a4data0.4275147928994083
                                                                                      RT_RCDATA0xd6d680x10data1.5
                                                                                      RT_RCDATA0xd6d780x2c4data0.6384180790960452
                                                                                      RT_RCDATA0xd703c0x2cdata1.1818181818181819
                                                                                      RT_GROUP_ICON0xd70680xbcdataEnglishUnited States0.6170212765957447
                                                                                      RT_VERSION0xd71240x584dataEnglishUnited States0.26841359773371104
                                                                                      RT_MANIFEST0xd76a80x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                                                                                      DLLImport
                                                                                      kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                                                                      comctl32.dllInitCommonControls
                                                                                      version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                                                                                      user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                                                                      oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                                                                      netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                                                                                      advapi32.dllConvertStringSecurityDescriptorToSecurityDescriptorW, RegQueryValueExW, AdjustTokenPrivileges, GetTokenInformation, ConvertSidToStringSidW, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                                                                                      NameOrdinalAddress
                                                                                      TMethodImplementationIntercept30x4541a8
                                                                                      __dbk_fcall_wrapper20x40d0a0
                                                                                      dbkFCallWrapperAddr10x4be63c
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      EnglishUnited States
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-11-01T17:29:16.753695+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749703116.203.251.147443TCP
                                                                                      2024-11-01T17:29:18.566135+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749705178.63.52.39443TCP
                                                                                      2024-11-01T17:29:19.899521+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749711178.63.52.39443TCP
                                                                                      2024-11-01T17:29:25.352359+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.749730TCP
                                                                                      2024-11-01T17:30:05.474200+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.749947TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Nov 1, 2024 17:29:15.609499931 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:15.609519005 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:15.609591007 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:15.613729000 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:15.613739014 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:16.753603935 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:16.753695011 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:16.816692114 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:16.816698074 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:16.816943884 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:16.971750975 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:16.981013060 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:17.027334929 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:17.607167006 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:17.607228041 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:17.607289076 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:17.608536005 CET49703443192.168.2.7116.203.251.147
                                                                                      Nov 1, 2024 17:29:17.608556986 CET44349703116.203.251.147192.168.2.7
                                                                                      Nov 1, 2024 17:29:17.678333044 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:17.678364992 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:17.678544044 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:17.679006100 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:17.679018021 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.566009998 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.566134930 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:18.568572044 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:18.568578959 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.568824053 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.570744038 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:18.570934057 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:18.570940018 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.849116087 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.972337961 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:18.972349882 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.983035088 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:18.983217955 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.983253002 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.983261108 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:18.983268023 CET44349705178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:18.983331919 CET49705443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.006556988 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.006591082 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:19.006653070 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.007105112 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.007118940 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:19.899439096 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:19.899521112 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.901020050 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.901031017 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:19.901283026 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:19.902559996 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.902673960 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:19.902678013 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:20.175498009 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:20.284801960 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:20.284817934 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:20.286166906 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:20.286196947 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:20.286393881 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:20.286448002 CET44349711178.63.52.39192.168.2.7
                                                                                      Nov 1, 2024 17:29:20.286479950 CET49711443192.168.2.7178.63.52.39
                                                                                      Nov 1, 2024 17:29:20.286530972 CET49711443192.168.2.7178.63.52.39
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Nov 1, 2024 17:29:15.596178055 CET5781953192.168.2.71.1.1.1
                                                                                      Nov 1, 2024 17:29:15.604487896 CET53578191.1.1.1192.168.2.7
                                                                                      Nov 1, 2024 17:29:17.665323973 CET5165253192.168.2.71.1.1.1
                                                                                      Nov 1, 2024 17:29:17.675894976 CET53516521.1.1.1192.168.2.7
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Nov 1, 2024 17:29:15.596178055 CET192.168.2.71.1.1.10x826eStandard query (0)collect.avqtools.comA (IP address)IN (0x0001)false
                                                                                      Nov 1, 2024 17:29:17.665323973 CET192.168.2.71.1.1.10x3234Standard query (0)collect.smartpcupdate.comA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Nov 1, 2024 17:29:15.604487896 CET1.1.1.1192.168.2.70x826eNo error (0)collect.avqtools.com116.203.251.147A (IP address)IN (0x0001)false
                                                                                      Nov 1, 2024 17:29:17.675894976 CET1.1.1.1192.168.2.70x3234No error (0)collect.smartpcupdate.com178.63.52.39A (IP address)IN (0x0001)false
                                                                                      • collect.avqtools.com
                                                                                      • collect.smartpcupdate.com
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.749703116.203.251.1474437476C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-01 16:29:16 UTC119OUTGET /debug.txt HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      User-Agent: Embarcadero URI Client/1.0
                                                                                      Host: collect.avqtools.com
                                                                                      2024-11-01 16:29:17 UTC340INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.16.1
                                                                                      Date: Fri, 01 Nov 2024 16:29:17 GMT
                                                                                      Content-Type: text/plain; charset=utf-8
                                                                                      Content-Length: 0
                                                                                      Connection: close
                                                                                      Last-Modified: Tue, 18 Jun 2024 07:28:27 GMT
                                                                                      ETag: "6671371b-0"
                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      X-Content-Type-Options: nosniff
                                                                                      Accept-Ranges: bytes


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.749705178.63.52.394437476C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-01 16:29:18 UTC212OUTPOST /api/collect HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                      User-Agent: Embarcadero URI Client/1.0
                                                                                      Content-Length: 286
                                                                                      Host: collect.smartpcupdate.com
                                                                                      2024-11-01 16:29:18 UTC286OUTData Raw: 6a 73 6f 6e 3d 25 37 42 25 32 32 63 61 74 65 67 6f 72 79 25 32 32 25 33 41 25 32 32 74 72 61 63 6b 65 72 25 32 32 25 32 43 25 32 32 67 72 6f 75 70 25 32 32 25 33 41 25 32 32 43 6c 65 61 6e 65 72 25 32 32 25 32 43 25 32 32 74 72 61 63 6b 65 72 25 32 32 25 33 41 25 32 32 53 50 4f 39 34 30 37 25 32 32 25 32 43 25 32 32 68 69 64 25 32 32 25 33 41 25 32 32 39 44 34 45 37 30 46 39 33 43 36 30 46 41 38 42 43 32 41 31 44 43 37 30 32 41 44 37 45 43 45 33 25 32 32 25 32 43 25 32 32 70 72 6f 67 72 61 6d 25 32 32 25 33 41 25 32 32 53 6d 61 72 74 2b 50 43 2b 4f 70 74 69 6d 69 7a 65 72 25 32 32 25 32 43 25 32 32 76 65 72 73 69 6f 6e 25 32 32 25 33 41 25 32 32 39 34 30 37 25 32 32 25 32 43 25 32 32 6c 61 6e 67 75 61 67 65 25 32 32 25 33 41 25 32 32 65 6e 25 32 32 25 32
                                                                                      Data Ascii: json=%7B%22category%22%3A%22tracker%22%2C%22group%22%3A%22Cleaner%22%2C%22tracker%22%3A%22SPO9407%22%2C%22hid%22%3A%229D4E70F93C60FA8BC2A1DC702AD7ECE3%22%2C%22program%22%3A%22Smart+PC+Optimizer%22%2C%22version%22%3A%229407%22%2C%22language%22%3A%22en%22%2
                                                                                      2024-11-01 16:29:18 UTC389INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Cache-Control: no-cache, private
                                                                                      Date: Fri, 01 Nov 2024 16:29:18 GMT
                                                                                      X-RateLimit-Limit: 6000
                                                                                      X-RateLimit-Remaining: 5999
                                                                                      Access-Control-Allow-Origin: *
                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      X-Content-Type-Options: nosniff
                                                                                      2024-11-01 16:29:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      2192.168.2.749711178.63.52.394437476C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-01 16:29:19 UTC212OUTPOST /api/collect HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: application/x-www-form-urlencoded; charset=utf-8
                                                                                      User-Agent: Embarcadero URI Client/1.0
                                                                                      Content-Length: 288
                                                                                      Host: collect.smartpcupdate.com
                                                                                      2024-11-01 16:29:19 UTC288OUTData Raw: 6a 73 6f 6e 3d 25 37 42 25 32 32 63 61 74 65 67 6f 72 79 25 32 32 25 33 41 25 32 32 74 72 61 63 6b 65 72 25 32 32 25 32 43 25 32 32 67 72 6f 75 70 25 32 32 25 33 41 25 32 32 43 6c 65 61 6e 65 72 25 32 32 25 32 43 25 32 32 74 72 61 63 6b 65 72 25 32 32 25 33 41 25 32 32 53 50 4f 39 34 30 37 25 32 32 25 32 43 25 32 32 68 69 64 25 32 32 25 33 41 25 32 32 39 44 34 45 37 30 46 39 33 43 36 30 46 41 38 42 43 32 41 31 44 43 37 30 32 41 44 37 45 43 45 33 25 32 32 25 32 43 25 32 32 70 72 6f 67 72 61 6d 25 32 32 25 33 41 25 32 32 53 6d 61 72 74 2b 50 43 2b 4f 70 74 69 6d 69 7a 65 72 25 32 32 25 32 43 25 32 32 76 65 72 73 69 6f 6e 25 32 32 25 33 41 25 32 32 39 34 30 37 25 32 32 25 32 43 25 32 32 6c 61 6e 67 75 61 67 65 25 32 32 25 33 41 25 32 32 65 6e 25 32 32 25 32
                                                                                      Data Ascii: json=%7B%22category%22%3A%22tracker%22%2C%22group%22%3A%22Cleaner%22%2C%22tracker%22%3A%22SPO9407%22%2C%22hid%22%3A%229D4E70F93C60FA8BC2A1DC702AD7ECE3%22%2C%22program%22%3A%22Smart+PC+Optimizer%22%2C%22version%22%3A%229407%22%2C%22language%22%3A%22en%22%2
                                                                                      2024-11-01 16:29:20 UTC389INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Cache-Control: no-cache, private
                                                                                      Date: Fri, 01 Nov 2024 16:29:20 GMT
                                                                                      X-RateLimit-Limit: 6000
                                                                                      X-RateLimit-Remaining: 5998
                                                                                      Access-Control-Allow-Origin: *
                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      X-Content-Type-Options: nosniff
                                                                                      2024-11-01 16:29:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:12:29:06
                                                                                      Start date:01/11/2024
                                                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:6'716'192 bytes
                                                                                      MD5 hash:17563CFBA0842038F0A8BD7F15C89E2E
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:Borland Delphi
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:2
                                                                                      Start time:12:29:06
                                                                                      Start date:01/11/2024
                                                                                      Path:C:\Users\user\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user~1\AppData\Local\Temp\is-O0UIQ.tmp\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.tmp" /SL5="$2044E,5851923,832512,C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5533.30107.22661.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:3'211'008 bytes
                                                                                      MD5 hash:023C73AD61BF1C58697C2C09C09E521F
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:Borland Delphi
                                                                                      Antivirus matches:
                                                                                      • Detection: 3%, ReversingLabs
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:11
                                                                                      Start time:12:29:12
                                                                                      Start date:01/11/2024
                                                                                      Path:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:5'051'136 bytes
                                                                                      MD5 hash:ADBB7F96A4A14023CE27D2F8D6710736
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:Borland Delphi
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Target ID:12
                                                                                      Start time:12:29:12
                                                                                      Start date:01/11/2024
                                                                                      Path:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SmartPCOptimizer" /START
                                                                                      Imagebase:0x400000
                                                                                      File size:10'108'672 bytes
                                                                                      MD5 hash:89943B083FEE6DA392A6668D6EE260BB
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:Borland Delphi
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000C.00000002.2529902132.0000000007110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Target ID:16
                                                                                      Start time:12:29:23
                                                                                      Start date:01/11/2024
                                                                                      Path:C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Program Files (x86)\Smart PC Solutions\Smart PC Optimizer\SPONotifications.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:5'051'136 bytes
                                                                                      MD5 hash:ADBB7F96A4A14023CE27D2F8D6710736
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:Borland Delphi
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Reset < >
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096689C
                                                                                          • Part of subcall function 60917C8B: sqlite3_initialize.SQLITE3(6091262C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE), ref: 60917C95
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_step.SQLITE3 ref: 60966930
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60966C10
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60966C7E
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60966CBE
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60966CD7
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60966CF0
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60966D07
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60966D26
                                                                                        • sqlite3_step.SQLITE3 ref: 60966D99
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60966E7F
                                                                                        • sqlite3_step.SQLITE3 ref: 60966E8A
                                                                                        • sqlite3_column_int.SQLITE3 ref: 60966E9D
                                                                                        • sqlite3_reset.SQLITE3 ref: 60966EAA
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60966F5F
                                                                                        • sqlite3_step.SQLITE3 ref: 60966F6A
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60966F86
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60966FA5
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60966FBC
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60966FDB
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60966FF4
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E145
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967048
                                                                                        • sqlite3_step.SQLITE3 ref: 60967053
                                                                                        • memcmp.MSVCRT ref: 60967122
                                                                                        • sqlite3_free.SQLITE3 ref: 6096713F
                                                                                        • sqlite3_free.SQLITE3 ref: 6096714A
                                                                                        • sqlite3_free.SQLITE3 ref: 609673CD
                                                                                        • sqlite3_free.SQLITE3 ref: 609673D8
                                                                                          • Part of subcall function 609628D0: sqlite3_blob_reopen.SQLITE3 ref: 609628F0
                                                                                          • Part of subcall function 609628D0: sqlite3_blob_bytes.SQLITE3 ref: 60962983
                                                                                          • Part of subcall function 609628D0: sqlite3_malloc.SQLITE3 ref: 6096299B
                                                                                          • Part of subcall function 609628D0: sqlite3_blob_read.SQLITE3 ref: 609629E2
                                                                                          • Part of subcall function 609628D0: sqlite3_free.SQLITE3 ref: 60962A01
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967069
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096707D
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096740B
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60966F48
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967473
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6096749C
                                                                                        • sqlite3_step.SQLITE3 ref: 609674A7
                                                                                        • sqlite3_column_int.SQLITE3 ref: 609674C9
                                                                                        • sqlite3_reset.SQLITE3 ref: 609674DA
                                                                                        • sqlite3_step.SQLITE3 ref: 6096750F
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967527
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967560
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E120
                                                                                          • Part of subcall function 6095E09B: sqlite3_bind_value.SQLITE3 ref: 6095E1D4
                                                                                        • sqlite3_reset.SQLITE3 ref: 60966DBF
                                                                                          • Part of subcall function 60916D9E: sqlite3_realloc.SQLITE3 ref: 60916DC0
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 6096695D
                                                                                          • Part of subcall function 60923BE9: sqlite3_value_bytes.SQLITE3 ref: 60923C01
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60966948
                                                                                          • Part of subcall function 60922F66: sqlite3_value_blob.SQLITE3 ref: 60922F7E
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096698D
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60966A17
                                                                                        • sqlite3_step.SQLITE3 ref: 60966A22
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60966A44
                                                                                        • sqlite3_reset.SQLITE3 ref: 60966A61
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60966925
                                                                                          • Part of subcall function 6091DCCD: sqlite3_bind_int64.SQLITE3 ref: 6091DCEC
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60968488
                                                                                        • sqlite3_bind_blob.SQLITE3 ref: 609684B1
                                                                                        • sqlite3_step.SQLITE3 ref: 609684BC
                                                                                        • sqlite3_reset.SQLITE3 ref: 609684C7
                                                                                        • sqlite3_free.SQLITE3 ref: 609684D8
                                                                                        • sqlite3_free.SQLITE3 ref: 609684E3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_reset$sqlite3_step$sqlite3_column_int64sqlite3_free$sqlite3_bind_int64$sqlite3_bind_int$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mprintf$sqlite3_column_intsqlite3_mutex_leave$memcmpsqlite3_bind_blobsqlite3_bind_valuesqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_initializesqlite3_mutex_entersqlite3_prepare_v2sqlite3_reallocsqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID: $d
                                                                                        • API String ID: 2451604321-2084297493
                                                                                        • Opcode ID: 1e9b7547504b97fef611e8613fd80df7a5a2dbbdd0239d5fb9121ecea74e134e
                                                                                        • Instruction ID: 36ac04a5222a6b8a5e95a8a727db2d579259da0e7550717329e43a5e83830ea8
                                                                                        • Opcode Fuzzy Hash: 1e9b7547504b97fef611e8613fd80df7a5a2dbbdd0239d5fb9121ecea74e134e
                                                                                        • Instruction Fuzzy Hash: A6F2CF74A152298FDB54CF68C880B9DBBF2BF69304F1185A9E889A7340D774ED85CF41
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60960A41
                                                                                          • Part of subcall function 60917C8B: sqlite3_initialize.SQLITE3(6091262C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE), ref: 60917C95
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60960A65
                                                                                        • sqlite3_stricmp.SQLITE3(?), ref: 6096100E
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 60960B97
                                                                                          • Part of subcall function 60928B1E: sqlite3_mprintf.SQLITE3 ref: 60928B3F
                                                                                          • Part of subcall function 60928B1E: sqlite3_mprintf.SQLITE3 ref: 60928BA6
                                                                                          • Part of subcall function 60928B1E: sqlite3_free.SQLITE3 ref: 60928C8A
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 60960C07
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960E64
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960E72
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960E88
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 60960EAF
                                                                                        • sqlite3_prepare.SQLITE3 ref: 60960EE8
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960EF6
                                                                                        • sqlite3_column_name.SQLITE3(?), ref: 60960F2B
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60960F58
                                                                                        • sqlite3_column_name.SQLITE3(?), ref: 60960F80
                                                                                        • sqlite3_finalize.SQLITE3(?), ref: 60960FC3
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 609610E2
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 6096117C
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 609611D3
                                                                                        • sqlite3_strnicmp.SQLITE3(?), ref: 609613D8
                                                                                        • sqlite3_free.SQLITE3(?), ref: 609613F1
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 60961432
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 6096148A
                                                                                        • sqlite3_free.SQLITE3 ref: 60961574
                                                                                          • Part of subcall function 60928C99: sqlite3_vmprintf.SQLITE3 ref: 60928CBA
                                                                                          • Part of subcall function 60928C99: sqlite3_mprintf.SQLITE3 ref: 60928CDA
                                                                                          • Part of subcall function 60928C99: sqlite3_free.SQLITE3 ref: 60928CE5
                                                                                          • Part of subcall function 60928C99: sqlite3_free.SQLITE3 ref: 60928D00
                                                                                        • sqlite3_free.SQLITE3 ref: 609616EA
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961730
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961752
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                          • Part of subcall function 6095E774: sqlite3_vmprintf.SQLITE3 ref: 6095E791
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6096177D
                                                                                        • sqlite3_free.SQLITE3 ref: 609617C5
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 609618E5
                                                                                        • sqlite3_prepare.SQLITE3 ref: 60961916
                                                                                        • sqlite3_step.SQLITE3 ref: 60961925
                                                                                        • sqlite3_column_int.SQLITE3 ref: 60961938
                                                                                        • sqlite3_finalize.SQLITE3 ref: 60961949
                                                                                        • sqlite3_free.SQLITE3 ref: 6096196A
                                                                                        • sqlite3_vtab_config.SQLITE3 ref: 609619B8
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 609619CD
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 609619F0
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961A1A
                                                                                        • sqlite3_declare_vtab.SQLITE3 ref: 60961A33
                                                                                          • Part of subcall function 6095E774: sqlite3_exec.SQLITE3 ref: 6095E7C6
                                                                                          • Part of subcall function 6095E774: sqlite3_free.SQLITE3 ref: 6095E7D0
                                                                                        • sqlite3_free.SQLITE3 ref: 60961A48
                                                                                        • sqlite3_free.SQLITE3 ref: 60961A50
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961A88
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961A93
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961AA1
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961AAF
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961ABD
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961ACB
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961AE0
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961AF7
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60961B05
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mprintf$sqlite3_malloc$sqlite3_vmprintf$sqlite3_column_namesqlite3_finalizesqlite3_initializesqlite3_preparesqlite3_strnicmp$sqlite3_column_intsqlite3_declare_vtabsqlite3_execsqlite3_stepsqlite3_stricmpsqlite3_vtab_config
                                                                                        • String ID: _content$compress$rowid$simple$uncompress
                                                                                        • API String ID: 3347237373-2113267749
                                                                                        • Opcode ID: 71e5530fd83b3dd7aab45b72b3f2428addb5cb0d6d0f43d764021a3dc73e3aa4
                                                                                        • Instruction ID: dff4692d7a5c9d1da7842a9610b41e60083012119b4fd79d02d26c542c5e979f
                                                                                        • Opcode Fuzzy Hash: 71e5530fd83b3dd7aab45b72b3f2428addb5cb0d6d0f43d764021a3dc73e3aa4
                                                                                        • Instruction Fuzzy Hash: D3B224B4914219CFEB20CF68C48079EBBF2BF69304F1584AAE898AB341D774D985CF51
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60969A0E
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 60969A18
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 60969A44
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 60969A7E
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60969ABB
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60969B16
                                                                                        • sqlite3_step.SQLITE3 ref: 60969D2B
                                                                                        • sqlite3_free.SQLITE3 ref: 60969D6E
                                                                                        • sqlite3_finalize.SQLITE3 ref: 60969D7D
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6096A40C
                                                                                        • sqlite3_value_int.SQLITE3 ref: 6096A603
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096A62A
                                                                                        • sqlite3_bind_null.SQLITE3 ref: 6096A691
                                                                                        • sqlite3_step.SQLITE3 ref: 6096A69C
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096A6A7
                                                                                        • sqlite3_value_int.SQLITE3 ref: 6096A7DB
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6096A8E1
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6096A92B
                                                                                          • Part of subcall function 60969762: sqlite3_bind_int.SQLITE3 ref: 609697B4
                                                                                          • Part of subcall function 60969762: sqlite3_step.SQLITE3 ref: 6096980B
                                                                                          • Part of subcall function 60969762: sqlite3_reset.SQLITE3 ref: 6096981B
                                                                                        • sqlite3_free.SQLITE3 ref: 6096A9A7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stepsqlite3_strnicmp$sqlite3_freesqlite3_mallocsqlite3_resetsqlite3_value_bytessqlite3_value_intsqlite3_value_text$sqlite3_bind_intsqlite3_bind_nullsqlite3_finalizesqlite3_mprintf
                                                                                        • String ID: optimize
                                                                                        • API String ID: 1540667495-3797040228
                                                                                        • Opcode ID: 5228fcd318889e763c8dd75c4309f0414153c8d430878a75f44a873d5b20b77b
                                                                                        • Instruction ID: 11b2d227a0d952813d62678eb30cd9b637dbe8c08d85d074025915e6e30edd58
                                                                                        • Opcode Fuzzy Hash: 5228fcd318889e763c8dd75c4309f0414153c8d430878a75f44a873d5b20b77b
                                                                                        • Instruction Fuzzy Hash: AEB2D270A182198FEB14DF68C880B9DBBF6BF68304F1185A9E849AB350D775DD85CF81
                                                                                        APIs
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961C35
                                                                                        • sqlite3_vtab_config.SQLITE3 ref: 60961C5F
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60961C9E
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961D3F
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961D87
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                          • Part of subcall function 60960947: sqlite3_prepare_v2.SQLITE3 ref: 60960981
                                                                                          • Part of subcall function 60960947: sqlite3_step.SQLITE3 ref: 60960990
                                                                                          • Part of subcall function 60960947: sqlite3_column_int.SQLITE3 ref: 609609A8
                                                                                          • Part of subcall function 60960947: sqlite3_finalize.SQLITE3 ref: 609609B5
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961DB7
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961FB5
                                                                                        • sqlite3_prepare_v2.SQLITE3 ref: 60961FEA
                                                                                        • sqlite3_free.SQLITE3 ref: 60961FF7
                                                                                        • sqlite3_errmsg.SQLITE3 ref: 60962010
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60962020
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60962040
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60962063
                                                                                        • sqlite3_free.SQLITE3 ref: 6096206E
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60962091
                                                                                        • sqlite3_free.SQLITE3 ref: 6096209B
                                                                                        • sqlite3_declare_vtab.SQLITE3 ref: 609620B3
                                                                                        • sqlite3_errmsg.SQLITE3 ref: 60961DA7
                                                                                          • Part of subcall function 60921EEC: sqlite3_log.SQLITE3 ref: 60921F29
                                                                                        • sqlite3_free.SQLITE3 ref: 60961DC4
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60961E23
                                                                                        • sqlite3_exec.SQLITE3 ref: 60961E54
                                                                                        • sqlite3_free.SQLITE3 ref: 60961E5E
                                                                                        • sqlite3_prepare_v2.SQLITE3 ref: 60961EE1
                                                                                        • sqlite3_bind_text.SQLITE3 ref: 60961F0F
                                                                                        • sqlite3_step.SQLITE3 ref: 60961F1A
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60961F36
                                                                                        • sqlite3_finalize.SQLITE3 ref: 60961F45
                                                                                        • sqlite3_errmsg.SQLITE3 ref: 609620C4
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 609620D4
                                                                                        • sqlite3_free.SQLITE3 ref: 609620EA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mprintf$sqlite3_free$sqlite3_errmsgsqlite3_prepare_v2$sqlite3_finalizesqlite3_step$sqlite3_bind_textsqlite3_column_intsqlite3_column_int64sqlite3_declare_vtabsqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mutex_entersqlite3_vmprintfsqlite3_vtab_config
                                                                                        • String ID:
                                                                                        • API String ID: 1118341049-0
                                                                                        • Opcode ID: 03bced17bb063246c860aed1ac7c045a095f9df4a1a7dbc120e75befe5c8ac4e
                                                                                        • Instruction ID: f97cf06350ddae1b3e72d1136cc94d9543d24b28db2624a8981ba3b2cabf8675
                                                                                        • Opcode Fuzzy Hash: 03bced17bb063246c860aed1ac7c045a095f9df4a1a7dbc120e75befe5c8ac4e
                                                                                        • Instruction Fuzzy Hash: 7DF126B59183058FEB14DF68C48079EBBF2BFA9354F15892EE8989B344E774D841CB42
                                                                                        APIs
                                                                                        • sqlite3_finalize.SQLITE3 ref: 60965558
                                                                                        • sqlite3_free.SQLITE3 ref: 60965563
                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 6096558E
                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 609655BE
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60965616
                                                                                        • sqlite3_value_int.SQLITE3 ref: 6096564A
                                                                                        • memcmp.MSVCRT ref: 60965774
                                                                                          • Part of subcall function 6093FA16: sqlite3_malloc.SQLITE3 ref: 6093FA5C
                                                                                          • Part of subcall function 6093FA16: sqlite3_free.SQLITE3 ref: 6093FBD8
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60965F27
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60965F53
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_numeric_type$memcmpsqlite3_finalizesqlite3_initializesqlite3_mallocsqlite3_value_intsqlite3_value_textsqlite3_vmprintf
                                                                                        • String ID: ASC$DESC$x
                                                                                        • API String ID: 4082667235-1162196452
                                                                                        • Opcode ID: a8e7e2dafb409d61e4a3f00e8f5642cc6e7344a5f891bd13d700965159054103
                                                                                        • Instruction ID: 796a0e2fbe2d46cb85c20f1e3c1ab08c8f8ca500eed376e2c4874deff653cfac
                                                                                        • Opcode Fuzzy Hash: a8e7e2dafb409d61e4a3f00e8f5642cc6e7344a5f891bd13d700965159054103
                                                                                        • Instruction Fuzzy Hash: 3F921274A14319CFEB11CFA8C89079DBBB6BF69304F208169D859AB342D775E985CF80
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967C01
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60967C18
                                                                                        • sqlite3_step.SQLITE3 ref: 60967C23
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967C2E
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967CDD
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60967CFA
                                                                                        • sqlite3_step.SQLITE3 ref: 60967D05
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 60967D1D
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60967D32
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 60967D4B
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967D86
                                                                                          • Part of subcall function 609628D0: sqlite3_blob_reopen.SQLITE3 ref: 609628F0
                                                                                          • Part of subcall function 609628D0: sqlite3_blob_bytes.SQLITE3 ref: 60962983
                                                                                          • Part of subcall function 609628D0: sqlite3_malloc.SQLITE3 ref: 6096299B
                                                                                          • Part of subcall function 609628D0: sqlite3_blob_read.SQLITE3 ref: 609629E2
                                                                                          • Part of subcall function 609628D0: sqlite3_free.SQLITE3 ref: 60962A01
                                                                                        • sqlite3_free.SQLITE3 ref: 60967E3E
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967ED6
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967F03
                                                                                        • sqlite3_step.SQLITE3 ref: 60967F0E
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967F19
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967F75
                                                                                        • sqlite3_bind_blob.SQLITE3 ref: 60967F9E
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 60967FC5
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 60967FE2
                                                                                        • sqlite3_step.SQLITE3 ref: 60967FED
                                                                                        • sqlite3_reset.SQLITE3 ref: 60967FF8
                                                                                        • sqlite3_free.SQLITE3 ref: 60968005
                                                                                        • sqlite3_free.SQLITE3 ref: 60968010
                                                                                          • Part of subcall function 60917061: sqlite3_free.SQLITE3 ref: 609171BA
                                                                                          • Part of subcall function 60917061: sqlite3_free.SQLITE3 ref: 609171C5
                                                                                          • Part of subcall function 6095EB67: sqlite3_bind_int64.SQLITE3 ref: 6095EBA1
                                                                                          • Part of subcall function 6095EB67: sqlite3_bind_blob.SQLITE3 ref: 6095EBCA
                                                                                          • Part of subcall function 6095EB67: sqlite3_step.SQLITE3 ref: 6095EBD5
                                                                                          • Part of subcall function 6095EB67: sqlite3_reset.SQLITE3 ref: 6095EBE0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64$sqlite3_free$sqlite3_resetsqlite3_step$sqlite3_bind_int$sqlite3_bind_blob$sqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_column_blobsqlite3_column_bytessqlite3_column_int64sqlite3_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 2526640242-0
                                                                                        • Opcode ID: 10e98fe41b6af577fbf48741cd05c33c430c280e72a3a9f8dc56ca3868f5563a
                                                                                        • Instruction ID: e8098f1bc372e1dd85af62069515700a1b7d4d7a16652463c0c197cfe3a90836
                                                                                        • Opcode Fuzzy Hash: 10e98fe41b6af577fbf48741cd05c33c430c280e72a3a9f8dc56ca3868f5563a
                                                                                        • Instruction Fuzzy Hash: 0ED1B074A097189BDB00DF69C494B8EFBF2BFA8314F118899E888A7340D775D985CF41
                                                                                        APIs
                                                                                          • Part of subcall function 60928AB9: sqlite3_value_bytes.SQLITE3 ref: 60928AD1
                                                                                          • Part of subcall function 60928AB9: sqlite3_mprintf.SQLITE3 ref: 60928AE6
                                                                                          • Part of subcall function 60928AB9: sqlite3_free.SQLITE3 ref: 60928AF9
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60966206
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60966262
                                                                                        • sqlite3_free.SQLITE3 ref: 60966276
                                                                                        • strcmp.MSVCRT ref: 609662E7
                                                                                        • sqlite3_free.SQLITE3 ref: 609662F6
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60966380
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6096654D
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_step.SQLITE3 ref: 60966558
                                                                                        • sqlite3_column_type.SQLITE3 ref: 60966570
                                                                                        • sqlite3_reset.SQLITE3 ref: 60966580
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 609665AB
                                                                                        • sqlite3_reset.SQLITE3 ref: 609665E3
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096660B
                                                                                        • sqlite3_free.SQLITE3 ref: 60966763
                                                                                        • sqlite3_reset.SQLITE3 ref: 60966802
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6096682C
                                                                                          • Part of subcall function 6095EE3A: sqlite3_column_blob.SQLITE3 ref: 6095EE62
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_result_blob.SQLITE3 ref: 60966852
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mprintfsqlite3_reset$sqlite3_column_blobsqlite3_malloc$sqlite3_bind_int64sqlite3_column_typesqlite3_mutex_leavesqlite3_prepare_v2sqlite3_result_blobsqlite3_result_error_codesqlite3_stepsqlite3_value_bytessqlite3_value_textstrcmp
                                                                                        • String ID: matchinfo
                                                                                        • API String ID: 1423568287-2192345459
                                                                                        • Opcode ID: 2d958d91ff731afae194fc8eda3eaedd22db050922c909cecfb63543cfc83316
                                                                                        • Instruction ID: 6ba2c215871a86772f0faabd1ed4e54b79ff38891935c4207a972b786480bc36
                                                                                        • Opcode Fuzzy Hash: 2d958d91ff731afae194fc8eda3eaedd22db050922c909cecfb63543cfc83316
                                                                                        • Instruction Fuzzy Hash: BA221874A14218CBEB10CFA9C48079DBBF6BF69318F248569D895AB345D734EC86CF41
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 6096877B
                                                                                        • sqlite3_step.SQLITE3(?,?), ref: 60968786
                                                                                        • sqlite3_column_int64.SQLITE3(?,?), ref: 609687B2
                                                                                          • Part of subcall function 60969693: sqlite3_bind_int64.SQLITE3 ref: 609696F8
                                                                                          • Part of subcall function 60969693: sqlite3_step.SQLITE3 ref: 60969703
                                                                                          • Part of subcall function 60969693: sqlite3_column_int.SQLITE3 ref: 6096971D
                                                                                          • Part of subcall function 60969693: sqlite3_reset.SQLITE3 ref: 6096972A
                                                                                        • sqlite3_reset.SQLITE3(?,?), ref: 609687C9
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60968937
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60968963
                                                                                        • sqlite3_step.SQLITE3(?), ref: 609689A8
                                                                                        • sqlite3_column_int64.SQLITE3(?), ref: 609689C0
                                                                                        • sqlite3_reset.SQLITE3(?), ref: 609689DA
                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 60968BA6
                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 60968C7F
                                                                                          • Part of subcall function 609128BE: sqlite3_initialize.SQLITE3(?,?,?,60915D31,?,?,?,?,?,?,?,?,?,?,60915D98,00000000), ref: 609128C9
                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 60968D8E
                                                                                        • sqlite3_bind_int64.SQLITE3(?), ref: 60968723
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_int64.SQLITE3(?,?), ref: 60968E40
                                                                                        • sqlite3_step.SQLITE3(?,?), ref: 60968E4B
                                                                                        • sqlite3_reset.SQLITE3(?,?), ref: 60968E56
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969117
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969122
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60969131
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64$sqlite3_freesqlite3_resetsqlite3_step$sqlite3_column_int64sqlite3_mallocsqlite3_realloc$sqlite3_column_intsqlite3_initializesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2
                                                                                        • String ID:
                                                                                        • API String ID: 961572588-0
                                                                                        • Opcode ID: a779c927c6e1a301821dddb61d3f37ef4a42aa59099e570913266cc5bd567f11
                                                                                        • Instruction ID: 296fbabc2daead8d286e54fc15e041769f6808d9b116cd4c8b320a3e478457f2
                                                                                        • Opcode Fuzzy Hash: a779c927c6e1a301821dddb61d3f37ef4a42aa59099e570913266cc5bd567f11
                                                                                        • Instruction Fuzzy Hash: F3720471A043198FDB24CF69C88078EB7F6BF99314F1586A9D889AB341D774ED818F81
                                                                                        Strings
                                                                                        • wrong number of arguments to function snippet(), xrefs: 6095FA7E
                                                                                        • snippet, xrefs: 6095FA98
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: snippet$wrong number of arguments to function snippet()
                                                                                        • API String ID: 0-1415007213
                                                                                        • Opcode ID: 2bd6e44da2836a0afd40c9a253e48daa61829883333211ac3167c95b15383f5f
                                                                                        • Instruction ID: dcabba9f9a234e96d398bca268652dc492ba0ca3ad89e73e32f92be0d2047cba
                                                                                        • Opcode Fuzzy Hash: 2bd6e44da2836a0afd40c9a253e48daa61829883333211ac3167c95b15383f5f
                                                                                        • Instruction Fuzzy Hash: BD62F770904229CFDB24CF59C8907DEBBB2BF99314F1086A9D859AB350D770AE85CF80
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_column_int64$sqlite3_bind_int64$memcmpqsortsqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_mallocsqlite3_reallocsqlite3_resetsqlite3_step
                                                                                        • String ID: e
                                                                                        • API String ID: 2765688754-4024072794
                                                                                        • Opcode ID: 085e3cf60791d4a3d67437776682539b9b84c6ef2b49deaebb6178dea350416d
                                                                                        • Instruction ID: 72cd7762280e7a0b510b15b9dd80d6be3227fca9de4f217e1732bdc1e2f3851d
                                                                                        • Opcode Fuzzy Hash: 085e3cf60791d4a3d67437776682539b9b84c6ef2b49deaebb6178dea350416d
                                                                                        • Instruction Fuzzy Hash: 6FE1E4B4A14219CFDB04DFA8C49079EBBF6BFA8304F11852AE859AB350D775E842CF41
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 0$0$9$:$;$<$BINARY$H
                                                                                        • API String ID: 0-2951843663
                                                                                        • Opcode ID: 8213a235e91a3a45d6e70804adc4c66c8d2b1d5a88a741f5e3d7063fa1e1cd5c
                                                                                        • Instruction ID: 36708952c04b0ad7ddd113d4b390e07c6373ed9ce549256b442f6b677add96c1
                                                                                        • Opcode Fuzzy Hash: 8213a235e91a3a45d6e70804adc4c66c8d2b1d5a88a741f5e3d7063fa1e1cd5c
                                                                                        • Instruction Fuzzy Hash: 7233F374A04268CFDB14CF68C490B9DBBB2BF99318F2481A9D859AB355D774ED82CF40
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095F196
                                                                                          • Part of subcall function 60917C8B: sqlite3_initialize.SQLITE3(6091262C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE), ref: 60917C95
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 6095F1EC
                                                                                        • sqlite3_step.SQLITE3 ref: 6095F1F7
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 6095F20F
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 6095F222
                                                                                        • sqlite3_reset.SQLITE3 ref: 6095F262
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F270
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_intsqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_initializesqlite3_mallocsqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 3167175467-0
                                                                                        • Opcode ID: 6b56c3fb3223e7be24fe436cac612f4857eb887cc05085535f03190208cdb64c
                                                                                        • Instruction ID: 968fb125cd133a4623eab5bde2bf84f9ee4a789c2d797bb89f7864197b11eb03
                                                                                        • Opcode Fuzzy Hash: 6b56c3fb3223e7be24fe436cac612f4857eb887cc05085535f03190208cdb64c
                                                                                        • Instruction Fuzzy Hash: 616116B0A48619CBDB01DFA9C49079DBBF2BFA8318F108829E495EB340E779D845CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_nullsqlite3_resetsqlite3_stepsqlite3_value_int$sqlite3_bind_int64
                                                                                        • String ID: d
                                                                                        • API String ID: 788585506-2564639436
                                                                                        • Opcode ID: 266579b3c3efe327163df7f1f1f060a160ad3c7b0720aeed73a34cf298dcfba9
                                                                                        • Instruction ID: 5acdcd19dbe6cad18a2fcd761d8a888f0c538dfa1f9dcbe2236668da75576d24
                                                                                        • Opcode Fuzzy Hash: 266579b3c3efe327163df7f1f1f060a160ad3c7b0720aeed73a34cf298dcfba9
                                                                                        • Instruction Fuzzy Hash: 99817CB1E042158FCB41DFA8C98479DBBF2FB68304F128969E899AB355E334D845CF91
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmpsqlite3_strnicmp
                                                                                        • String ID: UNIQUE$BINARY$index$sqlite_master$sqlite_temp_master
                                                                                        • API String ID: 456569458-3510621077
                                                                                        • Opcode ID: db0c5082cae50d7e0d16f0e9de4aba2911fee546255e5d29a4ceda68496fa7ed
                                                                                        • Instruction ID: afe2b417d1ca56c32b8c1342be0cb74295b5767a1b24a8786270cc7889cb2518
                                                                                        • Opcode Fuzzy Hash: db0c5082cae50d7e0d16f0e9de4aba2911fee546255e5d29a4ceda68496fa7ed
                                                                                        • Instruction Fuzzy Hash: 31724974A04218CFDB15CFA9C48079EBBF6BF68304F248569E855AB355D774EC8ACB80
                                                                                        APIs
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095ECDA
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 6095ECF4
                                                                                          • Part of subcall function 6091DCCD: sqlite3_bind_int64.SQLITE3 ref: 6091DCEC
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095ED15
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095ED36
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095ED57
                                                                                        • sqlite3_bind_blob.SQLITE3 ref: 6095ED80
                                                                                        • sqlite3_step.SQLITE3 ref: 6095ED8B
                                                                                        • sqlite3_reset.SQLITE3 ref: 6095ED96
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64$sqlite3_mutex_leave$sqlite3_bind_blobsqlite3_bind_intsqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 1154799056-0
                                                                                        • Opcode ID: 7582730ff4e0b3321be6526ca8dcd59be3ec9649d112e56a6c30e42b4112652a
                                                                                        • Instruction ID: 9d39db22928ad31433acf2f6728c91c1b770a1961530455dce90b23803c180a5
                                                                                        • Opcode Fuzzy Hash: 7582730ff4e0b3321be6526ca8dcd59be3ec9649d112e56a6c30e42b4112652a
                                                                                        • Instruction Fuzzy Hash: F8415BB4A09708ABCB04DFA9C08469EBBF1EF98354F11C95AE898A7344D775D9408F92
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmpsqlite3_value_text
                                                                                        • String ID: BINARY$J$NOCASE$_
                                                                                        • API String ID: 3779612131-666127809
                                                                                        • Opcode ID: e84ed5aa79c2d4205931ad626dfd605c3a75e898d8ad413e858bf0450c3bbb99
                                                                                        • Instruction ID: 6be127e8cda163a10dcbd02a58b862b9937a98cfa09a963dae9aca1431143943
                                                                                        • Opcode Fuzzy Hash: e84ed5aa79c2d4205931ad626dfd605c3a75e898d8ad413e858bf0450c3bbb99
                                                                                        • Instruction Fuzzy Hash: 79A20774A046288FDB18CFA8D581B9DBBF2BF59314F248259D859AB395D734EC42CF80
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094B397
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 6094B528
                                                                                        • sqlite3_free.SQLITE3(?), ref: 6094BA99
                                                                                          • Part of subcall function 6094A50E: sqlite3_free.SQLITE3 ref: 6094A593
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094BD64
                                                                                          • Part of subcall function 6094B273: sqlite3_bind_int64.SQLITE3 ref: 6094B2A4
                                                                                          • Part of subcall function 6094B273: sqlite3_bind_int64.SQLITE3 ref: 6094B2C2
                                                                                          • Part of subcall function 6094B273: sqlite3_step.SQLITE3 ref: 6094B2D0
                                                                                        • sqlite3_free.SQLITE3 ref: 6094C0C8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_malloc$sqlite3_bind_int64$sqlite3_step
                                                                                        • String ID: 0
                                                                                        • API String ID: 3177887849-4108050209
                                                                                        • Opcode ID: 363f549b4c8dc9ea8e6e5e4d80395b5f66cc435514c0fd85a23a4026e58e791c
                                                                                        • Instruction ID: 1338c8750b2e20aa0ebd914f1b4a1df693e0dd39aacefd9b496ab371e8530aa8
                                                                                        • Opcode Fuzzy Hash: 363f549b4c8dc9ea8e6e5e4d80395b5f66cc435514c0fd85a23a4026e58e791c
                                                                                        • Instruction Fuzzy Hash: D5922775A04219CBCB25CF18C8907DDB7B2ABA9314F2185E9D889A7355DB34EE91CF80
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: +Inf$-$-Inf$Inf$NaN
                                                                                        • API String ID: 0-3158137534
                                                                                        • Opcode ID: 07e5e0131c2c1170b70939c439f576a0a115a93490202857e2d86943fcb038e1
                                                                                        • Instruction ID: 811a1fdcbc13a071a87b8c4692e43164914d9e64dd505be5aadcbb961f8767a9
                                                                                        • Opcode Fuzzy Hash: 07e5e0131c2c1170b70939c439f576a0a115a93490202857e2d86943fcb038e1
                                                                                        • Instruction Fuzzy Hash: C972F771F0C3598EDB129B28C890389BFB7AF66304F2485D9C499A7296D7758EC4CF81
                                                                                        APIs
                                                                                        • sqlite3_log.SQLITE3 ref: 6093EED7
                                                                                        • sqlite3_log.SQLITE3 ref: 6093EF12
                                                                                          • Part of subcall function 60904394: sqlite3_mutex_enter.SQLITE3(?,?,?,609081D2), ref: 60904402
                                                                                          • Part of subcall function 60904421: sqlite3_mutex_leave.SQLITE3(6090449B,?,?,?,6090820D), ref: 60904444
                                                                                        • sqlite3_randomness.SQLITE3 ref: 6093EF25
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6093EF51
                                                                                        • sqlite3_free.SQLITE3 ref: 6093EFEF
                                                                                          • Part of subcall function 60904394: sqlite3_mutex_try.SQLITE3(?,?,?,609081D2), ref: 609043B6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log$sqlite3_freesqlite3_mutex_entersqlite3_mutex_leavesqlite3_mutex_trysqlite3_randomnesssqlite3_snprintf
                                                                                        • String ID: d
                                                                                        • API String ID: 1629246311-2564639436
                                                                                        • Opcode ID: 7ba119cef0c0204a1297de691cf45d94da82c2ee0d5b7911eddbd494d72d519e
                                                                                        • Instruction ID: 1edfa59282a592bc17e323ca798d260c3b2a3d86498b177c842d15c2acbd2e0c
                                                                                        • Opcode Fuzzy Hash: 7ba119cef0c0204a1297de691cf45d94da82c2ee0d5b7911eddbd494d72d519e
                                                                                        • Instruction Fuzzy Hash: 03524474A08225CBDB18CF68C59078ABBF7BFA4308F208469E8699B395D774EC45CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_mutex_leavesqlite3_stricmp
                                                                                        • String ID: 2$foreign key$indexed
                                                                                        • API String ID: 4126863092-702264400
                                                                                        • Opcode ID: 38c640a172393135cb94b114c3c2ab470487afe82bc6f448690006a6d4037fdb
                                                                                        • Instruction ID: d4220deb2b955bae805370df8665e5c9ec0a6e8593199ab16efd7359dc2321ce
                                                                                        • Opcode Fuzzy Hash: 38c640a172393135cb94b114c3c2ab470487afe82bc6f448690006a6d4037fdb
                                                                                        • Instruction Fuzzy Hash: 25E1AE74A14609DFDB14DFA9D491A9DBBB2BFA8304F20C129E855AB354D734ED82CF80
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094A244
                                                                                        • sqlite3_step.SQLITE3 ref: 6094A255
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 6094A279
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 6094A295
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094A2AC
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094A30B
                                                                                        • sqlite3_free.SQLITE3(?), ref: 6094A395
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_mallocsqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2794791986-0
                                                                                        • Opcode ID: 9ee3f4e7ce1c9406bc06088ec014ad1786b90c489fdbf309f66d9074f2816539
                                                                                        • Instruction ID: 5df7d4aa6a9626923898d08129ad9f491f7bff8699daf88d0999cbdf76659e08
                                                                                        • Opcode Fuzzy Hash: 9ee3f4e7ce1c9406bc06088ec014ad1786b90c489fdbf309f66d9074f2816539
                                                                                        • Instruction Fuzzy Hash: E95102B5A042058BCB04DF69C48469EBBF6FFA8314F158569E858AB344E775EC82CB90
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: USING COVERING INDEX $DISTINCT$ORDER BY
                                                                                        • API String ID: 912767213-1308749736
                                                                                        • Opcode ID: c2d381b52aed8734aa758f1f77f602213ba88837418532b625fbd77595140a4d
                                                                                        • Instruction ID: 6effdb630cda3f270890c04f2d37c0e6b6e1b0f2544bd88a453b322f727314e9
                                                                                        • Opcode Fuzzy Hash: c2d381b52aed8734aa758f1f77f602213ba88837418532b625fbd77595140a4d
                                                                                        • Instruction Fuzzy Hash: D412F974A082288FD724DF28C880B59BBF2BFA9314F1085D9E4999B355D735ED81CF91
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094AF97
                                                                                        • sqlite3_step.SQLITE3 ref: 6094AFA5
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094AFB3
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094AFE1
                                                                                        • sqlite3_step.SQLITE3 ref: 6094AFEF
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094AFFD
                                                                                          • Part of subcall function 6094B05B: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094AF5A), ref: 6094B1C4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_resetsqlite3_step$memmove
                                                                                        • String ID:
                                                                                        • API String ID: 4082478743-0
                                                                                        • Opcode ID: e989eba55354aee044130ffab4aaecfa5e2efd79f01e0d3240a6624ae52d0955
                                                                                        • Instruction ID: 57bf3ca3f5c64a372a097fe2f7aa42a7e76a416792cb97b1d41e7ae005b59a25
                                                                                        • Opcode Fuzzy Hash: e989eba55354aee044130ffab4aaecfa5e2efd79f01e0d3240a6624ae52d0955
                                                                                        • Instruction Fuzzy Hash: 5741E674A047018FCB14DF69C4C4A5AB7F6EFA8358F118969ECA9CB319E735E841CB50
                                                                                        APIs
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6095E120
                                                                                        • sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                        • sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_bind_value.SQLITE3 ref: 6095E1D4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mprintf$sqlite3_bind_valuesqlite3_freesqlite3_initializesqlite3_prepare_v2sqlite3_vmprintf
                                                                                        • String ID:
                                                                                        • API String ID: 2308881617-0
                                                                                        • Opcode ID: 9380e66a8d227057a56b7063f106e2c4f8398307413fc54b940e330edab37fa6
                                                                                        • Instruction ID: f2617792c90f2d4b9e43acc3dfd059159c1fd24f8c76b6f2424d7c446e6ca417
                                                                                        • Opcode Fuzzy Hash: 9380e66a8d227057a56b7063f106e2c4f8398307413fc54b940e330edab37fa6
                                                                                        • Instruction Fuzzy Hash: 134114B4A09715CFDB19CF69C880B5ABBF2FB98300F0085AAE8589B344E334E941CF51
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095F0AD
                                                                                          • Part of subcall function 60917C8B: sqlite3_initialize.SQLITE3(6091262C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE), ref: 60917C95
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F0F6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_initializesqlite3_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 1320878182-0
                                                                                        • Opcode ID: 195f9eb214b4fd211c6662437acf32e72a171da00df9a11126f74fb4e2f19039
                                                                                        • Instruction ID: 2f3a89ac9146e9b48123199d1e1bbc231a43d3a6012188d5c5c7ee3413c9fdb8
                                                                                        • Opcode Fuzzy Hash: 195f9eb214b4fd211c6662437acf32e72a171da00df9a11126f74fb4e2f19039
                                                                                        • Instruction Fuzzy Hash: 0F21C7B0A087098FCB05DF69C48169EBBF5AFA8358F00882DE8849B340D778D845CF51
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6094CE45
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6094D037
                                                                                          • Part of subcall function 60905D0C: sqlite3_stricmp.SQLITE3 ref: 60905D21
                                                                                          • Part of subcall function 60905D0C: sqlite3_stricmp.SQLITE3 ref: 60905D3A
                                                                                          • Part of subcall function 60905D0C: sqlite3_stricmp.SQLITE3 ref: 60905D4E
                                                                                        • sqlite3_stricmp.SQLITE3 ref: 6094CECB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp$sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: BINARY$INTEGER
                                                                                        • API String ID: 317512412-1676293250
                                                                                        • Opcode ID: 4de738dda44b7cabd8a03eb9db2ac6c4f7a3bc7abbe4cc1575d9eeeb232bcfdf
                                                                                        • Instruction ID: cd655e12c4a5ea209ff42dde40d8a258b2827bfe793ed6e7b29d8e1b674c9c11
                                                                                        • Opcode Fuzzy Hash: 4de738dda44b7cabd8a03eb9db2ac6c4f7a3bc7abbe4cc1575d9eeeb232bcfdf
                                                                                        • Instruction Fuzzy Hash: BE7117B4A002099FDB44CF69C48079EBBF3AFA8348F118569EC599B250D738E849CF80
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B091
                                                                                        • sqlite3_step.SQLITE3 ref: 6094B09F
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6094B0BC
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094B0FD
                                                                                        • memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094AF5A), ref: 6094B1C4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmovesqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2802900177-0
                                                                                        • Opcode ID: 7d9a89aadb2c6ca041aa3d822c7c289a762bddbd21a3751f4806e025b11697ff
                                                                                        • Instruction ID: 2d3ae6ad849e59cf80236ab33ad09c1b6c500f23743e9b632ca858e8dde6a463
                                                                                        • Opcode Fuzzy Hash: 7d9a89aadb2c6ca041aa3d822c7c289a762bddbd21a3751f4806e025b11697ff
                                                                                        • Instruction Fuzzy Hash: 4E515C75A082058FCB14CF29C49169EB7F7FBA8314F24C529E8599B345E774DC81DB90
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_intsqlite3_bind_valuesqlite3_resetsqlite3_stepsqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 908518397-0
                                                                                        • Opcode ID: 2b2dd3ee3c51d897db198cb97534b40ae259318bd4f550cdd54423b012f38732
                                                                                        • Instruction ID: 2c3fae396bc4d3179be175369c7f7ee3e322d30e8f379a62c7dd96c9983834d1
                                                                                        • Opcode Fuzzy Hash: 2b2dd3ee3c51d897db198cb97534b40ae259318bd4f550cdd54423b012f38732
                                                                                        • Instruction Fuzzy Hash: 46316EB0A086028FD706CF39C49475ABBF6AF68328F158468D885CB342E735DCD4CB81
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094A482
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_null.SQLITE3 ref: 6094A494
                                                                                        • sqlite3_bind_blob.SQLITE3 ref: 6094A4BA
                                                                                        • sqlite3_step.SQLITE3 ref: 6094A4C2
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094A4D1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_blobsqlite3_bind_int64sqlite3_bind_nullsqlite3_mutex_leavesqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2721088213-0
                                                                                        • Opcode ID: 6f5533cee0d1522b151bd9307353e28e20eabe30af3acaf177d198a721416ac5
                                                                                        • Instruction ID: 6c447c512a9657dc875246c3f7df91a0b28c8d24f1da0bf0e1fa4f54658aad17
                                                                                        • Opcode Fuzzy Hash: 6f5533cee0d1522b151bd9307353e28e20eabe30af3acaf177d198a721416ac5
                                                                                        • Instruction Fuzzy Hash: 9921E9B46087009FC715DF25C1C561ABBE6EFA4314F05C96DE8888B345D375E881CF92
                                                                                        APIs
                                                                                        • sqlite3_stricmp.SQLITE3(?), ref: 60952144
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: $2
                                                                                        • API String ID: 912767213-4264767444
                                                                                        • Opcode ID: 5cb4686052c9921b6506fa5897ddff8fa85c95529a095a7ab0819411ac1f8b8e
                                                                                        • Instruction ID: 8b9c44638a5a2acb2bdb086c922fed078458cc546a5d66851ba7810574ba212f
                                                                                        • Opcode Fuzzy Hash: 5cb4686052c9921b6506fa5897ddff8fa85c95529a095a7ab0819411ac1f8b8e
                                                                                        • Instruction Fuzzy Hash: 6EF20774A082188FDB15DF69C880B9DBBF2BF6A304F208169E4599B395D734DD86CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: ROWID$_rowid_
                                                                                        • API String ID: 912767213-713255191
                                                                                        • Opcode ID: af4bc3b040af7478f5d271253104212ccf8ed08f3751fb6f56b6e0c5b58becc8
                                                                                        • Instruction ID: 8ee724db01243261979cb9d57047de8d237f51a048aa14b3644d3309578eee5a
                                                                                        • Opcode Fuzzy Hash: af4bc3b040af7478f5d271253104212ccf8ed08f3751fb6f56b6e0c5b58becc8
                                                                                        • Instruction Fuzzy Hash: 62D2C374A04219CBDB24CF68C890B9DBBF6BF98308F2085A9E499AB351D774DD85CF41
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID:
                                                                                        • API String ID: 632333372-0
                                                                                        • Opcode ID: 05a26e4751b58b02e1a184d588057de03049da7d096474c5e1f1f9e983c2c02e
                                                                                        • Instruction ID: be15eb6d95ae6b5116652583d697600cc0ddd9384aeed87ddab0e877779b26b4
                                                                                        • Opcode Fuzzy Hash: 05a26e4751b58b02e1a184d588057de03049da7d096474c5e1f1f9e983c2c02e
                                                                                        • Instruction Fuzzy Hash: D1222474A042199FDB08CFA8C491A9DBBF7BF69308F108569E855AB355D734EC82CF90
                                                                                        APIs
                                                                                        • memcmp.MSVCRT ref: 60963254
                                                                                        • memcmp.MSVCRT ref: 60963298
                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 60963318
                                                                                          • Part of subcall function 60940AE2: sqlite3_free.SQLITE3 ref: 60940AF7
                                                                                          • Part of subcall function 60940AE2: sqlite3_blob_close.SQLITE3 ref: 60940B02
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp$sqlite3_blob_closesqlite3_freesqlite3_realloc
                                                                                        • String ID:
                                                                                        • API String ID: 3707747965-0
                                                                                        • Opcode ID: a13bc2f462873155807470ef0e6faa2040dd22fcf14b2c6715c30948365a6bed
                                                                                        • Instruction ID: 826a88cd7c1f0301d1814a978435497186d5dcf6bf0fbde101fb6f621b5e1d78
                                                                                        • Opcode Fuzzy Hash: a13bc2f462873155807470ef0e6faa2040dd22fcf14b2c6715c30948365a6bed
                                                                                        • Instruction Fuzzy Hash: 4C12DE74E142188FEB14CFA8C580B9DBBB2BF69304F248169D859AB355DB74EC86CF50
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093E3EA
                                                                                          • Part of subcall function 60904394: sqlite3_mutex_try.SQLITE3(?,?,?,609081D2), ref: 609043B6
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6093E403
                                                                                          • Part of subcall function 609385DA: memcmp.MSVCRT ref: 60938715
                                                                                          • Part of subcall function 609385DA: memcmp.MSVCRT ref: 6093874B
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093E872
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6093E888
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmpsqlite3_mutex_entersqlite3_mutex_leave$sqlite3_mutex_try
                                                                                        • String ID:
                                                                                        • API String ID: 4038589952-0
                                                                                        • Opcode ID: 94a64da562a731361c153ce5aaf690ac3dbe063114d413619ec36fbf417fb554
                                                                                        • Instruction ID: bacc92849218789e33cfa480fc220bda0c0ec90a267376aae26849fb7560412d
                                                                                        • Opcode Fuzzy Hash: 94a64da562a731361c153ce5aaf690ac3dbe063114d413619ec36fbf417fb554
                                                                                        • Instruction Fuzzy Hash: DDF11874E046158BDB19CFA9C48069EBBF7AFA8308F248529E8559B395E774EC42CF40
                                                                                        APIs
                                                                                          • Part of subcall function 6094A3AD: sqlite3_bind_int64.SQLITE3 ref: 6094A3D9
                                                                                          • Part of subcall function 6094A3AD: sqlite3_step.SQLITE3 ref: 6094A3E7
                                                                                          • Part of subcall function 6094A3AD: sqlite3_column_int64.SQLITE3 ref: 6094A402
                                                                                          • Part of subcall function 6094A3AD: sqlite3_reset.SQLITE3 ref: 6094A428
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094C228
                                                                                        • sqlite3_step.SQLITE3 ref: 6094C239
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094C24A
                                                                                          • Part of subcall function 6094B05B: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094AF5A), ref: 6094B1C4
                                                                                          • Part of subcall function 6094A50E: sqlite3_free.SQLITE3 ref: 6094A593
                                                                                        • sqlite3_free.SQLITE3 ref: 6094C390
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_freesqlite3_resetsqlite3_step$memmovesqlite3_column_int64
                                                                                        • String ID:
                                                                                        • API String ID: 3487101843-0
                                                                                        • Opcode ID: 02320a92f8e5a7a1927355accab76edae64db71527707bfc65db5899ae5435f7
                                                                                        • Instruction ID: c7c97f9b90911ce616ccd977c88ccd4478b2a998886d12fc2db045504a059c2e
                                                                                        • Opcode Fuzzy Hash: 02320a92f8e5a7a1927355accab76edae64db71527707bfc65db5899ae5435f7
                                                                                        • Instruction Fuzzy Hash: BC81EB74A042098FCB45DF98C480A9EF7F6EFA8354F258569E855EB308EB74EC46CB50
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 2238633743-0
                                                                                        • Opcode ID: 84a81a0170d665a511b43747db4e3aea3c745db23e7460a4f855d655156fb510
                                                                                        • Instruction ID: a2c01e09feff167b5cad2dbbcc6418efa2a09940258982edd38657c530d5b9b6
                                                                                        • Opcode Fuzzy Hash: 84a81a0170d665a511b43747db4e3aea3c745db23e7460a4f855d655156fb510
                                                                                        • Instruction Fuzzy Hash: 42316FB1629311CBEF10DF24D9997697FE7E7A6348F108419E400AB371D7BAD884EB21
                                                                                        APIs
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 609697B4
                                                                                          • Part of subcall function 6091DCCD: sqlite3_bind_int64.SQLITE3 ref: 6091DCEC
                                                                                        • sqlite3_column_int.SQLITE3 ref: 609697C9
                                                                                        • sqlite3_step.SQLITE3 ref: 6096980B
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096981B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 247099642-0
                                                                                        • Opcode ID: e0e9220c7200b88ce7a6e793931e99f5cdcbcd35a263ae811f2421bc35154cbe
                                                                                        • Instruction ID: df4aa54190a70df40a56e3d683bb6f768ba24f09e7b765c53047b49ff5605802
                                                                                        • Opcode Fuzzy Hash: e0e9220c7200b88ce7a6e793931e99f5cdcbcd35a263ae811f2421bc35154cbe
                                                                                        • Instruction Fuzzy Hash: FC2151B0A14705CBEB10DFA9C4C479EBAFAEF75348F008429E855A7340E779D8458B51
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_intsqlite3_column_intsqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 4060988840-0
                                                                                        • Opcode ID: b6611415385ca0797ad9df35c0186d01954091ca1780689ee1e6627ce022eb30
                                                                                        • Instruction ID: 5e04920cc503d5288b78a056873852b8530f4a5b0edb3814ef8821917d7f2a5d
                                                                                        • Opcode Fuzzy Hash: b6611415385ca0797ad9df35c0186d01954091ca1780689ee1e6627ce022eb30
                                                                                        • Instruction Fuzzy Hash: 88217F70A182019BEF01DF79C88439ABAEADBA1318F118568DCA1CB381D774C881C751
                                                                                        APIs
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 609696F8
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_step.SQLITE3 ref: 60969703
                                                                                        • sqlite3_column_int.SQLITE3 ref: 6096971D
                                                                                          • Part of subcall function 60918C1F: sqlite3_value_int.SQLITE3 ref: 60918C37
                                                                                        • sqlite3_reset.SQLITE3 ref: 6096972A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2sqlite3_resetsqlite3_stepsqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 326482775-0
                                                                                        • Opcode ID: dd8bfa3d47e9ee619132d2e9bb1686468c2214b45142e465d88393d1219c0861
                                                                                        • Instruction ID: a15cc364818947dccec18ef69b3d3a099db60678ca2118eb3d9812566dcb19ae
                                                                                        • Opcode Fuzzy Hash: dd8bfa3d47e9ee619132d2e9bb1686468c2214b45142e465d88393d1219c0861
                                                                                        • Instruction Fuzzy Hash: 2B213BB4A143058BDB049FA9C49079EF7F6EFA8354F04C429E899DB340D7B8D8428B51
                                                                                        APIs
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6095F402
                                                                                          • Part of subcall function 6095E1F7: sqlite3_mprintf.SQLITE3 ref: 6095E220
                                                                                          • Part of subcall function 6095E1F7: sqlite3_prepare_v2.SQLITE3 ref: 6095E251
                                                                                          • Part of subcall function 6095E1F7: sqlite3_free.SQLITE3 ref: 6095E25C
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095F3B9
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_step.SQLITE3 ref: 6095F3C8
                                                                                        • sqlite3_reset.SQLITE3 ref: 6095F3D8
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_leave$sqlite3_bind_int64sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_result_error_codesqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 266850690-0
                                                                                        • Opcode ID: 63afd754860848a318f4ae380d495a557be794299e509c714301a48066f7cf42
                                                                                        • Instruction ID: 795477508bd2392d93c29d857d7a613629d9ca629f97bb1efaa5fb14d043fd37
                                                                                        • Opcode Fuzzy Hash: 63afd754860848a318f4ae380d495a557be794299e509c714301a48066f7cf42
                                                                                        • Instruction Fuzzy Hash: D6116071A087408BD702DF2AC4D475ABBEAEFA436CF1585A8E8888F305D774DC85CB91
                                                                                        APIs
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_bind_int.SQLITE3 ref: 6095EDE3
                                                                                          • Part of subcall function 6091DCCD: sqlite3_bind_int64.SQLITE3 ref: 6091DCEC
                                                                                        • sqlite3_step.SQLITE3 ref: 6095EDEE
                                                                                        • sqlite3_column_type.SQLITE3 ref: 6095EE06
                                                                                        • sqlite3_reset.SQLITE3 ref: 6095EE16
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_column_typesqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 4183316597-0
                                                                                        • Opcode ID: e73bc796f3d6b9637ed70475ab9cafd3409f82e62e428486593068fb19cddfba
                                                                                        • Instruction ID: 9ecec8ef124d306c547bb90e257b1a6fc64c5d0b635dd6d70fcbb463ec059c78
                                                                                        • Opcode Fuzzy Hash: e73bc796f3d6b9637ed70475ab9cafd3409f82e62e428486593068fb19cddfba
                                                                                        • Instruction Fuzzy Hash: C9010070D086049BDB15DFA6C4C579EBBF5EF64358F008869E891DB340E776D948CB82
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094A3D9
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_step.SQLITE3 ref: 6094A3E7
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6094A402
                                                                                        • sqlite3_reset.SQLITE3 ref: 6094A428
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_leave$sqlite3_bind_int64sqlite3_column_int64sqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 3728028068-0
                                                                                        • Opcode ID: 36b1074b6e6477a387ea10b58b6e9ea754f79c8a576aeb000f8039753d9ef6a1
                                                                                        • Instruction ID: c43c65ff389e771b703082c780242983d9fc902193402a70a3488ab2bd704049
                                                                                        • Opcode Fuzzy Hash: 36b1074b6e6477a387ea10b58b6e9ea754f79c8a576aeb000f8039753d9ef6a1
                                                                                        • Instruction Fuzzy Hash: 0201E9B0A093049BDB40AF2CC48975ABBE5EF64218F15886DE88DCB345E675D8808B81
                                                                                        APIs
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095EC32
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095EC53
                                                                                        • sqlite3_step.SQLITE3 ref: 6095EC5E
                                                                                        • sqlite3_reset.SQLITE3 ref: 6095EC69
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_mutex_leave$sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2747803115-0
                                                                                        • Opcode ID: 50e4eb3cb8e8e2e25bd7d2b81bdf65ac31c72e0cbc77de3173617370433528be
                                                                                        • Instruction ID: 25ce999da4360d75670234b34d85d314b701549ea68776dc22f464d6579ab5e7
                                                                                        • Opcode Fuzzy Hash: 50e4eb3cb8e8e2e25bd7d2b81bdf65ac31c72e0cbc77de3173617370433528be
                                                                                        • Instruction Fuzzy Hash: BE11DBB4A086049BCB04DF69C0C565EFBF6EFA8314F04C869E889CB345E775E881CB91
                                                                                        APIs
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6095EBA1
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_blob.SQLITE3 ref: 6095EBCA
                                                                                        • sqlite3_step.SQLITE3 ref: 6095EBD5
                                                                                        • sqlite3_reset.SQLITE3 ref: 6095EBE0
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_leave$sqlite3_bind_blobsqlite3_bind_int64sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 1956248851-0
                                                                                        • Opcode ID: 2f158d5ec82c4b79d90623f7b04d1a1cf9fca395b10f7b5d673e50a9eef93412
                                                                                        • Instruction ID: 88ab5e3f6c5a5f2db81ded2790688a6ba74025902715a7c07bdb8f2271cb5a28
                                                                                        • Opcode Fuzzy Hash: 2f158d5ec82c4b79d90623f7b04d1a1cf9fca395b10f7b5d673e50a9eef93412
                                                                                        • Instruction Fuzzy Hash: B80184B4909304ABDB00EF69C48579EFBF5EFA4358F01885EF89897344E7B5D9448B82
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: DISTINCT$GROUP BY$ORDER BY$(
                                                                                        • API String ID: 0-2001190722
                                                                                        • Opcode ID: 097765692cef803eafab4409549598f1b9fc2bc3f18a685c95e611f1e347ca5f
                                                                                        • Instruction ID: 9b01fafc96a6efbd205718b6c8d5b22a8f3cd1776a5a2ad57ba9435dea6ae5cf
                                                                                        • Opcode Fuzzy Hash: 097765692cef803eafab4409549598f1b9fc2bc3f18a685c95e611f1e347ca5f
                                                                                        • Instruction Fuzzy Hash: 6FA2C774A04228CFDB24DF28C880B99B7B2BF99304F1085E9E499AB355DB35DE85CF51
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3 ref: 60963DCD
                                                                                        • sqlite3_free.SQLITE3 ref: 60963DFE
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 60963E55
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 3930042888-0
                                                                                        • Opcode ID: 14c4606fbf394dde861cb48abb5930545d506f9ed8b11cf9d33c3077d67fcae3
                                                                                        • Instruction ID: dbf3d5f4d14ad81e9a7f9d319bd0d9f76bcb21804b32c46ae675e594ad65665b
                                                                                        • Opcode Fuzzy Hash: 14c4606fbf394dde861cb48abb5930545d506f9ed8b11cf9d33c3077d67fcae3
                                                                                        • Instruction Fuzzy Hash: 1DA13674A14219CFEB05CFA9C490B9EBBB6BF68304F21C069E855AB355D735EC42CB90
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6091DDB2
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_double.SQLITE3 ref: 6091DDCA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_doublesqlite3_bind_int64sqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465616180-0
                                                                                        • Opcode ID: ae2a661dddfecdedf9bc12bc7538baa26eefcb2e2be714c54bb93e25510407b9
                                                                                        • Instruction ID: a0f1042a07d15526882d3d81ede0e23fc16e6456616b9caf6cc228a67c6e9094
                                                                                        • Opcode Fuzzy Hash: ae2a661dddfecdedf9bc12bc7538baa26eefcb2e2be714c54bb93e25510407b9
                                                                                        • Instruction Fuzzy Hash: F6212DB460E7489BDB08DF19D4C119ABBE6EFA8324F10C59AEC984B385D334D990CB95
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B22D
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B24B
                                                                                        • sqlite3_step.SQLITE3 ref: 6094B259
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 3305529457-0
                                                                                        • Opcode ID: 1e5ab286f2bf8679664d60956cee9edb099cd9f471fb5fdbae6c3a74e51a2067
                                                                                        • Instruction ID: cbac1b2211099cf16e5ccc4da94a32f1c83183baa5f35796ac5cfcb823f057ec
                                                                                        • Opcode Fuzzy Hash: 1e5ab286f2bf8679664d60956cee9edb099cd9f471fb5fdbae6c3a74e51a2067
                                                                                        • Instruction Fuzzy Hash: 2C01A8B45087049BCB00DF19C8C968ABBE5FF98754F14C869FC888B305D374E844CBA5
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B2A4
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6094B2C2
                                                                                        • sqlite3_step.SQLITE3 ref: 6094B2D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 3305529457-0
                                                                                        • Opcode ID: b583a8d84f1041664a30b1fa1a0ab6c72873eb9fa36fc4b91752155cf8a8a672
                                                                                        • Instruction ID: d6b4329e26482d7c6d5f2f09a808f48666b355b863455d18cb901c18b9d491d8
                                                                                        • Opcode Fuzzy Hash: b583a8d84f1041664a30b1fa1a0ab6c72873eb9fa36fc4b91752155cf8a8a672
                                                                                        • Instruction Fuzzy Hash: 7401A8B45097049FCB00DF19C4C968ABBE5EF98754F14C86AFC888B305E374E844CBA5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: q$t
                                                                                        • API String ID: 0-217223158
                                                                                        • Opcode ID: eb13f47f793a98c1589a7b666e3a1e7021b5557c95a434767d14805b7012d89d
                                                                                        • Instruction ID: 33743cb1820fd07a993e549a052478a234369cd3d720e7505e86818a36a0978f
                                                                                        • Opcode Fuzzy Hash: eb13f47f793a98c1589a7b666e3a1e7021b5557c95a434767d14805b7012d89d
                                                                                        • Instruction Fuzzy Hash: 7BC2A274A042188FDB18CF59C490B9DBBF2BF99304F2481A9E859AB355DB35ED82CF41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 28c11a7d86aa028781fb5740b8d84e118c31d035ee62f9e55880807926b446b8
                                                                                        • Instruction ID: 3ac9967e2cab5d50ba08485ec09418fe0a92c4ed673d4e9905ef75aaa339f3ea
                                                                                        • Opcode Fuzzy Hash: 28c11a7d86aa028781fb5740b8d84e118c31d035ee62f9e55880807926b446b8
                                                                                        • Instruction Fuzzy Hash: 55225774E142598FDB04CFA8D480B9DBBB2BFAA314F148199D859AB359D736DC81CF80
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: @$@
                                                                                        • API String ID: 0-149943524
                                                                                        • Opcode ID: 8f3de5c35e3f5fa586f2116e94e386ffa618542c2458384aee70b1e9dd52d22d
                                                                                        • Instruction ID: 9d53443183ac79b486b55b6a626d03509d78d36673802fca476a54d4d24b85b6
                                                                                        • Opcode Fuzzy Hash: 8f3de5c35e3f5fa586f2116e94e386ffa618542c2458384aee70b1e9dd52d22d
                                                                                        • Instruction Fuzzy Hash: 4A82F574A04228CFDB68CF28C980B99B7B2BF59318F1481D9D849AB356D771ED85CF90
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6090C182
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6090C1C7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1477753154-0
                                                                                        • Opcode ID: 3984e49e8f14b40e9a040f80f027e88cb9d35bd0f4a7167a6d516d6a729bd2c1
                                                                                        • Instruction ID: 5bda96a7976af9112a181cac41d708e9c19a401edd11a178ae47e9d54fc79602
                                                                                        • Opcode Fuzzy Hash: 3984e49e8f14b40e9a040f80f027e88cb9d35bd0f4a7167a6d516d6a729bd2c1
                                                                                        • Instruction Fuzzy Hash: 8F01F4715082148BCB049F2DC4C5B6ABBF6EF69318F044498ED414B356D374D886CBD1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: d$q
                                                                                        • API String ID: 0-1718950626
                                                                                        • Opcode ID: 91b9c4d99b680fe25513cf13436b68a10abadeed6a68b3f0862793ecb04d995a
                                                                                        • Instruction ID: 99abef5a6577d20dcc4abc17708cfdca9daabd20bca63bb67fb52969ec3f5d20
                                                                                        • Opcode Fuzzy Hash: 91b9c4d99b680fe25513cf13436b68a10abadeed6a68b3f0862793ecb04d995a
                                                                                        • Instruction Fuzzy Hash: 2B124970B086188BD715DF68C49175EBBF2BBA8708F10806CE5999B385DB79DC82CF45
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: FOREIGN KEY constraint failed$oid
                                                                                        • API String ID: 0-104532129
                                                                                        • Opcode ID: f58494d25fa108ecaeeab8e87e6d2e67c5a02ba244774a86f925f462a8605b2d
                                                                                        • Instruction ID: eabf2f80cc01f49f2a93a799010b88954532d880b4df0a318682b73e3280b967
                                                                                        • Opcode Fuzzy Hash: f58494d25fa108ecaeeab8e87e6d2e67c5a02ba244774a86f925f462a8605b2d
                                                                                        • Instruction Fuzzy Hash: 3312D774A082088FDB04DFA8C49179EBBF2BFA8308F10856DE459AB355DB79D846CF41
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 2$rowid
                                                                                        • API String ID: 0-1906602917
                                                                                        • Opcode ID: 048e1c32778e3b1705a8101f0c51e5492f62b8e35f36e7611e974756f2802ffb
                                                                                        • Instruction ID: 09598dc15d6c77236a83ad164b090e93e0a9d76c9076bae2fe9960149d937c04
                                                                                        • Opcode Fuzzy Hash: 048e1c32778e3b1705a8101f0c51e5492f62b8e35f36e7611e974756f2802ffb
                                                                                        • Instruction Fuzzy Hash: 19F1E674B082188BDB14DF69C89179EB7F2BB99308F10856DE89AAB341D734EC95CF41
                                                                                        APIs
                                                                                          • Part of subcall function 6091D93E: sqlite3_log.SQLITE3 ref: 6091D9E6
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6091DB96
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: 2d863f5b469a19bcc93afd78fa4b3563102de0d19e67a8d27f7492e65e0a8d40
                                                                                        • Instruction ID: c68f18aee3fb4567658c5aa661cb2fcb43f5938e111f09c9a6c88d53d526f96a
                                                                                        • Opcode Fuzzy Hash: 2d863f5b469a19bcc93afd78fa4b3563102de0d19e67a8d27f7492e65e0a8d40
                                                                                        • Instruction Fuzzy Hash: CD318DB4B083589FCB04DF69C88069EBBF6FF99214F008599EC4897354D734D980CB95
                                                                                        APIs
                                                                                          • Part of subcall function 6091D93E: sqlite3_log.SQLITE3 ref: 6091D9E6
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6091DD55
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: ffb5e7fb63d69584de9c29afdda6f8c1a6512055977363d1c70c41cf2d30cf51
                                                                                        • Instruction ID: b0c923bb3ad6c939e6963cd4c783f61e3a7e0ae5fef2be78a1fc4f16135bef29
                                                                                        • Opcode Fuzzy Hash: ffb5e7fb63d69584de9c29afdda6f8c1a6512055977363d1c70c41cf2d30cf51
                                                                                        • Instruction Fuzzy Hash: 5101D131704A2897CB10AF29EC8918EBBB5FF6A318B014098ECC1AB344DB35E965C791
                                                                                        APIs
                                                                                          • Part of subcall function 6091D93E: sqlite3_log.SQLITE3 ref: 6091D9E6
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6091DAEC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: 17ab5d1e5ae88ce84f32cb132e27bbebfbcc8a7da81dd7d560dd927d95770074
                                                                                        • Instruction ID: 254c87ae36e2aed14dad40fc07707785564b4e206a423e504a478cf2da5fd59b
                                                                                        • Opcode Fuzzy Hash: 17ab5d1e5ae88ce84f32cb132e27bbebfbcc8a7da81dd7d560dd927d95770074
                                                                                        • Instruction Fuzzy Hash: D801AD75B007148BCB208F2AC88164BBBF5EFA8214F048659EC81DB301D7B5EE46CBC0
                                                                                        APIs
                                                                                          • Part of subcall function 6091D93E: sqlite3_log.SQLITE3 ref: 6091D9E6
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: 6b75cbe0ad9ac4c22fc38e0c453329f5572f4c55760f4092ca37bf8c786d603f
                                                                                        • Instruction ID: fe52e4a913c66374789f16ce3f8032c3bf81fc93b98722003451c44a48558d88
                                                                                        • Opcode Fuzzy Hash: 6b75cbe0ad9ac4c22fc38e0c453329f5572f4c55760f4092ca37bf8c786d603f
                                                                                        • Instruction Fuzzy Hash: 5E018175B00609ABCB00CF29D48198ABBB6FF98358B158115EC049B310D770FD91CBD0
                                                                                        APIs
                                                                                          • Part of subcall function 6091D93E: sqlite3_log.SQLITE3 ref: 6091D9E6
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6091DC5C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1465156292-0
                                                                                        • Opcode ID: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                        • Instruction ID: f44ba3888af6788bd88efd13793bb11d704ff480101f3b8223530f42ee2dc25a
                                                                                        • Opcode Fuzzy Hash: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                        • Instruction Fuzzy Hash: 83E0EC74B0830CABCB04DF6AC4C194AF7BAEF68258F10C6A5EC458B305E230E985CB81
                                                                                        APIs
                                                                                        • sqlite3_bind_int64.SQLITE3 ref: 6091DCEC
                                                                                          • Part of subcall function 6091DC6A: sqlite3_mutex_leave.SQLITE3 ref: 6091DCBB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 3064317574-0
                                                                                        • Opcode ID: a4f9c088a6f20d3eb9f6bf1c73ec6f03aa6f3b45fd625f9dba493f5a190604ce
                                                                                        • Instruction ID: b03e9662d481b462fbf02baa1197ec10bbc0add16f381a0be07cbb230067e745
                                                                                        • Opcode Fuzzy Hash: a4f9c088a6f20d3eb9f6bf1c73ec6f03aa6f3b45fd625f9dba493f5a190604ce
                                                                                        • Instruction Fuzzy Hash: 27D092B4A09308AFCB00EF2DC48644EBBE4AF98254F40C86DFC98C7310E274E8408F92
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: adbd30c996fd16b2a829325ab44f0a0ba2e56b449b4fb9e6657dc538dec9de01
                                                                                        • Instruction ID: 4eeb065600a0c3025de7f89379ab55623ce7c6241a2ec54135a5869325d9ab8f
                                                                                        • Opcode Fuzzy Hash: adbd30c996fd16b2a829325ab44f0a0ba2e56b449b4fb9e6657dc538dec9de01
                                                                                        • Instruction Fuzzy Hash: 3452E370A043188FDB15CF69C88079EBBF2AF99308F208569D899AB395D774DD86CF41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3ff8a8efa5c0e6909f1b0d55c07ca131e0241568168e5a4cf94726115b9d944a
                                                                                        • Instruction ID: 6941b92c2b1965ca1011e87662a52d336d286606ce8b0b9b40aa6932f72ff23d
                                                                                        • Opcode Fuzzy Hash: 3ff8a8efa5c0e6909f1b0d55c07ca131e0241568168e5a4cf94726115b9d944a
                                                                                        • Instruction Fuzzy Hash: D8E10973B0D6858BC7098A3CC8941A9BBB3AFBB210B2E82E9D4555F3D6C174CD45D7A0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 08a6f03b63c3efec34fa574ad3da5221528c92ac474eeb785b6cfdb4627a572c
                                                                                        • Instruction ID: 7925d542df313860d1d8e87d033447e5f48c870da460f4551fc240ad1dcca836
                                                                                        • Opcode Fuzzy Hash: 08a6f03b63c3efec34fa574ad3da5221528c92ac474eeb785b6cfdb4627a572c
                                                                                        • Instruction Fuzzy Hash: 878139B07083048BEB15DF69C45135EBBE3EBA9308F10C45DE4899B395CB79C8869F86
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f3dafd58228792e77980ff2a1d1a139638b132fba9d06a647e5d01dc999822b3
                                                                                        • Instruction ID: d7a8d75d895d02cf11a95d739c3f83b613bef8ccf389cb92df6dd48628d23e67
                                                                                        • Opcode Fuzzy Hash: f3dafd58228792e77980ff2a1d1a139638b132fba9d06a647e5d01dc999822b3
                                                                                        • Instruction Fuzzy Hash: E3610A707087048BEB05DF69C45536EBBF3ABA5708F10C46DE8899B385DB79C895CB82
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a59d87207625365d9d25d016f5c80020e1a98d1f6d0359848c7b4ce1eb42bdc0
                                                                                        • Instruction ID: a09dfd5ae0fa5d0f9bb0a9f8b4a22546f77a42e424aff251cc792d0b41b33a86
                                                                                        • Opcode Fuzzy Hash: a59d87207625365d9d25d016f5c80020e1a98d1f6d0359848c7b4ce1eb42bdc0
                                                                                        • Instruction Fuzzy Hash: 3A417772F1412957EF04C9AEC8502EEB6F7ABE9360F268626E815F7354D674DC028B90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5b53c3e538c3bb04aa5627c6fab7d76f38406483066ea63e533442fc0065a622
                                                                                        • Instruction ID: 7df1c9c892690c2ed006cc394c19bb61d3fcb53b5b2b3b97f022b195c1b2b16c
                                                                                        • Opcode Fuzzy Hash: 5b53c3e538c3bb04aa5627c6fab7d76f38406483066ea63e533442fc0065a622
                                                                                        • Instruction Fuzzy Hash: A031B772B001110BAF14DE9E98D01EEF7E7ABDC264B29817EE909E7748D9B5DC0AC650
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 27cd1a1db6350a5652be618cb352969fe2d1c11a8093f549374ed784605744c6
                                                                                        • Instruction ID: 20a1533aa47e6a38d55c7208f8e5c22ab5c50fa317e9cc04da681538c3b3e496
                                                                                        • Opcode Fuzzy Hash: 27cd1a1db6350a5652be618cb352969fe2d1c11a8093f549374ed784605744c6
                                                                                        • Instruction Fuzzy Hash: 4D110D73F1052947CB18DDBF8C4129BF5E39BC8211B5AC23DA929E7395E5749E014AC0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c727b496184557f215c703c9ebbc5cbc338b085fdedab73c364839125c2eaca0
                                                                                        • Instruction ID: 5db2325e911f56d7963fd3e82a046c8a6f50ef6e43207b8687953612c951c77d
                                                                                        • Opcode Fuzzy Hash: c727b496184557f215c703c9ebbc5cbc338b085fdedab73c364839125c2eaca0
                                                                                        • Instruction Fuzzy Hash: 17F0C0702052858BE706EB14C159B547FAABB5531CF0941DCD9964B5E3E3B4D8C8D781
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2c955d5ed926a18f25f3a5c6f92ea63bafa32fedfd87348cb5dfaef39702d099
                                                                                        • Instruction ID: 263d5b6188297ebcfb16d008d9c3579eed2b58787e9fc9dd9e96146732d2d0d2
                                                                                        • Opcode Fuzzy Hash: 2c955d5ed926a18f25f3a5c6f92ea63bafa32fedfd87348cb5dfaef39702d099
                                                                                        • Instruction Fuzzy Hash: 07E0EC347041099BD7089F59D9C192B73EBEB98654760846C99128B225E735E9829A40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                        • Instruction ID: 9e112cc091eee33ce763b33062311071728937df51c3ed9b76734cae75fd919c
                                                                                        • Opcode Fuzzy Hash: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                        • Instruction Fuzzy Hash: 39E0E2B860830DABDF00CF09D8C188A7BA9FB08364F108119ED190B301C371EA548BA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                        • Instruction ID: 847ee3550613523f3a8fd3f7529f9851ecb365b6932f0aea60c871eb3a745c9a
                                                                                        • Opcode Fuzzy Hash: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                        • Instruction Fuzzy Hash: C1E0E2B860830DABDF00CF09D8C198A7BA9FB08264F108119ED190B300C371EA548BA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                        • Instruction ID: 9cb1c43cb15c9cd79dfef38b9308c162ffb276c888855094f06e440eb4b946c2
                                                                                        • Opcode Fuzzy Hash: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                        • Instruction Fuzzy Hash: 75C08065304208574F00ED2DD8C154677DFD71C1687208039FD0B87301DA31FD0C4251
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a6a049abf5687a766b504acfcaabd15b835bff51c1fb66197d94b79d0c25d4b7
                                                                                        • Instruction ID: 3dfcf960a7d0b1510ad00c5c84b969a932febcce1569b4b317539507354eac44
                                                                                        • Opcode Fuzzy Hash: a6a049abf5687a766b504acfcaabd15b835bff51c1fb66197d94b79d0c25d4b7
                                                                                        • Instruction Fuzzy Hash: EFB0921421060B829B088B19984142B77EEBF9895875480645C018A109EA70FC8286C1
                                                                                        APIs
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 60960C44
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60960C61
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 60960CA8
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60960CCA
                                                                                        • sqlite3_free.SQLITE3 ref: 60960CF3
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 60960DF7
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960E64
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960E72
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960E88
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 60960EAF
                                                                                        • sqlite3_prepare.SQLITE3 ref: 60960EE8
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60960EF6
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60960F58
                                                                                        • sqlite3_finalize.SQLITE3(?), ref: 60960FC3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mprintf$sqlite3_strnicmp$sqlite3_finalizesqlite3_mallocsqlite3_mutex_entersqlite3_prepare
                                                                                        • String ID: fts3$simple
                                                                                        • API String ID: 4021629296-2774786773
                                                                                        • Opcode ID: 6b76073378de654d1666aff1992908b98a25fcf9008b4aee1aa91c97747ea564
                                                                                        • Instruction ID: 2b8d30900e6e40b2c3645d1db5a2afa0eb2eef93aac2ed41e9d2b8f76213f94f
                                                                                        • Opcode Fuzzy Hash: 6b76073378de654d1666aff1992908b98a25fcf9008b4aee1aa91c97747ea564
                                                                                        • Instruction Fuzzy Hash: 26F116B0918329CFEB209F64C89039EBBF6BF66308F15859ED499A7240D775D981CF42
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 6096B967
                                                                                          • Part of subcall function 6091233C: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609123BA
                                                                                        • sqlite3_log.SQLITE3 ref: 6096B9A5
                                                                                        • sqlite3_free.SQLITE3 ref: 6096BA27
                                                                                        • sqlite3_free.SQLITE3 ref: 6096C116
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6096C125
                                                                                        • sqlite3_errcode.SQLITE3 ref: 6096C12D
                                                                                        • sqlite3_close.SQLITE3 ref: 6096C13C
                                                                                        • sqlite3_create_function.SQLITE3 ref: 6096C19D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_closesqlite3_create_functionsqlite3_errcodesqlite3_initializesqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: BINARY$NOCASE$RTRIM$porter$rtree$rtree_i32$simple
                                                                                        • API String ID: 1320758876-2501389569
                                                                                        • Opcode ID: 366fad459ada555e5cd2a9ed50c4dac4cbd54dd2ab05f70ca6b4158efa96e411
                                                                                        • Instruction ID: 1e66b371fc58f65d1afba98d5cfc6c2a13170be5e4df9abd54d51f57297fe1bb
                                                                                        • Opcode Fuzzy Hash: 366fad459ada555e5cd2a9ed50c4dac4cbd54dd2ab05f70ca6b4158efa96e411
                                                                                        • Instruction Fuzzy Hash: B90230B06183059FEB109F24C49535ABFF6AFA5308F11886CE8958F356D7B9D885CF82
                                                                                        APIs
                                                                                        • sqlite3_overload_function.SQLITE3 ref: 6096BEE5
                                                                                          • Part of subcall function 6091D20D: sqlite3_mutex_enter.SQLITE3 ref: 6091D22F
                                                                                          • Part of subcall function 6091D20D: sqlite3_mutex_leave.SQLITE3 ref: 6091D2A7
                                                                                        • sqlite3_overload_function.SQLITE3 ref: 6096BF07
                                                                                        • sqlite3_overload_function.SQLITE3 ref: 6096BF29
                                                                                        • sqlite3_overload_function.SQLITE3 ref: 6096BF4B
                                                                                        • sqlite3_create_module.SQLITE3 ref: 6096BFD3
                                                                                        • sqlite3_overload_function.SQLITE3 ref: 6096BF6D
                                                                                          • Part of subcall function 6091D4E5: sqlite3_mutex_enter.SQLITE3 ref: 6091D4FB
                                                                                          • Part of subcall function 6091D4E5: sqlite3_log.SQLITE3 ref: 6091D540
                                                                                          • Part of subcall function 6091D4E5: sqlite3_mutex_leave.SQLITE3 ref: 6091D5C9
                                                                                        • sqlite3_free.SQLITE3 ref: 6096BFE6
                                                                                        • sqlite3_create_function.SQLITE3 ref: 6096BEC3
                                                                                          • Part of subcall function 6091D3FE: sqlite3_create_function_v2.SQLITE3 ref: 6091D443
                                                                                        • sqlite3_create_function.SQLITE3 ref: 6096C038
                                                                                        • sqlite3_create_function.SQLITE3 ref: 6096C082
                                                                                        • sqlite3_wal_autocheckpoint.SQLITE3 ref: 6096C10B
                                                                                        • sqlite3_free.SQLITE3 ref: 6096C116
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6096C125
                                                                                        • sqlite3_errcode.SQLITE3 ref: 6096C12D
                                                                                        • sqlite3_close.SQLITE3 ref: 6096C13C
                                                                                        • sqlite3_create_function.SQLITE3 ref: 6096C19D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_overload_function$sqlite3_create_function$sqlite3_mutex_leave$sqlite3_freesqlite3_mutex_enter$sqlite3_closesqlite3_create_function_v2sqlite3_create_modulesqlite3_errcodesqlite3_logsqlite3_wal_autocheckpoint
                                                                                        • String ID: fts3$fts4$matchinfo$offsets$optimize$rtree$rtree_i32$snippet
                                                                                        • API String ID: 367481294-2251443531
                                                                                        • Opcode ID: e1f6cb53229dc5be9c79bfb1f6ffb3abb3fbe0309407a5aa02af132dd7230f48
                                                                                        • Instruction ID: 064b9c8e6621a250f8327791b5a0fe848c1e5b7794fe358879d7f4728ddfd552
                                                                                        • Opcode Fuzzy Hash: e1f6cb53229dc5be9c79bfb1f6ffb3abb3fbe0309407a5aa02af132dd7230f48
                                                                                        • Instruction Fuzzy Hash: 8C61EDB121D7069BE311AF24C89531EBAE6AFB0758F11CC2CF4958B351EBB5C8858F42
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3 ref: 6096AD2E
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6096AD5F
                                                                                          • Part of subcall function 6091DEDF: sqlite3_vsnprintf.SQLITE3 ref: 6091DF00
                                                                                        • sqlite3_free.SQLITE3 ref: 6096ADA2
                                                                                        • sqlite3_free.SQLITE3 ref: 6096ADAA
                                                                                        • sqlite3_free.SQLITE3 ref: 6096AEE2
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 6096AF00
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6096AF3F
                                                                                        • sqlite3_randomness.SQLITE3 ref: 6096AF5B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_randomnesssqlite3_vsnprintf
                                                                                        • String ID: etilqs_$winGetTempname1$winGetTempname2$winGetTempname3$winGetTempname4$winGetTempname5
                                                                                        • API String ID: 4138564650-3409217566
                                                                                        • Opcode ID: 0205b9c9913dc005cf56c681b4356dadea4de4f01171fa40b3dfba198ee9000c
                                                                                        • Instruction ID: c89195e31b2f098c1140b4ea50ceb16de50668c572e8c2e7892f884c3aa56c05
                                                                                        • Opcode Fuzzy Hash: 0205b9c9913dc005cf56c681b4356dadea4de4f01171fa40b3dfba198ee9000c
                                                                                        • Instruction Fuzzy Hash: 618139B1A187148FE711AF69C49176EBBF7AF75708F00C82EE4859B241DB39C8419F52
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3 ref: 60925B79
                                                                                        • sqlite3_free.SQLITE3 ref: 60925BD6
                                                                                        • sqlite3_free.SQLITE3 ref: 60925BDE
                                                                                        • sqlite3_free.SQLITE3 ref: 60925C00
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                          • Part of subcall function 6090AF60: sqlite3_free.SQLITE3 ref: 6090B005
                                                                                        • sqlite3_free.SQLITE3 ref: 60925CD6
                                                                                        • sqlite3_win32_mbcs_to_utf8.SQLITE3 ref: 60925CDE
                                                                                        • sqlite3_free.SQLITE3 ref: 60925CE8
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 60925D1B
                                                                                        • sqlite3_free.SQLITE3 ref: 60925D23
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 60925D68
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_win32_mbcs_to_utf8
                                                                                        • String ID: \$winFullPathname1$winFullPathname2$winFullPathname3$winFullPathname4
                                                                                        • API String ID: 937752868-2111127023
                                                                                        • Opcode ID: 569e49ff249fdb02bc65ee45f41d2fbc6bda5382cd9930d2fada71453ca47588
                                                                                        • Instruction ID: 08b2ad56553beab3df7ba7658f2532c4fa99e55321f0365e62968009fae21e24
                                                                                        • Opcode Fuzzy Hash: 569e49ff249fdb02bc65ee45f41d2fbc6bda5382cd9930d2fada71453ca47588
                                                                                        • Instruction Fuzzy Hash: 857139706187059FEB00AF69D48466EBFF6AF65718F10C82DE8959B348EB78C841CF52
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp$sqlite3_mprintf$sqlite3_malloc$sqlite3_freesqlite3_vfs_find
                                                                                        • String ID: @$access$cache
                                                                                        • API String ID: 4158134138-1361544076
                                                                                        • Opcode ID: 2603ec14dd339d0e391022093b87f62d663219f0be4cb5c6d5a1c6c3ee473a77
                                                                                        • Instruction ID: f2585cc4efe2f61efd8899c47cde1f60a7ecdfc47265e564fede7e93ec56cf09
                                                                                        • Opcode Fuzzy Hash: 2603ec14dd339d0e391022093b87f62d663219f0be4cb5c6d5a1c6c3ee473a77
                                                                                        • Instruction Fuzzy Hash: D1D19170A183458BDB15CF68E0803AEBBF7EFAA304F14846DD4999B349D739D842DB52
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3 ref: 6096B370
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6096B399
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6096B53A
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6096B749
                                                                                        • sqlite3_mutex_alloc.SQLITE3 ref: 6096B76F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_freesqlite3_mutex_allocsqlite3_mutex_leavesqlite3_snprintf
                                                                                        • String ID: winOpenShm$winShmMap1$winShmMap2$winShmMap3
                                                                                        • API String ID: 3461448743-1629717226
                                                                                        • Opcode ID: b58a80f5d8091b0f82f56b323808aeb01c561fb6cad3043665ca11ed61ac2d80
                                                                                        • Instruction ID: d0850ac43496f3ea579835e26f294b65f1788f0bbefe4be559abbcd70082ae57
                                                                                        • Opcode Fuzzy Hash: b58a80f5d8091b0f82f56b323808aeb01c561fb6cad3043665ca11ed61ac2d80
                                                                                        • Instruction Fuzzy Hash: 96D114B4A18705DFEB04DF28C48075ABBF6FFA9304F108529E8859B355EB78D881CB81
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 609293C8
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60929408
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 60929597
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6092963C
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6092966D
                                                                                        • sqlite3_free.SQLITE3 ref: 609296A0
                                                                                        • sqlite3_free.SQLITE3 ref: 60929472
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 609296AD
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6092944F
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                        • sqlite3_malloc.SQLITE3 ref: 609294AA
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 609294D8
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60929537
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 609296DF
                                                                                        • sqlite3_free.SQLITE3 ref: 609296EC
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6092977E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mallocsqlite3_mprintf$sqlite3_mutex_entersqlite3_snprintf$sqlite3_initializesqlite3_mutex_leavesqlite3_strnicmpsqlite3_vmprintf
                                                                                        • String ID: te3_
                                                                                        • API String ID: 1158832363-2226833481
                                                                                        • Opcode ID: deac5691b12f900a19752da73d6462573d299aeee5fcd4bd5cd0197290606213
                                                                                        • Instruction ID: 032f96c341adf4c03f5d3cdf0cad928d6a9d2a11424a9aa7b08911b45c1201eb
                                                                                        • Opcode Fuzzy Hash: deac5691b12f900a19752da73d6462573d299aeee5fcd4bd5cd0197290606213
                                                                                        • Instruction Fuzzy Hash: 9FD1D1B4A197099FDB14DF68E58069EBBF6FFA8304F10842DE8999B304D734E942CB51
                                                                                        APIs
                                                                                        Strings
                                                                                        • SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' , xrefs: 609480A9
                                                                                        • ATTACH ':memory:' AS vacuum_db;, xrefs: 60947EF5
                                                                                        • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';, xrefs: 60948129
                                                                                        • PRAGMA vacuum_db.synchronous=OFF, xrefs: 60947F7C
                                                                                        • SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 60948089
                                                                                        • SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' , xrefs: 60948109
                                                                                        • BEGIN;, xrefs: 60947F9C
                                                                                        • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 609480E9
                                                                                        • SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %', xrefs: 609480C9
                                                                                        • INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0), xrefs: 60948149
                                                                                        • ATTACH '' AS vacuum_db;, xrefs: 60947EEA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: ATTACH '' AS vacuum_db;$ATTACH ':memory:' AS vacuum_db;$BEGIN;$INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)$PRAGMA vacuum_db.synchronous=OFF$SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' $SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0$SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'$SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' $SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';$SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                                                                                        • API String ID: 632333372-52344843
                                                                                        • Opcode ID: 4c3d10f44ef428f3eb378b1d976f4f628e7a7f6b2773856354c6cd5ef0e3a2a8
                                                                                        • Instruction ID: d12f8f480b760b2eb07f0d8f9cc99cf5df1f22b67a6b6b0d88af7af489ff324c
                                                                                        • Opcode Fuzzy Hash: 4c3d10f44ef428f3eb378b1d976f4f628e7a7f6b2773856354c6cd5ef0e3a2a8
                                                                                        • Instruction Fuzzy Hash: F6020770A05629CBEB25CF19C894B8EB7F6BF65304F1081EAE859AB351D774DE818F40
                                                                                        APIs
                                                                                          • Part of subcall function 60928AB9: sqlite3_value_bytes.SQLITE3 ref: 60928AD1
                                                                                          • Part of subcall function 60928AB9: sqlite3_mprintf.SQLITE3 ref: 60928AE6
                                                                                          • Part of subcall function 60928AB9: sqlite3_free.SQLITE3 ref: 60928AF9
                                                                                          • Part of subcall function 6095F371: sqlite3_bind_int64.SQLITE3 ref: 6095F3B9
                                                                                          • Part of subcall function 6095F371: sqlite3_step.SQLITE3 ref: 6095F3C8
                                                                                          • Part of subcall function 6095F371: sqlite3_reset.SQLITE3 ref: 6095F3D8
                                                                                          • Part of subcall function 6095F371: sqlite3_result_error_code.SQLITE3 ref: 6095F402
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095F743
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F9A9
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6095F9CC
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F9D7
                                                                                        • sqlite3_result_text.SQLITE3 ref: 6095F9FB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_result_error_code$sqlite3_bind_int64sqlite3_mallocsqlite3_mprintfsqlite3_resetsqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                        • String ID: offsets
                                                                                        • API String ID: 463808202-2642679573
                                                                                        • Opcode ID: 57eca01c67e19f9b390d97a6869cc9dd642ef7f6d639f0282a4a1ddd446c40ee
                                                                                        • Instruction ID: 18bdb6dd72415a1d562b0cc3929e06dd17db894fbca103a14b454ce6672c7742
                                                                                        • Opcode Fuzzy Hash: 57eca01c67e19f9b390d97a6869cc9dd642ef7f6d639f0282a4a1ddd446c40ee
                                                                                        • Instruction Fuzzy Hash: 15C1F674A447189FDB01CF59C590B8DBBF2BFA8318F108569E889AB304D734D989CF52
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3 ref: 6096B028
                                                                                          • Part of subcall function 6096ACB2: sqlite3_free.SQLITE3 ref: 6096AD2E
                                                                                        • sqlite3_free.SQLITE3 ref: 6096B1D0
                                                                                        • sqlite3_free.SQLITE3 ref: 6096B1DB
                                                                                        • sqlite3_log.SQLITE3 ref: 6096B23A
                                                                                          • Part of subcall function 60911C76: sqlite3_win32_sleep.SQLITE3 ref: 60911CAE
                                                                                        • sqlite3_free.SQLITE3 ref: 6096B260
                                                                                        • sqlite3_free.SQLITE3 ref: 6096B26B
                                                                                        • sqlite3_uri_boolean.SQLITE3 ref: 6096B2A2
                                                                                        • sqlite3_free.SQLITE3(?), ref: 6096B304
                                                                                        • sqlite3_free.SQLITE3(?), ref: 6096B30F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_logsqlite3_uri_booleansqlite3_win32_sleep
                                                                                        • String ID: winOpen
                                                                                        • API String ID: 4181154385-2556188131
                                                                                        • Opcode ID: d23c6b3671f50e06c9f1f9d8f0ea9770b6ac80d6d01e806a8ac823b15f035e9d
                                                                                        • Instruction ID: ff6942a40bbf01e44f86d35f1f4a0839d98f2fa466892bcd667743529a0eff26
                                                                                        • Opcode Fuzzy Hash: d23c6b3671f50e06c9f1f9d8f0ea9770b6ac80d6d01e806a8ac823b15f035e9d
                                                                                        • Instruction Fuzzy Hash: 93A12770918309CBEB00DF69C49578EBBF6BF65308F10852DE8A49B244E775C985CF82
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_result_textsqlite3_snprintf$sqlite3_freesqlite3_result_valuesqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID: NULL
                                                                                        • API String ID: 3102899305-324932091
                                                                                        • Opcode ID: 1b057b84a07cce795e2f090a2d0e3a76cf0d42e2b5841145e5be93179833821e
                                                                                        • Instruction ID: 7cfe70e8b124c1fa0c095bcc7db0d3db2323a7f1e3d3cda4d9fe64229e25b380
                                                                                        • Opcode Fuzzy Hash: 1b057b84a07cce795e2f090a2d0e3a76cf0d42e2b5841145e5be93179833821e
                                                                                        • Instruction Fuzzy Hash: 1261BAB090C3858AD7119F68D88435EBFE7ABB6304F15CA9CE4E45B28AD739C844CF42
                                                                                        APIs
                                                                                          • Part of subcall function 6091D7E8: sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A088), ref: 6091D80A
                                                                                        • sqlite3_log.SQLITE3 ref: 6094C6E9
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6094C709
                                                                                        • sqlite3_errcode.SQLITE3 ref: 6094C93D
                                                                                        • sqlite3_errmsg.SQLITE3 ref: 6094C950
                                                                                        • sqlite3_errmsg.SQLITE3 ref: 6094C972
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6094C9BD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_errmsgsqlite3_log$sqlite3_errcodesqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 72737711-0
                                                                                        • Opcode ID: 5c1779dacbe3786378a647ac179651b86921fddd493647e06bdd034d8e09a49f
                                                                                        • Instruction ID: ecb0a9c6c64fdd76f40a599c5f561c609ef604e5d18e18cc8bcbaeb6f4cc157f
                                                                                        • Opcode Fuzzy Hash: 5c1779dacbe3786378a647ac179651b86921fddd493647e06bdd034d8e09a49f
                                                                                        • Instruction Fuzzy Hash: 309128B49083199FDB41DF69C48479EBBF6BF64358F108829E894AB340D778D889CF91
                                                                                        APIs
                                                                                          • Part of subcall function 6095E09B: sqlite3_mprintf.SQLITE3 ref: 6095E0FB
                                                                                          • Part of subcall function 6095E09B: sqlite3_prepare_v2.SQLITE3 ref: 6095E182
                                                                                          • Part of subcall function 6095E09B: sqlite3_free.SQLITE3 ref: 6095E190
                                                                                        • sqlite3_step.SQLITE3 ref: 60969385
                                                                                        • sqlite3_column_text.SQLITE3 ref: 60969435
                                                                                          • Part of subcall function 60922E7B: sqlite3_value_text.SQLITE3 ref: 60922E93
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 60969473
                                                                                          • Part of subcall function 60923BE9: sqlite3_value_bytes.SQLITE3 ref: 60923C01
                                                                                        • sqlite3_reset.SQLITE3 ref: 609694A1
                                                                                        • sqlite3_column_int.SQLITE3 ref: 609693A9
                                                                                          • Part of subcall function 60918C1F: sqlite3_value_int.SQLITE3 ref: 60918C37
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 609693BE
                                                                                        • sqlite3_reset.SQLITE3 ref: 609694B7
                                                                                        • sqlite3_reset.SQLITE3 ref: 609694C3
                                                                                        • sqlite3_step.SQLITE3 ref: 6096950A
                                                                                        • sqlite3_column_int.SQLITE3 ref: 60969524
                                                                                        • sqlite3_reset.SQLITE3 ref: 60969531
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_reset$sqlite3_column_intsqlite3_step$sqlite3_column_bytessqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_value_bytessqlite3_value_intsqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 1488107833-0
                                                                                        • Opcode ID: 0017d700805a3d8f0c565a36f5f2c6553afcc19cada3c432430fbe1bbe532e86
                                                                                        • Instruction ID: 9999543974691de04438021bbb9e2a6eee9a7bf16299f059bde460438a640138
                                                                                        • Opcode Fuzzy Hash: 0017d700805a3d8f0c565a36f5f2c6553afcc19cada3c432430fbe1bbe532e86
                                                                                        • Instruction Fuzzy Hash: 07810670A142198FDB05DF68C480B9EB7F6EFA8304F118469E855AB344EB75DC86CF50
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60923221
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 60923236
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60923244
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 60923276
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60923284
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6092329A
                                                                                        • sqlite3_result_text.SQLITE3 ref: 60923402
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_result_text
                                                                                        • String ID:
                                                                                        • API String ID: 2903785150-0
                                                                                        • Opcode ID: a1021bf57964e68f832abab0ad89a7aefa47104f3687fd613139141cba0c04a0
                                                                                        • Instruction ID: 7540e88ce43b30d9d2cd402c8c1a97254835146c4f9a90ac6ab62d131632892c
                                                                                        • Opcode Fuzzy Hash: a1021bf57964e68f832abab0ad89a7aefa47104f3687fd613139141cba0c04a0
                                                                                        • Instruction Fuzzy Hash: 4671EF74E142199FCB00DFA9D480A9DBBF6BF69314F10856AE854AB348E734ED42CF91
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_bytes$sqlite3_freesqlite3_mprintfsqlite3_result_blobsqlite3_value_blobsqlite3_value_text
                                                                                        • String ID: argument type mismatch$out of memory
                                                                                        • API String ID: 894939291-2444857804
                                                                                        • Opcode ID: a2b1fb466b2dbfe40fa13affc986d93137bdcb56548ef61f6572ba27a80c91d0
                                                                                        • Instruction ID: fdf2f4e290d0cd3df398c3c3a0a0fb0740ed3ed60861daed367b51ada43cde76
                                                                                        • Opcode Fuzzy Hash: a2b1fb466b2dbfe40fa13affc986d93137bdcb56548ef61f6572ba27a80c91d0
                                                                                        • Instruction Fuzzy Hash: CB31F4B4A18205DFCB10EF69D481A9EBBF6FFA9314F11C569E8A49B344D734D8418F82
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 423083942-0
                                                                                        • Opcode ID: 6152b2d317f6ccb365de0223636f91e6acd9a47e32d555073a07d5fd3928f9ba
                                                                                        • Instruction ID: 85315e328d43c9ec6037e450ef74e1588a58d2c08401ef1ed60802cb9c6458a8
                                                                                        • Opcode Fuzzy Hash: 6152b2d317f6ccb365de0223636f91e6acd9a47e32d555073a07d5fd3928f9ba
                                                                                        • Instruction Fuzzy Hash: 9612E274A10219CFCB14CFA8D480A9EFBB6BF59304F21869AD855AB358D734ED42CF90
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609123BA
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 60912536
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 6091254B
                                                                                        • sqlite3_malloc.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 60912627
                                                                                        • sqlite3_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 6091263C
                                                                                        • sqlite3_os_init.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 60912641
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609126EC
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609126F7
                                                                                        • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 60912713
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 60912728
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_freesqlite3_mallocsqlite3_mutex_freesqlite3_os_init
                                                                                        • String ID:
                                                                                        • API String ID: 3556715608-0
                                                                                        • Opcode ID: 839f82d98af94a81697ba9be913b47f102bf6153eb03e52e58ad41739449e754
                                                                                        • Instruction ID: cdfe59489592f9d1e059c57cbb8b618a0ef866513e816ff1e3a1f403580a3347
                                                                                        • Opcode Fuzzy Hash: 839f82d98af94a81697ba9be913b47f102bf6153eb03e52e58ad41739449e754
                                                                                        • Instruction Fuzzy Hash: 57A14B71A2C219CBEB109F25CC843297EA7B7A7318F10816DD415AB3A0E7F9CC95EB51
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095EA3A
                                                                                        • sqlite3_exec.SQLITE3 ref: 6095EA7B
                                                                                          • Part of subcall function 6094C6A9: sqlite3_log.SQLITE3 ref: 6094C6E9
                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095EA95
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6095EABC
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                        • sqlite3_free.SQLITE3 ref: 6095EAA9
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 6095EAC9
                                                                                        • sqlite3_free.SQLITE3 ref: 6095EAE2
                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095EAF4
                                                                                        • sqlite3_realloc.SQLITE3 ref: 6095EB10
                                                                                        • sqlite3_free_table.SQLITE3 ref: 6095EB22
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_free_table$sqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mprintfsqlite3_mutex_entersqlite3_reallocsqlite3_vmprintf
                                                                                        • String ID:
                                                                                        • API String ID: 1866449048-0
                                                                                        • Opcode ID: 8470ec8558f3635e34c7add53217580d2a628ebc7a7ffaedc5b604d4a353ed0c
                                                                                        • Instruction ID: 127fa1c4504e68208ad7586e0dfb8f657d2d8bc4a49f9b965e50b26a098e152b
                                                                                        • Opcode Fuzzy Hash: 8470ec8558f3635e34c7add53217580d2a628ebc7a7ffaedc5b604d4a353ed0c
                                                                                        • Instruction Fuzzy Hash: 8D5102B4905319DFEB01DFA9D58178EBBF6BF68308F104529E894AB340E379D894CB91
                                                                                        APIs
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F76F
                                                                                          • Part of subcall function 6093F606: sqlite3_log.SQLITE3 ref: 6093F62D
                                                                                          • Part of subcall function 6093F606: sqlite3_log.SQLITE3 ref: 6093F651
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F77D
                                                                                          • Part of subcall function 6093F606: sqlite3_mutex_enter.SQLITE3 ref: 6093F662
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F78B
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F799
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F7A7
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F7B5
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F7C3
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F7D1
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F7DF
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F7E7
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_finalize$sqlite3_logsqlite3_mutex_enter$sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 14011187-0
                                                                                        • Opcode ID: d36625bd4fa8924ea0abcbec615d2e266582c2e39b3be902bd1f9101c01d6c45
                                                                                        • Instruction ID: 77bab44aef74557389f27b9fccab39f4b7af4de1bb67f0ce56dfeea9d7635d89
                                                                                        • Opcode Fuzzy Hash: d36625bd4fa8924ea0abcbec615d2e266582c2e39b3be902bd1f9101c01d6c45
                                                                                        • Instruction Fuzzy Hash: 671152B5548B158BCB44AF78C5DAA5877E5AF2420CF1508B8EC89CF31AEB35D4808F15
                                                                                        APIs
                                                                                        • sqlite3_step.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,00000004,?,?,60962362), ref: 6096219C
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6096220B
                                                                                        • sqlite3_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,00000004,?,?,60962362), ref: 60962256
                                                                                        • sqlite3_finalize.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,00000004,?,?,60962362), ref: 60962284
                                                                                        • sqlite3_errmsg.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,00000004,?,?,60962362), ref: 609622C2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_finalize$sqlite3_errmsgsqlite3_freesqlite3_step
                                                                                        • String ID: integer$null$real
                                                                                        • API String ID: 791348188-2769304496
                                                                                        • Opcode ID: 29698b6be131d597751fb054cdcb6ed095bb124ecd1af43d110f08fbfdf6818b
                                                                                        • Instruction ID: 0135625d25b284999b803ae0ff9efdf31823749c6505a936127184a05f967317
                                                                                        • Opcode Fuzzy Hash: 29698b6be131d597751fb054cdcb6ed095bb124ecd1af43d110f08fbfdf6818b
                                                                                        • Instruction Fuzzy Hash: 535117B59087148FCB14DF68C58068ABBF2BF68354F1188A9E884EB314E735ED40CFA1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $ AND $%s USING %sINDEX %s%s$%s USING AUTOMATIC %sINDEX%.0s%s$)><$0$ANY($COVERING $SCAN$SEARCH$rowid
                                                                                        • API String ID: 0-780898
                                                                                        • Opcode ID: 3070ec15d2496d2b50db214dd83b513c3fa159211264922e82c11008123c060a
                                                                                        • Instruction ID: cb7fbbe086fe58cf67744f06cbcd9136004efe1bccf1e3bb3427a45469536d4c
                                                                                        • Opcode Fuzzy Hash: 3070ec15d2496d2b50db214dd83b513c3fa159211264922e82c11008123c060a
                                                                                        • Instruction Fuzzy Hash: 8ED106B0A083099BDB14CF99C59079EBBF3BF69308F108569E8589B395D774D982CF81
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: aolf$aolf$bolb$bolc$buod$buod$laer$laer$rahc$tni$txet
                                                                                        • API String ID: 0-2604012851
                                                                                        • Opcode ID: d140b4be0eca23520b7bac44e7580b99887d8e6bccb507bca716e75cfe296001
                                                                                        • Instruction ID: 14d0cf2247fa82c75122fbf938a5534ebf0a8bc049f40a10ecb543c1559dd6ae
                                                                                        • Opcode Fuzzy Hash: d140b4be0eca23520b7bac44e7580b99887d8e6bccb507bca716e75cfe296001
                                                                                        • Instruction Fuzzy Hash: AD31CE75E4D2458ADB11895E95903AA7BBB8BF7304F28802EC8B2DB246D735CDC0D762
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_bytessqlite3_value_text$sqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 3633565668-0
                                                                                        • Opcode ID: 2330f2cdc67a97a98f651e624d7bda3eb9bd305ba7a1505f9ce9bf9f9a0a1f89
                                                                                        • Instruction ID: afbb2477a465654ef161f820333eb3cdf57426bd202a7d77592e810f473c1d09
                                                                                        • Opcode Fuzzy Hash: 2330f2cdc67a97a98f651e624d7bda3eb9bd305ba7a1505f9ce9bf9f9a0a1f89
                                                                                        • Instruction Fuzzy Hash: 1C514AB4A142048FDB04DF68C88069DBBF6FF69324F118629E864AB395E335D941CF51
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp$sqlite3_logsqlite3_mutex_try
                                                                                        • String ID: 0$SQLite format 3
                                                                                        • API String ID: 3174206576-3388949527
                                                                                        • Opcode ID: feae1adf3850ac64b31a434c6d7de6309d243695aae5cd97fecf017166a127fe
                                                                                        • Instruction ID: 11fd7ea78d923a7edba3ad9293fe17b41ee93ee7d9be4225d2757d620cea1d1f
                                                                                        • Opcode Fuzzy Hash: feae1adf3850ac64b31a434c6d7de6309d243695aae5cd97fecf017166a127fe
                                                                                        • Instruction Fuzzy Hash: EA0278B0A083659BDB09CF68C48179ABBF7AF64308F148169E855DB345D7B4EC86CF81
                                                                                        APIs
                                                                                          • Part of subcall function 609128E4: sqlite3_realloc.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,60925D8F), ref: 6091290C
                                                                                          • Part of subcall function 6090EFD9: memcmp.MSVCRT ref: 6090F03A
                                                                                          • Part of subcall function 6090EFD9: memcmp.MSVCRT ref: 6090F0A6
                                                                                        • sqlite3_log.SQLITE3 ref: 60925FAC
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60925FC7
                                                                                          • Part of subcall function 60917C8B: sqlite3_initialize.SQLITE3(6091262C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE), ref: 60917C95
                                                                                        • memcmp.MSVCRT ref: 6092608B
                                                                                        • sqlite3_free.SQLITE3 ref: 609261B1
                                                                                        • sqlite3_log.SQLITE3 ref: 6092622F
                                                                                        • sqlite3_log.SQLITE3 ref: 6092629D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmpsqlite3_log$sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                                                        • String ID:
                                                                                        • API String ID: 4185366609-3916222277
                                                                                        • Opcode ID: 1cf6733b1ae99560b938a4d316e2a49edab82837fa30d2fc47e2e8cfccb505ad
                                                                                        • Instruction ID: b9236774c3e28c58d014a187cb2278c15a1c552c408e4413895f50dc449a695c
                                                                                        • Opcode Fuzzy Hash: 1cf6733b1ae99560b938a4d316e2a49edab82837fa30d2fc47e2e8cfccb505ad
                                                                                        • Instruction Fuzzy Hash: DBE11770A14309CBDB14CFA9C89079DBBF6AFA5304F1085A9D859AB349EB74DC85CF41
                                                                                        APIs
                                                                                          • Part of subcall function 60918E6F: sqlite3_strnicmp.SQLITE3 ref: 60918EA8
                                                                                        • sqlite3_strnicmp.SQLITE3 ref: 6095962D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_strnicmp
                                                                                        • String ID: #$AFTER$BEFORE$sqlite_master$sqlite_temp_master$trigger
                                                                                        • API String ID: 1961171630-4092740143
                                                                                        • Opcode ID: e671fb82c0d81fdda5b6baec3fa27b9d416c87a2aba1cdd887c2c02cfd072a27
                                                                                        • Instruction ID: be0577b9a621fec69db4d96767a4ed1562a01e8f43251b98bc3c4d89752eff5c
                                                                                        • Opcode Fuzzy Hash: e671fb82c0d81fdda5b6baec3fa27b9d416c87a2aba1cdd887c2c02cfd072a27
                                                                                        • Instruction Fuzzy Hash: 51F1C3B4A04228CFEB21CF29C880B8ABBB6BF59304F1081D9D9599B355D774DE89CF51
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6095E425
                                                                                        • sqlite3_value_text.SQLITE3 ref: 6095E433
                                                                                        • sqlite3_stricmp.SQLITE3 ref: 6095E4A8
                                                                                        • sqlite3_free.SQLITE3 ref: 6095E575
                                                                                          • Part of subcall function 6092D5B6: strcmp.MSVCRT ref: 6092D5EB
                                                                                          • Part of subcall function 6092D5B6: sqlite3_free.SQLITE3 ref: 6092D6E5
                                                                                        • sqlite3_free.SQLITE3 ref: 6095E5B2
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 6095E743
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_value_text$sqlite3_mutex_entersqlite3_result_error_codesqlite3_stricmpstrcmp
                                                                                        • String ID: out of memory
                                                                                        • API String ID: 1576672187-2599737071
                                                                                        • Opcode ID: a9d0657f3d386488f30ac0a7d9b00565fca59d77f1a132f8d0649d3d3ccead0b
                                                                                        • Instruction ID: e3f78185d9a2136c2d331daac6f5352d402f7f6b7658c9467bb169b289aed1e0
                                                                                        • Opcode Fuzzy Hash: a9d0657f3d386488f30ac0a7d9b00565fca59d77f1a132f8d0649d3d3ccead0b
                                                                                        • Instruction Fuzzy Hash: BDB158B4A043048FDB09DF69C480B9EBBF3AF68348F148968E855AB355E735EC55CB81
                                                                                        APIs
                                                                                        • sqlite3_file_control.SQLITE3 ref: 60952E0E
                                                                                        • sqlite3_free.SQLITE3 ref: 60952E93
                                                                                        • sqlite3_free.SQLITE3 ref: 60952ECD
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_stricmp.SQLITE3 ref: 60952F25
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_file_controlsqlite3_mutex_entersqlite3_stricmp
                                                                                        • String ID: 6$timeout
                                                                                        • API String ID: 2671017102-3660802998
                                                                                        • Opcode ID: 77a00381573d0b01a0396c3f878c1202c8c90776f924a479fbf11acabaaa2095
                                                                                        • Instruction ID: 9aff8e3a3b815d4aa7405b0b48ba1aec236eba58244ba32352ba4b08a5d76748
                                                                                        • Opcode Fuzzy Hash: 77a00381573d0b01a0396c3f878c1202c8c90776f924a479fbf11acabaaa2095
                                                                                        • Instruction Fuzzy Hash: A9A121B0A083198BDB15CF6AC89079EBBF6BFA9304F108469E8489B355D774DC85CF41
                                                                                        APIs
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095C851
                                                                                          • Part of subcall function 6091DEDF: sqlite3_vsnprintf.SQLITE3 ref: 6091DF00
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095C8A2
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 6095C926
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_snprintf$sqlite3_vsnprintf
                                                                                        • String ID: $)><$sqlite_master$sqlite_temp_master
                                                                                        • API String ID: 652164897-1572359634
                                                                                        • Opcode ID: d036ef73f47091e45016fc5ea43820d140e3a842dee2bb4099fb63eee1622644
                                                                                        • Instruction ID: 3f5840cb8b9512aa91ec48fe54f079ed7e41cf625d54fa47e339b2913310423f
                                                                                        • Opcode Fuzzy Hash: d036ef73f47091e45016fc5ea43820d140e3a842dee2bb4099fb63eee1622644
                                                                                        • Instruction Fuzzy Hash: CC91E0B5E047188FCB15DFA8C48069EBBF2BFA8308F15845AE855AB315D734EC46CB81
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60924372
                                                                                        • sqlite3_result_error_toobig.SQLITE3 ref: 6092447C
                                                                                        • sqlite3_result_error_nomem.SQLITE3 ref: 6092449B
                                                                                        • sqlite3_result_text.SQLITE3 ref: 609248A7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_result_error_nomemsqlite3_result_error_toobigsqlite3_result_textsqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 2352520524-0
                                                                                        • Opcode ID: 926f5a4e1292d020cc7fcb9ebea8c790fc32d0662f0f7dfba88ed4e78ed4b5bc
                                                                                        • Instruction ID: ca02b41628c6cbd61d12c54730ee244b7a80a29432daaaf64b9e509d50298956
                                                                                        • Opcode Fuzzy Hash: 926f5a4e1292d020cc7fcb9ebea8c790fc32d0662f0f7dfba88ed4e78ed4b5bc
                                                                                        • Instruction Fuzzy Hash: 27E1AD71928259CBDB20DF18E84079EBBF7BF66304F1084A9E89857359D338CD819F82
                                                                                        APIs
                                                                                          • Part of subcall function 60928AB9: sqlite3_value_bytes.SQLITE3 ref: 60928AD1
                                                                                          • Part of subcall function 60928AB9: sqlite3_mprintf.SQLITE3 ref: 60928AE6
                                                                                          • Part of subcall function 60928AB9: sqlite3_free.SQLITE3 ref: 60928AF9
                                                                                        • sqlite3_exec.SQLITE3 ref: 609698AD
                                                                                          • Part of subcall function 6094C6A9: sqlite3_log.SQLITE3 ref: 6094C6E9
                                                                                        • sqlite3_result_text.SQLITE3 ref: 609699A9
                                                                                          • Part of subcall function 60969762: sqlite3_bind_int.SQLITE3 ref: 609697B4
                                                                                          • Part of subcall function 60969762: sqlite3_step.SQLITE3 ref: 6096980B
                                                                                          • Part of subcall function 60969762: sqlite3_reset.SQLITE3 ref: 6096981B
                                                                                        • sqlite3_exec.SQLITE3 ref: 609698F9
                                                                                        • sqlite3_exec.SQLITE3 ref: 6096992A
                                                                                        • sqlite3_exec.SQLITE3 ref: 60969955
                                                                                        • sqlite3_result_error_code.SQLITE3 ref: 609699B7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_exec$sqlite3_bind_intsqlite3_freesqlite3_logsqlite3_mprintfsqlite3_resetsqlite3_result_error_codesqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                        • String ID: optimize
                                                                                        • API String ID: 3659050757-3797040228
                                                                                        • Opcode ID: faf24fa4f22eeb1e3a83f54ffecb6f8aab53f8ebbe70a1670a5e988ce60bc209
                                                                                        • Instruction ID: 9b3323d614cda4ea9629ccdce8091e74e1e6734188660f116a602245ff52f14d
                                                                                        • Opcode Fuzzy Hash: faf24fa4f22eeb1e3a83f54ffecb6f8aab53f8ebbe70a1670a5e988ce60bc209
                                                                                        • Instruction Fuzzy Hash: C53119B0518702DFE7109F69C49571BBBFAEFA1358F10C91DE8A98B350D77AD8448B82
                                                                                        APIs
                                                                                        • sqlite3_column_blob.SQLITE3 ref: 609648DB
                                                                                        • sqlite3_column_bytes.SQLITE3 ref: 609648F0
                                                                                        • sqlite3_reset.SQLITE3 ref: 60964936
                                                                                        • sqlite3_reset.SQLITE3 ref: 60964998
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60964A35
                                                                                        • sqlite3_free.SQLITE3 ref: 60964AF4
                                                                                        • sqlite3_free.SQLITE3 ref: 60964B2B
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 60964B8A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_reset$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 2722129401-0
                                                                                        • Opcode ID: 86636696cb0fe501978f5f4175f372c2c0e0c362e853f462322f899c3982fa38
                                                                                        • Instruction ID: fda571f37762686fed557fb5233f0261302e37218b025c8f3c2345d2dff4a515
                                                                                        • Opcode Fuzzy Hash: 86636696cb0fe501978f5f4175f372c2c0e0c362e853f462322f899c3982fa38
                                                                                        • Instruction Fuzzy Hash: D3D1FF70E142198FEB14CFA9C59079EBBF2BBA8704F20852AD899AB304D774E845CF40
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 609639B9
                                                                                          • Part of subcall function 6092747B: sqlite3_malloc.SQLITE3 ref: 609274CF
                                                                                        • sqlite3_free.SQLITE3 ref: 60963BA5
                                                                                          • Part of subcall function 60963115: memcmp.MSVCRT ref: 60963254
                                                                                        • sqlite3_free.SQLITE3 ref: 60963B4B
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 60963B5B
                                                                                        • sqlite3_free.SQLITE3 ref: 60963B63
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_malloc$memcmpsqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 571598680-0
                                                                                        • Opcode ID: c2d82c52e2e39cd4c93f8d2cf5411bccfad2989ad06a0e7035b0b0f2288c6227
                                                                                        • Instruction ID: 4f643d28919f00a358f36e2bd607ee184e6d7c09686411053a5a88c46d33e891
                                                                                        • Opcode Fuzzy Hash: c2d82c52e2e39cd4c93f8d2cf5411bccfad2989ad06a0e7035b0b0f2288c6227
                                                                                        • Instruction Fuzzy Hash: 8F91D674A14228CFEB14CF69D880B9EBBB6BF98304F1085AAD849A7340D775DD81CF91
                                                                                        APIs
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60928B3F
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60928BA6
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60928C69
                                                                                        • sqlite3_free.SQLITE3 ref: 60928C82
                                                                                        • sqlite3_free.SQLITE3 ref: 60928C8A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mprintf$sqlite3_free$sqlite3_initializesqlite3_vmprintf
                                                                                        • String ID:
                                                                                        • API String ID: 251866411-0
                                                                                        • Opcode ID: d79c995dea37fa225ccf05119b95d119833d984300a3e4091aad2be1e5398d8b
                                                                                        • Instruction ID: 98b58ffa1f93bed2f314c96e9aebdc9a9999b725b96ccb369b6a8f9d03e573aa
                                                                                        • Opcode Fuzzy Hash: d79c995dea37fa225ccf05119b95d119833d984300a3e4091aad2be1e5398d8b
                                                                                        • Instruction Fuzzy Hash: 21417C70A15209CFCB14DF69D48069EFBF6FFA8304F10852AE895D7344EBB4D8018B91
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_result_textsqlite3_snprintfsqlite3_value_blobsqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 3395562609-0
                                                                                        • Opcode ID: 7009cdbd75da77a1c282ecd4f8f154e13f4f1ef258e8654c0beda9478b09938d
                                                                                        • Instruction ID: 334ecec6e68a9c3898764b75e7393f6278f77538eae5ad847476ac1674978f0a
                                                                                        • Opcode Fuzzy Hash: 7009cdbd75da77a1c282ecd4f8f154e13f4f1ef258e8654c0beda9478b09938d
                                                                                        • Instruction Fuzzy Hash: CA415CB19087199BCB24DF68D88128EBBF2FBA4314F10896EE59897354EB74C984CF41
                                                                                        APIs
                                                                                        • sqlite3_value_int.SQLITE3 ref: 609235E8
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 60923602
                                                                                        • sqlite3_value_blob.SQLITE3 ref: 6092360F
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60923622
                                                                                        • sqlite3_value_int.SQLITE3 ref: 60923681
                                                                                        • sqlite3_result_text.SQLITE3 ref: 609237B2
                                                                                        • sqlite3_result_blob.SQLITE3 ref: 60923847
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_int$sqlite3_result_blobsqlite3_result_textsqlite3_value_blobsqlite3_value_bytessqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 1854132711-0
                                                                                        • Opcode ID: cbf5ee4d7a7bd2d13dde96c37663744c41a660b33e8ae48330bbe39f3960dcc2
                                                                                        • Instruction ID: 360c0438230c7240ad0168dabf086e8a38d5102c301e959175e72f3837758442
                                                                                        • Opcode Fuzzy Hash: cbf5ee4d7a7bd2d13dde96c37663744c41a660b33e8ae48330bbe39f3960dcc2
                                                                                        • Instruction Fuzzy Hash: CF915CB1D142199BCF05CFB9E89029DBBBABB69324F14C219E864A7398D734DC41CF50
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6090ABFD
                                                                                        • sqlite3_mutex_leave.SQLITE3(?), ref: 6090ACA3
                                                                                        • sqlite3_mutex_enter.SQLITE3(?), ref: 6090ACD4
                                                                                        • sqlite3_free.SQLITE3(?), ref: 6090AD2E
                                                                                        • sqlite3_mutex_leave.SQLITE3(?), ref: 6090ADB6
                                                                                        • sqlite3_mutex_enter.SQLITE3(?), ref: 6090ADD9
                                                                                        • sqlite3_mutex_leave.SQLITE3(?), ref: 6090AE5B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 251237202-0
                                                                                        • Opcode ID: 03bc9cb92b6707b1a65179c6d05e327d264a565fda1092b6b9db4da4386d35d2
                                                                                        • Instruction ID: b681d5725c47bbf33b66ec9397bf8117d915f9e9275f5c0b02249691b1fdde20
                                                                                        • Opcode Fuzzy Hash: 03bc9cb92b6707b1a65179c6d05e327d264a565fda1092b6b9db4da4386d35d2
                                                                                        • Instruction Fuzzy Hash: A3913270A00625CFCB11DF29C480A9AB7B6BF29314F1586ADE85A9B359D334EC81CFD0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: trigger
                                                                                        • API String ID: 0-443223901
                                                                                        • Opcode ID: 97412b9779e7ec76053dd0d55c3be4d40798781509eec9c8fc69409a2d9e1010
                                                                                        • Instruction ID: 2a61477707bf7ba5eccd3d06ad3273419c2a8e4d4f79210a50bbb3dd09e07942
                                                                                        • Opcode Fuzzy Hash: 97412b9779e7ec76053dd0d55c3be4d40798781509eec9c8fc69409a2d9e1010
                                                                                        • Instruction Fuzzy Hash: 9251E8A598D24189EB214E14C4C23D6FBBBAB33364F50549EC5E747162D2BFCC8EE612
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmpsqlite3_value_text$sqlite3_freesqlite3_result_textsqlite3_value_bytes
                                                                                        • String ID:
                                                                                        • API String ID: 3386002893-0
                                                                                        • Opcode ID: 5f69422d7e8fbd5705c328fd1dace7fc46f60b7051de3e5f3fe6cbf90387212b
                                                                                        • Instruction ID: 506d92653171310e196960ed595e8938e8332950e97869458ff3cb94defc0aa4
                                                                                        • Opcode Fuzzy Hash: 5f69422d7e8fbd5705c328fd1dace7fc46f60b7051de3e5f3fe6cbf90387212b
                                                                                        • Instruction Fuzzy Hash: 86616970E286198FCB05CFB9E4806ADBBF7AF6A310F14C569D895A7388D734D841CB90
                                                                                        APIs
                                                                                        • sqlite3_declare_vtab.SQLITE3 ref: 6095AEF8
                                                                                          • Part of subcall function 6095ABF1: sqlite3_mutex_enter.SQLITE3 ref: 6095AC0A
                                                                                          • Part of subcall function 6095ABF1: sqlite3_mutex_leave.SQLITE3 ref: 6095AC3E
                                                                                          • Part of subcall function 6095ABF1: sqlite3_log.SQLITE3 ref: 6095AC62
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095AF42
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 6095AFCE
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6095B009
                                                                                        • sqlite3_free.SQLITE3 ref: 6095B02B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_malloc$sqlite3_declare_vtabsqlite3_freesqlite3_logsqlite3_mprintfsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: simple
                                                                                        • API String ID: 2442034244-3246079234
                                                                                        • Opcode ID: d7d80abf4f56740991f55d54583b9064d2cd6f9f502ab1ecc3262a9ac748f6f9
                                                                                        • Instruction ID: 41329409854f96bfb977a2a23d0922e1e7595b5bf9035bec595b00a4d151df22
                                                                                        • Opcode Fuzzy Hash: d7d80abf4f56740991f55d54583b9064d2cd6f9f502ab1ecc3262a9ac748f6f9
                                                                                        • Instruction Fuzzy Hash: 34519071E042168FCB05CF79D88069EB7F6BB69314F118129EC51AB380DB74DC15CBA4
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_text$sqlite3_result_textsqlite3_stricmp
                                                                                        • String ID: g
                                                                                        • API String ID: 1123068111-30677878
                                                                                        • Opcode ID: ad89c2745a36c1039a4cfe27571912dc2192ccf8fbabe54077714a0940e6bf92
                                                                                        • Instruction ID: 33a78ed39be248076d8c2faf4a493ad60c0dd88d620063e18be0c1f95578dfd5
                                                                                        • Opcode Fuzzy Hash: ad89c2745a36c1039a4cfe27571912dc2192ccf8fbabe54077714a0940e6bf92
                                                                                        • Instruction Fuzzy Hash: 9841E671E18309AFCB00DFA9D88169EBBF6AFA9254F11882DE894AB304D770DC41CB51
                                                                                        APIs
                                                                                        • sqlite3_blob_reopen.SQLITE3 ref: 609628F0
                                                                                          • Part of subcall function 609622EF: sqlite3_log.SQLITE3 ref: 60962324
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60962914
                                                                                        • sqlite3_blob_open.SQLITE3 ref: 6096296B
                                                                                        • sqlite3_blob_bytes.SQLITE3 ref: 60962983
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6096299B
                                                                                        • sqlite3_blob_read.SQLITE3 ref: 609629E2
                                                                                        • sqlite3_free.SQLITE3 ref: 60962A01
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_blob_bytessqlite3_blob_opensqlite3_blob_readsqlite3_blob_reopensqlite3_freesqlite3_logsqlite3_mallocsqlite3_mprintf
                                                                                        • String ID:
                                                                                        • API String ID: 4276469440-0
                                                                                        • Opcode ID: bfb0117e81baa75afad35caf7daee5b0135341eca85d37f78098de51a71a010b
                                                                                        • Instruction ID: 102fc6531d2970c82ba54d115a7f4e1945262befb8973fb17164fdf888c8c1c5
                                                                                        • Opcode Fuzzy Hash: bfb0117e81baa75afad35caf7daee5b0135341eca85d37f78098de51a71a010b
                                                                                        • Instruction Fuzzy Hash: AA4108B0A047458FDB50CF29C58079ABBE5AF98344F00C87AE898DB354E774D841CB91
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_blobsqlite3_value_bytessqlite3_value_text$memcmp
                                                                                        • String ID:
                                                                                        • API String ID: 2264764126-0
                                                                                        • Opcode ID: aaad1936d90d9632610a2af2a95ed26b094fd39661de05b48a39b1f062dcda12
                                                                                        • Instruction ID: 67704a6f3acb1f9075a60d45fe19d65f84568ddeda5d341cb3e6f12e60cd5e2b
                                                                                        • Opcode Fuzzy Hash: aaad1936d90d9632610a2af2a95ed26b094fd39661de05b48a39b1f062dcda12
                                                                                        • Instruction Fuzzy Hash: E2317CB5A187048BCB00DF79D48069DBBF2EF69310F108529E495EB348E735EC81CB50
                                                                                        APIs
                                                                                        • sqlite3_value_text.SQLITE3 ref: 609230AE
                                                                                        • sqlite3_value_text.SQLITE3 ref: 609230BC
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 609230C8
                                                                                        • sqlite3_value_text.SQLITE3 ref: 609230EA
                                                                                        Strings
                                                                                        • ESCAPE expression must be a single character, xrefs: 60923101
                                                                                        • LIKE or GLOB pattern too complex, xrefs: 609230D5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_text$sqlite3_value_bytes
                                                                                        • String ID: ESCAPE expression must be a single character$LIKE or GLOB pattern too complex
                                                                                        • API String ID: 4080917175-264706735
                                                                                        • Opcode ID: 2c30c977e515b2ec0ad66e7c3857f0f32640bf75bb9603fb7c6c8dc6e1c07b11
                                                                                        • Instruction ID: db4eeb12c5753ab9b7b1eaf8b5e7e4d9718af61da8720ff0ffc0256616c43668
                                                                                        • Opcode Fuzzy Hash: 2c30c977e515b2ec0ad66e7c3857f0f32640bf75bb9603fb7c6c8dc6e1c07b11
                                                                                        • Instruction Fuzzy Hash: EE21AF71A282058BCB00EF38D881A9DBBF7FF69314B11C529E8649B349D730DD51CB90
                                                                                        APIs
                                                                                          • Part of subcall function 6091D6E0: sqlite3_log.SQLITE3 ref: 6091D71D
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60921E37
                                                                                        • sqlite3_value_text16.SQLITE3 ref: 60921E50
                                                                                        • sqlite3_value_text16.SQLITE3 ref: 60921E89
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60921E9B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_text16$sqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: library routine called out of sequence$out of memory
                                                                                        • API String ID: 2019783549-3029887290
                                                                                        • Opcode ID: b2030ca21be098096ef5d5a604874ec79be3dc642c19128181af02c1040696df
                                                                                        • Instruction ID: 83cedb3a43886d6666ab1c1e2379451130d161bdec81fa666b061dd6973de6a5
                                                                                        • Opcode Fuzzy Hash: b2030ca21be098096ef5d5a604874ec79be3dc642c19128181af02c1040696df
                                                                                        • Instruction Fuzzy Hash: 141157B0A083448BDB10AF69D4C130A7BE6BF75208F04C868EC858F389E7B5D8908B41
                                                                                        APIs
                                                                                        • sqlite3_finalize.SQLITE3 ref: 6093F69E
                                                                                          • Part of subcall function 6093F606: sqlite3_log.SQLITE3 ref: 6093F62D
                                                                                          • Part of subcall function 6093F606: sqlite3_log.SQLITE3 ref: 6093F651
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F6B2
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F6C0
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F6CE
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F6D9
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F6E4
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F6F7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_log$sqlite3_finalize
                                                                                        • String ID:
                                                                                        • API String ID: 1159759059-0
                                                                                        • Opcode ID: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                        • Instruction ID: 015c054e78b2a87587381022488d6d14d0991d192aa1083dd6a8c3004e67d3cb
                                                                                        • Opcode Fuzzy Hash: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                        • Instruction Fuzzy Hash: 29019A746446208FDB00AFB9D4C5A59BBE9EF2961CF12496DECC68B305D735D8808B91
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mallocsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1362058929-0
                                                                                        • Opcode ID: 50898776e1ca5d4248964d1af4a3155865cf34148d9a7158e6377e2fe76e64b9
                                                                                        • Instruction ID: 0d604bcbab4708308da32a35bd034c2095c278537080530edd14b557bceb793a
                                                                                        • Opcode Fuzzy Hash: 50898776e1ca5d4248964d1af4a3155865cf34148d9a7158e6377e2fe76e64b9
                                                                                        • Instruction Fuzzy Hash: C6913872A14605CFDB00CFA9E8C069DBBB3FB6A314F248529E461AB355D778EC41DB90
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_strnicmp
                                                                                        • String ID: sqlite_master$sqlite_temp_master$tbl
                                                                                        • API String ID: 1961171630-736783009
                                                                                        • Opcode ID: 2a32de4a10ff32d1c3e69c9066cd6c1c21a87474fcec9bb7f71e77342deb9761
                                                                                        • Instruction ID: f613b36f4c2b918bce98a1c4b6769892265653220406430be810ba9c752a6dcb
                                                                                        • Opcode Fuzzy Hash: 2a32de4a10ff32d1c3e69c9066cd6c1c21a87474fcec9bb7f71e77342deb9761
                                                                                        • Instruction Fuzzy Hash: BBF13F70A092188FDB16CF6AC48079EBBF6BFA8308F108459E854AB395D778DC55CF91
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_log
                                                                                        • String ID: List of tree roots: $d$out of memory
                                                                                        • API String ID: 1159705175-2036906774
                                                                                        • Opcode ID: 12a5b213a9b5f6dea4b334c8e2f44edeeb27ebf84377849ae9fa85fc8dd949a6
                                                                                        • Instruction ID: f4329d176c583eff17ba656a8fe6aadf0dea54bccbe06240e5d0bddae6734924
                                                                                        • Opcode Fuzzy Hash: 12a5b213a9b5f6dea4b334c8e2f44edeeb27ebf84377849ae9fa85fc8dd949a6
                                                                                        • Instruction Fuzzy Hash: B7E1F6B4A052298FDB20DF18C889B8DBBF6BF65304F1085DAD489AB251C774EE85CF41
                                                                                        APIs
                                                                                        • sqlite3_finalize.SQLITE3 ref: 60940B9E
                                                                                          • Part of subcall function 6093F606: sqlite3_log.SQLITE3 ref: 6093F62D
                                                                                          • Part of subcall function 6093F606: sqlite3_log.SQLITE3 ref: 6093F651
                                                                                        • sqlite3_free.SQLITE3 ref: 60940BB9
                                                                                        • sqlite3_free.SQLITE3 ref: 60940BC1
                                                                                        • sqlite3_free.SQLITE3 ref: 60940BD9
                                                                                        • sqlite3_free.SQLITE3 ref: 60940BE4
                                                                                        • sqlite3_free.SQLITE3 ref: 60940BEC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_log$sqlite3_finalize
                                                                                        • String ID:
                                                                                        • API String ID: 1159759059-0
                                                                                        • Opcode ID: 3f583470b204b1da642d0e4ea7ab8f9e32a345052cadd4df2d6b2a742f171e42
                                                                                        • Instruction ID: 9c83bb01e84dc64b24597ab14b61f9250d975da401302cff679a320169e2bf07
                                                                                        • Opcode Fuzzy Hash: 3f583470b204b1da642d0e4ea7ab8f9e32a345052cadd4df2d6b2a742f171e42
                                                                                        • Instruction Fuzzy Hash: BC0146716447208BCB00AF69D4C2A0ABBE9EF31A2CF01489DECC58B305D735E880CB91
                                                                                        APIs
                                                                                          • Part of subcall function 60904394: sqlite3_mutex_try.SQLITE3(?,?,?,609081D2), ref: 609043B6
                                                                                          • Part of subcall function 609385DA: memcmp.MSVCRT ref: 60938715
                                                                                          • Part of subcall function 609385DA: memcmp.MSVCRT ref: 6093874B
                                                                                        • sqlite3_exec.SQLITE3 ref: 6094CCED
                                                                                        Strings
                                                                                        • sqlite_master, xrefs: 6094CA96
                                                                                        • CREATE TEMP TABLE sqlite_temp_master( type text, name text, tbl_name text, rootpage integer, sql text), xrefs: 6094CA9F
                                                                                        • CREATE TABLE sqlite_master( type text, name text, tbl_name text, rootpage integer, sql text), xrefs: 6094CA91
                                                                                        • sqlite_temp_master, xrefs: 6094CAA4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp$sqlite3_execsqlite3_mutex_try
                                                                                        • String ID: CREATE TABLE sqlite_master( type text, name text, tbl_name text, rootpage integer, sql text)$CREATE TEMP TABLE sqlite_temp_master( type text, name text, tbl_name text, rootpage integer, sql text)$sqlite_master$sqlite_temp_master
                                                                                        • API String ID: 1504143485-2685329186
                                                                                        • Opcode ID: 93950d50835caeb85d545a6d2ae68af7f0700b7c37f1ad073af043ba01a2d93e
                                                                                        • Instruction ID: 8988be2b862017b78ef0eeda3b5fca7a050454ab548c634de63394036aa99c67
                                                                                        • Opcode Fuzzy Hash: 93950d50835caeb85d545a6d2ae68af7f0700b7c37f1ad073af043ba01a2d93e
                                                                                        • Instruction Fuzzy Hash: B6A137B4A083488FDB50CF69C480B8EBBF6BFA5314F108969D8989B355D735E889CF41
                                                                                        APIs
                                                                                          • Part of subcall function 6095F371: sqlite3_bind_int64.SQLITE3 ref: 6095F3B9
                                                                                          • Part of subcall function 6095F371: sqlite3_step.SQLITE3 ref: 6095F3C8
                                                                                          • Part of subcall function 6095F371: sqlite3_reset.SQLITE3 ref: 6095F3D8
                                                                                          • Part of subcall function 6095F371: sqlite3_result_error_code.SQLITE3 ref: 6095F402
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6095F479
                                                                                        • sqlite3_column_text.SQLITE3 ref: 6095F4AE
                                                                                        • sqlite3_free.SQLITE3 ref: 6095F659
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_bind_int64sqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_resetsqlite3_result_error_codesqlite3_step
                                                                                        • String ID: e
                                                                                        • API String ID: 786425071-4024072794
                                                                                        • Opcode ID: 263f9083c9fcce4867fafe1b6865f3080029f8ac84e38c5c1470db136a4dd527
                                                                                        • Instruction ID: fea69f50b95b6588548cefae2786c17cdb7f0b5977f6d39403994b0464883816
                                                                                        • Opcode Fuzzy Hash: 263f9083c9fcce4867fafe1b6865f3080029f8ac84e38c5c1470db136a4dd527
                                                                                        • Instruction Fuzzy Hash: 61910474A05209CFCB05CF9AC490B9EBBF2BF58318F108529E415AB354E734E88ACF81
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_value_text
                                                                                        • String ID: ($out of memory$string or blob too big
                                                                                        • API String ID: 2320820228-3501858433
                                                                                        • Opcode ID: 8edce11e7421341165a4cfb5d1ed68ed7cd9766454293ed48f6ea17823b69f92
                                                                                        • Instruction ID: 55151f6685713e45ad6c6d2a838da58828bbbbdfc8b5a8716d97902fd1861bc3
                                                                                        • Opcode Fuzzy Hash: 8edce11e7421341165a4cfb5d1ed68ed7cd9766454293ed48f6ea17823b69f92
                                                                                        • Instruction Fuzzy Hash: BDA1C1B4A052298BDB24CF18C988B8DFBB6BF59304F1486DAD848A7351C774AEC5CF45
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_exec
                                                                                        • String ID: out of memory$sqlite_master$sqlite_temp_master
                                                                                        • API String ID: 2141490097-1093099003
                                                                                        • Opcode ID: 485731f2cf07fb324cad86ce214a95f871598ae9b89f72715b9673cd858dd2d3
                                                                                        • Instruction ID: d21b2369979694f9207757acd8ea628e945aec26ae05c98551073b9b70eba434
                                                                                        • Opcode Fuzzy Hash: 485731f2cf07fb324cad86ce214a95f871598ae9b89f72715b9673cd858dd2d3
                                                                                        • Instruction Fuzzy Hash: 1A51A4B49092658FDB20CF18C888B8DBBB6BF59304F1485DAE45CA7351C774AE85CF42
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $BINARY$TABLE$VIEW$sqlite_master$sqlite_temp_master
                                                                                        • API String ID: 0-2407382664
                                                                                        • Opcode ID: 8d2baf79934eed40ddf1e4463240ab240ecfab66d69a5d28f55db5ec1b4afb1d
                                                                                        • Instruction ID: 1efdc5018df9e187512b567a3f4285a699fa5edbe490fca2a6e925c9fb3360ab
                                                                                        • Opcode Fuzzy Hash: 8d2baf79934eed40ddf1e4463240ab240ecfab66d69a5d28f55db5ec1b4afb1d
                                                                                        • Instruction Fuzzy Hash: 222248B4A04249CFDB15CFA9C18079EBBF2BF68304F148869E895AB355D734EC56CB81
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$memcmpsqlite3_realloc
                                                                                        • String ID:
                                                                                        • API String ID: 3422960571-0
                                                                                        • Opcode ID: 84d2e166b3ef01ee2b475130a964fbe7e9542dd2751bca86e8b5bb94452f05e8
                                                                                        • Instruction ID: 2773342792982b80bff810f5e6055f26f6235117f861c8554e6ee29defab94b3
                                                                                        • Opcode Fuzzy Hash: 84d2e166b3ef01ee2b475130a964fbe7e9542dd2751bca86e8b5bb94452f05e8
                                                                                        • Instruction Fuzzy Hash: D4B1E174A14A198BEB10CFA8C58079DBBF6FFA9304F148469E894AB344D378EC45CF51
                                                                                        APIs
                                                                                          • Part of subcall function 6090A044: sqlite3_free.SQLITE3 ref: 6090A087
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094ACEA
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 6094AD5B
                                                                                        • sqlite3_malloc.SQLITE3 ref: 6094AD81
                                                                                        • sqlite3_value_blob.SQLITE3 ref: 6094ADA7
                                                                                        • sqlite3_free.SQLITE3 ref: 6094ADD7
                                                                                          • Part of subcall function 6094A3AD: sqlite3_bind_int64.SQLITE3 ref: 6094A3D9
                                                                                          • Part of subcall function 6094A3AD: sqlite3_step.SQLITE3 ref: 6094A3E7
                                                                                          • Part of subcall function 6094A3AD: sqlite3_column_int64.SQLITE3 ref: 6094A402
                                                                                          • Part of subcall function 6094A3AD: sqlite3_reset.SQLITE3 ref: 6094A428
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_malloc$sqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_stepsqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID:
                                                                                        • API String ID: 683514883-0
                                                                                        • Opcode ID: a18aad18674e9fda93d948e66e792b87dd0a030fae5de649de04736cc01adfb1
                                                                                        • Instruction ID: 3f6216be0644d30732d90ebfcdbf2589f655181678fc23826a19d203e76f38a6
                                                                                        • Opcode Fuzzy Hash: a18aad18674e9fda93d948e66e792b87dd0a030fae5de649de04736cc01adfb1
                                                                                        • Instruction Fuzzy Hash: F98115B4A052199FCB04CF68D480B9EBBF6FF68314F10816AE855AB351DB35ED81CB91
                                                                                        APIs
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,60939966), ref: 60939281
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,60939966), ref: 60939418
                                                                                        • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,60939966), ref: 6093942A
                                                                                        • sqlite3_free.SQLITE3 ref: 60939441
                                                                                        • sqlite3_free.SQLITE3 ref: 60939449
                                                                                          • Part of subcall function 60939146: sqlite3_mutex_enter.SQLITE3 ref: 60939195
                                                                                          • Part of subcall function 60939146: sqlite3_mutex_free.SQLITE3 ref: 609391D3
                                                                                          • Part of subcall function 60939146: sqlite3_mutex_leave.SQLITE3 ref: 609391E3
                                                                                          • Part of subcall function 60939146: sqlite3_free.SQLITE3 ref: 60939225
                                                                                          • Part of subcall function 60939146: sqlite3_free.SQLITE3 ref: 60939244
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_leave$sqlite3_mutex_free$sqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 1903298374-0
                                                                                        • Opcode ID: db81790153a396492fac012607924171d30afbdbc6c59d34d2d40ed180f71828
                                                                                        • Instruction ID: e6534f11a331944148adb6fb30c64732a77f3c044d4400a4d95506ca6a08dbc6
                                                                                        • Opcode Fuzzy Hash: db81790153a396492fac012607924171d30afbdbc6c59d34d2d40ed180f71828
                                                                                        • Instruction Fuzzy Hash: 34512875A046218BDB48AF69C4C074AB7A7FF69318F01886DECA69B345DB34EC41CF91
                                                                                        APIs
                                                                                        • sqlite3_value_int.SQLITE3 ref: 60929067
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60929141
                                                                                        • sqlite3_result_error_nomem.SQLITE3 ref: 6092914F
                                                                                        • sqlite3_free.SQLITE3 ref: 60929171
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_result_double.SQLITE3 ref: 60929180
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_result_doublesqlite3_result_error_nomemsqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 3223668129-0
                                                                                        • Opcode ID: 0c59242f6dad44a175accdcd2754b036084daebb8603660ec643121edebe8b70
                                                                                        • Instruction ID: 90b4988d3009f320007b625c78e98ea25dad416cd0cf3732a018710fb0fed564
                                                                                        • Opcode Fuzzy Hash: 0c59242f6dad44a175accdcd2754b036084daebb8603660ec643121edebe8b70
                                                                                        • Instruction Fuzzy Hash: 0541C174D1820ADADF006FA6E9842CDBFB6FF69300F104858E881B7255E736CC50CB95
                                                                                        APIs
                                                                                        • sqlite3_realloc.SQLITE3(?), ref: 609292C9
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 609292F6
                                                                                        • sqlite3_free.SQLITE3(?), ref: 60929325
                                                                                        • sqlite3_mprintf.SQLITE3(?), ref: 60929331
                                                                                        • sqlite3_malloc.SQLITE3(?), ref: 60929369
                                                                                          • Part of subcall function 60917C8B: sqlite3_initialize.SQLITE3(6091262C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE), ref: 60917C95
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mprintf$sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                                                        • String ID:
                                                                                        • API String ID: 4083147203-0
                                                                                        • Opcode ID: 5994124ed82bd1f4271e1f516f1ebaf8dda3cf19d00a778fd5a8cb84553f77ed
                                                                                        • Instruction ID: 1d86503ee54eb1667c514c2fa4e8bd265fbd9749d0250d9a5c8df1ffac84c46d
                                                                                        • Opcode Fuzzy Hash: 5994124ed82bd1f4271e1f516f1ebaf8dda3cf19d00a778fd5a8cb84553f77ed
                                                                                        • Instruction Fuzzy Hash: 76416770A18215CFCB04DF28E08079ABBF7FFA9318F1485A9D8559B389D331E951CBA1
                                                                                        APIs
                                                                                          • Part of subcall function 60904394: sqlite3_mutex_try.SQLITE3(?,?,?,609081D2), ref: 609043B6
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60939195
                                                                                        • sqlite3_mutex_free.SQLITE3 ref: 609391D3
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609391E3
                                                                                        • sqlite3_free.SQLITE3 ref: 60939225
                                                                                        • sqlite3_free.SQLITE3 ref: 60939244
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_mutex_freesqlite3_mutex_leavesqlite3_mutex_try
                                                                                        • String ID:
                                                                                        • API String ID: 1894464702-0
                                                                                        • Opcode ID: b4f3254fd6c5bd58f238c6651c43dc8ddf6e45bc4cf9d2b0b4cd762061db3a7b
                                                                                        • Instruction ID: 32d8c32ad533cbb2a4709adaf1753f444fbad700f6ae49ef4bd0f1888c24cae7
                                                                                        • Opcode Fuzzy Hash: b4f3254fd6c5bd58f238c6651c43dc8ddf6e45bc4cf9d2b0b4cd762061db3a7b
                                                                                        • Instruction Fuzzy Hash: 7C314C74B086128BDB08DF69C48570A7BEBEFB1744F108468E8518B315EB35DC418F80
                                                                                        APIs
                                                                                        • sqlite3_result_blob.SQLITE3 ref: 6096078F
                                                                                        • sqlite3_column_int.SQLITE3 ref: 609607FD
                                                                                        • sqlite3_data_count.SQLITE3 ref: 6096082C
                                                                                        • sqlite3_column_value.SQLITE3 ref: 6096083D
                                                                                        • sqlite3_result_value.SQLITE3 ref: 60960849
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_column_intsqlite3_column_valuesqlite3_data_countsqlite3_result_blobsqlite3_result_value
                                                                                        • String ID:
                                                                                        • API String ID: 3091402450-0
                                                                                        • Opcode ID: 6f92c836fbb795daf3a7962a297cd56d7fdf036fc5a4b08ae36b44bc31250b96
                                                                                        • Instruction ID: 2cb845a4ce9ffaf03ba9e630422e9a11708341ff9049c1111aff5efe7dffd251
                                                                                        • Opcode Fuzzy Hash: 6f92c836fbb795daf3a7962a297cd56d7fdf036fc5a4b08ae36b44bc31250b96
                                                                                        • Instruction Fuzzy Hash: 95316BB1908305CFDB00DF29C8C068ABBF6BFA4354F15859AE8999B311E774E885CF91
                                                                                        APIs
                                                                                          • Part of subcall function 6091D906: sqlite3_log.SQLITE3 ref: 6091D932
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,6091DAAC), ref: 6091D96E
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6091D9A4
                                                                                        • sqlite3_log.SQLITE3 ref: 6091D9C2
                                                                                        • sqlite3_log.SQLITE3 ref: 6091D9E6
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 6091DA23
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log$sqlite3_mutex_leave$sqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 3336957480-0
                                                                                        • Opcode ID: 68b5d2af27ad255894bfeb8623bba8c139f2ca9c60ba98a2272989cf5ed6824f
                                                                                        • Instruction ID: d9af43b9a8a6bc602b280fcb2f131b69404697b98cb39da279ecd05a7c9d96dc
                                                                                        • Opcode Fuzzy Hash: 68b5d2af27ad255894bfeb8623bba8c139f2ca9c60ba98a2272989cf5ed6824f
                                                                                        • Instruction Fuzzy Hash: 80315A7020E709DBDB10DF28C59571ABBE6EFA2358F0188ACE8848F355D778D885DB42
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 251237202-0
                                                                                        • Opcode ID: 23d56d6093e2df916dec6e7f8cb62dfc3bc1ed3991c7e87bc6d36cbf29319073
                                                                                        • Instruction ID: 98b0caf354e5c2c595d741cb4842b4f93752b0602d3f6ea93c1c5cdc841d6ebf
                                                                                        • Opcode Fuzzy Hash: 23d56d6093e2df916dec6e7f8cb62dfc3bc1ed3991c7e87bc6d36cbf29319073
                                                                                        • Instruction Fuzzy Hash: 59214BB06087149BC7099F68C48170BBBF6FF65358F10895DE8958B345D7B4E842CB92
                                                                                        APIs
                                                                                        • sqlite3_aggregate_context.SQLITE3 ref: 60923186
                                                                                        • sqlite3_value_text.SQLITE3 ref: 609231B1
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 609231BE
                                                                                        • sqlite3_value_text.SQLITE3 ref: 609231DF
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 609231EB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_aggregate_context
                                                                                        • String ID:
                                                                                        • API String ID: 4225432645-0
                                                                                        • Opcode ID: 9a3f53ebb0e3752e314e1a691590dc6969ec54efccf0b37446f20434a437350e
                                                                                        • Instruction ID: 93129b32ac750e8c61f039086ab35c360638b693acf4dd01752a8d8d3da084e1
                                                                                        • Opcode Fuzzy Hash: 9a3f53ebb0e3752e314e1a691590dc6969ec54efccf0b37446f20434a437350e
                                                                                        • Instruction Fuzzy Hash: D311ACB5B183048BCB109F3DD485A5ABBE7AFA9258F158469E8948B349D731DC81CB82
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 6090358B
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 609035CE
                                                                                        • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 609035E7
                                                                                        • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 60903602
                                                                                        • sqlite3_free.SQLITE3(?,-00000200,?), ref: 6090360A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 251237202-0
                                                                                        • Opcode ID: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                        • Instruction ID: 6da8029a48239d1e4ccc44f92e5f81aa2e213ac2a3c42f5053a5440d86b985a8
                                                                                        • Opcode Fuzzy Hash: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                        • Instruction Fuzzy Hash: AF111F726182218FCB10EF79C8816197FE7BB66318F00491DE466D7366E73AD4809B41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: ($out of memory$string or blob too big
                                                                                        • API String ID: 632333372-3501858433
                                                                                        • Opcode ID: f93783aafb9fcf0060eab3f108ba590f50c7693bf8e4f01ae51c1876fb389877
                                                                                        • Instruction ID: 3afa64734a3e78fa55f71a0731d552fa43c84c8e2c2baaaba42f85fcb5c5cef9
                                                                                        • Opcode Fuzzy Hash: f93783aafb9fcf0060eab3f108ba590f50c7693bf8e4f01ae51c1876fb389877
                                                                                        • Instruction Fuzzy Hash: ADE1E474E052298FDB64DF28C88878DBBB6BF59304F1486DAD848AB355CB74DE818F41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: BINARY
                                                                                        • API String ID: 912767213-907554435
                                                                                        • Opcode ID: 358e7294ada95592f776a7aea0837fd370e69c3734ff16329508058326792d7c
                                                                                        • Instruction ID: e736149767c1c30a579ca94783b10ed7b1ce9a86617047aef1117a8a4e5871fc
                                                                                        • Opcode Fuzzy Hash: 358e7294ada95592f776a7aea0837fd370e69c3734ff16329508058326792d7c
                                                                                        • Instruction Fuzzy Hash: 37511874B082199FDB15CF69C580A9DBBFBBF99714F108199E855AB314D334EC82CB90
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_leavesqlite3_sqlsqlite3_value_text
                                                                                        • String ID: 2
                                                                                        • API String ID: 1925179355-450215437
                                                                                        • Opcode ID: 017665394774a5ec1d57d131794db0c7f41644566df91b7edab8c019f4ba7fda
                                                                                        • Instruction ID: daec16423bef7f864cf456acc4697acc1ccc8bf88f1741d0410f8c282e0d3ce3
                                                                                        • Opcode Fuzzy Hash: 017665394774a5ec1d57d131794db0c7f41644566df91b7edab8c019f4ba7fda
                                                                                        • Instruction Fuzzy Hash: 43517870A082188FDB15CF28C580799BBF6BF69314F1085E9E898AB355C774EC85CF81
                                                                                        APIs
                                                                                        Strings
                                                                                        • cannot commit - no transaction is active, xrefs: 60943E6D
                                                                                        • cannot rollback - no transaction is active, xrefs: 60943E76
                                                                                        • cannot start a transaction within a transaction, xrefs: 60943E64
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: cannot commit - no transaction is active$cannot rollback - no transaction is active$cannot start a transaction within a transaction
                                                                                        • API String ID: 632333372-114261937
                                                                                        • Opcode ID: ddd63fc2f4ebb9e99acec04a495730562a309a00cbbf3d03eb1c294c4ae89e00
                                                                                        • Instruction ID: cba6df30a620f8e97d756fa5287e094db382550e6d0fb143d49b6f71cc39d5ec
                                                                                        • Opcode Fuzzy Hash: ddd63fc2f4ebb9e99acec04a495730562a309a00cbbf3d03eb1c294c4ae89e00
                                                                                        • Instruction Fuzzy Hash: 78510875A053698BEB24CF28C98878DBBB6BF65304F1081DAD859AB351C774EE81CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: localtimesqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: local time unavailable
                                                                                        • API String ID: 3476490258-3313036412
                                                                                        • Opcode ID: a9b1c0b50f060a5bbc6c92d7f89bd0b6a8ac968f8b5633d7f71fb108da6960f5
                                                                                        • Instruction ID: 4f4616f600e8ba00cd64372d20570522753ce0599757101ef91648adcd92ae31
                                                                                        • Opcode Fuzzy Hash: a9b1c0b50f060a5bbc6c92d7f89bd0b6a8ac968f8b5633d7f71fb108da6960f5
                                                                                        • Instruction Fuzzy Hash: 5A51E574E08328CFEB20CFA8C88479DBBF6BF55304F1084A9D848AB245D7759985CF52
                                                                                        APIs
                                                                                        • sqlite3_prepare.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6095E352
                                                                                        • sqlite3_finalize.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6095E39E
                                                                                          • Part of subcall function 6091C74C: sqlite3_log.SQLITE3 ref: 6091C7E0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_finalizesqlite3_logsqlite3_prepare
                                                                                        • String ID: invalid rootpage
                                                                                        • API String ID: 2900056705-1762523506
                                                                                        • Opcode ID: 5af7933ce84ac252289d5830f5b0be78cb248be16395ccdaaa4757cb62fa59b0
                                                                                        • Instruction ID: e35d92d4d5d687ed3fcf3cf8dbbe4faa44b796928c97aaf65d4a5fb61068f762
                                                                                        • Opcode Fuzzy Hash: 5af7933ce84ac252289d5830f5b0be78cb248be16395ccdaaa4757cb62fa59b0
                                                                                        • Instruction Fuzzy Hash: B641A0B46083018BEB1ACF2AC48075DBBE7BF65304F14856DE8A5DB385E736D858CB51
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: exclusive$normal
                                                                                        • API String ID: 912767213-1147136348
                                                                                        • Opcode ID: 29e9401f49518814b50e3ed15ad71b000dc73413b2549e1a82a14ced97ba76c6
                                                                                        • Instruction ID: 22b0067b6bddd0d479abbf651ed848ce03cd33d782634df2b88592abfbeb1f6c
                                                                                        • Opcode Fuzzy Hash: 29e9401f49518814b50e3ed15ad71b000dc73413b2549e1a82a14ced97ba76c6
                                                                                        • Instruction Fuzzy Hash: 76317731A082048BD725DF6AC89174DB7F3AFA5308F10C059E8699F391CB79DC45CB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: auto_vacuum
                                                                                        • API String ID: 912767213-4168080761
                                                                                        • Opcode ID: ff3a2b024cb0d636ce8ecad7f1ec1c92fb5b1d2b3d1c4fb64b1339cf4c0984fc
                                                                                        • Instruction ID: ec10ef6bc290139d9b827470d2b5d5edbfe250ca480d169932f504409e5b6508
                                                                                        • Opcode Fuzzy Hash: ff3a2b024cb0d636ce8ecad7f1ec1c92fb5b1d2b3d1c4fb64b1339cf4c0984fc
                                                                                        • Instruction Fuzzy Hash: EE310175B043148BCB12DFA9C8E169EB7A7AFB5308F508028E84A9F305CB74DD06DB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$Protect$Query
                                                                                        • String ID: @
                                                                                        • API String ID: 3618607426-2766056989
                                                                                        • Opcode ID: 87eed4fdfb8a714c2ccf59b4811214093f6b69c249cf94f5336b704ca7b2c86f
                                                                                        • Instruction ID: 9ef078953c81764cbc897531ca9a51aae94ee009df6ab227313a12ae95fd4b54
                                                                                        • Opcode Fuzzy Hash: 87eed4fdfb8a714c2ccf59b4811214093f6b69c249cf94f5336b704ca7b2c86f
                                                                                        • Instruction Fuzzy Hash: 2C3130B1D052089BEF10EF69E48159EFFF5EB98254F10892AF869E3310E731E840DB52
                                                                                        APIs
                                                                                          • Part of subcall function 6091D906: sqlite3_log.SQLITE3 ref: 6091D932
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60949664
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_mutex_enter
                                                                                        • String ID: 2
                                                                                        • API String ID: 1972683386-450215437
                                                                                        • Opcode ID: 5698f442c3394250158954673b96593b380bee50ccc5b0bb766505cf0bcdc7cd
                                                                                        • Instruction ID: df5e0d6e93ef4aaef2d9793a9c2f746d238be8f5a735fb80f1545606216976b2
                                                                                        • Opcode Fuzzy Hash: 5698f442c3394250158954673b96593b380bee50ccc5b0bb766505cf0bcdc7cd
                                                                                        • Instruction Fuzzy Hash: 13315A71A042288BCB14DF29C9817D9BBB6EF65324F0041E9E859AB345D734ED85CF81
                                                                                        APIs
                                                                                        • sqlite3_malloc.SQLITE3 ref: 60927735
                                                                                          • Part of subcall function 60917C8B: sqlite3_initialize.SQLITE3(6091262C,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE), ref: 60917C95
                                                                                        • sqlite3_realloc.SQLITE3 ref: 60927782
                                                                                        • sqlite3_free.SQLITE3 ref: 60927798
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                                                        • String ID: d
                                                                                        • API String ID: 211589378-2564639436
                                                                                        • Opcode ID: 64f58ece873f3932e96f09b721c91b294dc412354c3de33d5e853dc75ef2b21b
                                                                                        • Instruction ID: a0bb00dea440298fb8152afb23b20c03752dff3bbd38fec213cf1335ed42caea
                                                                                        • Opcode Fuzzy Hash: 64f58ece873f3932e96f09b721c91b294dc412354c3de33d5e853dc75ef2b21b
                                                                                        • Instruction Fuzzy Hash: 1C2105B5A04205CFDB10DF59C4C0749BBFAEF69310F1584A9D888AB309E378E841CBA1
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: ROWID
                                                                                        • API String ID: 912767213-2122279469
                                                                                        • Opcode ID: da8a409fb9b3bc13bed17decabd49447c38f4e44837ab33a6a866efaf4bd80ae
                                                                                        • Instruction ID: 6e883765ae3d07a1e10fe8fda49030947ce754db39b0e81f3e07a08e33e60208
                                                                                        • Opcode Fuzzy Hash: da8a409fb9b3bc13bed17decabd49447c38f4e44837ab33a6a866efaf4bd80ae
                                                                                        • Instruction Fuzzy Hash: 8EF030B22193105AE7106F355E4135ABEEB9B65398F40447DE896C7341E776CC00C7A2
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: _Jv_RegisterClasses$libgcj-11.dll
                                                                                        • API String ID: 1646373207-2713375476
                                                                                        • Opcode ID: bacd3039f3d150bc21399cb69e1a04b3f8c3853fd0dd69d27ed445baa0060075
                                                                                        • Instruction ID: 0692f6de617793b220950405fd66b626f7603ceb612168f50321f59097e08602
                                                                                        • Opcode Fuzzy Hash: bacd3039f3d150bc21399cb69e1a04b3f8c3853fd0dd69d27ed445baa0060075
                                                                                        • Instruction Fuzzy Hash: 9FE04F7061D30156FB543F794D5232E79EB6B62548F10091CD59297240EB70E4408793
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: CORRELATED $I$LIST$SCALAR$b
                                                                                        • API String ID: 0-1519238300
                                                                                        • Opcode ID: ffcedaeafdcb6d8f2e2ec1a84acd16d73cbccfd0e985ccb186ca6ca96518e9b7
                                                                                        • Instruction ID: 5070ddbd54aa75723eeab30c83ee62c99015c5ed295f523a06be8e94238539d6
                                                                                        • Opcode Fuzzy Hash: ffcedaeafdcb6d8f2e2ec1a84acd16d73cbccfd0e985ccb186ca6ca96518e9b7
                                                                                        • Instruction Fuzzy Hash: 7BA11774A08258CFDB19DFA8C48079EBBF2AF68308F14C559E8559B394C779D982CF41
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: .$:$:$;$;
                                                                                        • API String ID: 0-3979609778
                                                                                        • Opcode ID: 905cf00ca1816daaffb20ba7750efdce9bc18b518a6293a3e69353dec058b806
                                                                                        • Instruction ID: 82301216793a8251b37664171e1d7f7cc977ac85685342cb7a5d9a9a2538bf11
                                                                                        • Opcode Fuzzy Hash: 905cf00ca1816daaffb20ba7750efdce9bc18b518a6293a3e69353dec058b806
                                                                                        • Instruction Fuzzy Hash: 025190B1A083419ED701DF55C08438ABFF6FB55348F20891DD49597291E3B9CA89CFD2
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$memcmpsqlite3_logstrcmp
                                                                                        • String ID:
                                                                                        • API String ID: 3787749158-0
                                                                                        • Opcode ID: a79a60299c506cc25d2cee0fc6933dfce43ba9e5acb8f6fb506e63d9cac08c3a
                                                                                        • Instruction ID: 3a019c748b48d1f4cefc188ea32db0e39b624b651fc4c94a8bb4174fac2ee33e
                                                                                        • Opcode Fuzzy Hash: a79a60299c506cc25d2cee0fc6933dfce43ba9e5acb8f6fb506e63d9cac08c3a
                                                                                        • Instruction Fuzzy Hash: A6E1F370D143059FDB05CFA9D48078EBBF6AFA8304F148529E865AB358E774E885CF81
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free
                                                                                        • String ID:
                                                                                        • API String ID: 2313487548-0
                                                                                        • Opcode ID: fdfed7320dc660532c227a6533d8dd64a608dd675424e4ce40b6fa2adf2c4247
                                                                                        • Instruction ID: 860b3e85c9efec32843c63b1150f812198a1f3bc77abbabbaec50dff28b3b7f5
                                                                                        • Opcode Fuzzy Hash: fdfed7320dc660532c227a6533d8dd64a608dd675424e4ce40b6fa2adf2c4247
                                                                                        • Instruction Fuzzy Hash: D5E145B4A08209CFDB05CFA9C18479EBBB3FF69304F218598D8956B355C375E896CB81
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: sqlite_master$sqlite_sequence$sqlite_temp_master
                                                                                        • API String ID: 0-1177837799
                                                                                        • Opcode ID: 085510938b30b084856aa7b259c4df7bffa53e1b2481622b109523ca14d4278a
                                                                                        • Instruction ID: 479d2aece45500654e3c226a125c37703e21b80b64e35dcd946f74865dfe5d46
                                                                                        • Opcode Fuzzy Hash: 085510938b30b084856aa7b259c4df7bffa53e1b2481622b109523ca14d4278a
                                                                                        • Instruction Fuzzy Hash: FBC14A74B092088BDB15DF28C49179EBBF7BFA8308F14C469E8559B395D778D882CB41
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_leave$sqlite3_logsqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 4249760608-0
                                                                                        • Opcode ID: e78230ef7cd28932e7b9ef2f69f072c46b75927c60db233a503d8d467ec1ab42
                                                                                        • Instruction ID: 23ac0c8758fd748ddf98d50faa1d8854beb2b9febe91d57fa1789b8d38eed077
                                                                                        • Opcode Fuzzy Hash: e78230ef7cd28932e7b9ef2f69f072c46b75927c60db233a503d8d467ec1ab42
                                                                                        • Instruction Fuzzy Hash: 3E412770A047048BE701EF2AC49578ABBF6EFA4308F00C46DE8998B351D779D849CB65
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_declare_vtabsqlite3_mallocsqlite3_mprintfsqlite3_strnicmp
                                                                                        • String ID:
                                                                                        • API String ID: 2845923074-0
                                                                                        • Opcode ID: 4fd59503712b1f20a87dc4c70b6e3e0a3e9ef93a61c329baad4b99a71e1a44b9
                                                                                        • Instruction ID: 196bae04769affe5f0e5fb0e7381233fb8abe816a40e1caf860115ce4023a17d
                                                                                        • Opcode Fuzzy Hash: 4fd59503712b1f20a87dc4c70b6e3e0a3e9ef93a61c329baad4b99a71e1a44b9
                                                                                        • Instruction Fuzzy Hash: FB416E7490420A8FCB04CF69C08169EBBF2FF98324F158569E856AB381DB75EC45CFA5
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mallocsqlite3_value_bytessqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 1648232842-0
                                                                                        • Opcode ID: 583817f301ccf5f0353e05239885f5eb569c7181ba98f21d4ae8194699e61ff7
                                                                                        • Instruction ID: b90d8b79f8209887cc0dbb2450be3e1370e4500c5be641eaf221280f708d9280
                                                                                        • Opcode Fuzzy Hash: 583817f301ccf5f0353e05239885f5eb569c7181ba98f21d4ae8194699e61ff7
                                                                                        • Instruction Fuzzy Hash: DF31C0B4A042058FDB08DF69D094B5ABBE6FF58354F14C4A9E8588F349D779E842CBA0
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_result_textsqlite3_snprintfsqlite3_value_blob
                                                                                        • String ID:
                                                                                        • API String ID: 3020506458-0
                                                                                        • Opcode ID: 38a41aed97e95974732c8f3a3ba60c59f2491b56bee93d95344535f95e08d0a1
                                                                                        • Instruction ID: eb43436a61f6ae59870d22c841438ef3347abfffa8773da0ffa6fc48d017af7d
                                                                                        • Opcode Fuzzy Hash: 38a41aed97e95974732c8f3a3ba60c59f2491b56bee93d95344535f95e08d0a1
                                                                                        • Instruction Fuzzy Hash: 1B31E4B1A087099FDB10DF69D48168EBBF6AFA8364F10C92EE49997350E734D8418F52
                                                                                        APIs
                                                                                        • sqlite3_step.SQLITE3 ref: 60960872
                                                                                        • sqlite3_reset.SQLITE3 ref: 60960886
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_enter.SQLITE3 ref: 60940C13
                                                                                          • Part of subcall function 60940BFB: sqlite3_mutex_leave.SQLITE3 ref: 60940C79
                                                                                        • sqlite3_column_int64.SQLITE3 ref: 6096089B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_column_int64sqlite3_mutex_entersqlite3_mutex_leavesqlite3_resetsqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 3429445273-0
                                                                                        • Opcode ID: 33682f70305a813da78416be84c3306b3741e2cace0acf0f7053801e342bdb81
                                                                                        • Instruction ID: f93c5302f7eaf79a98d2b177b70dff1505cf1d45e70e7c36b1a6357bfb494207
                                                                                        • Opcode Fuzzy Hash: 33682f70305a813da78416be84c3306b3741e2cace0acf0f7053801e342bdb81
                                                                                        • Instruction Fuzzy Hash: F9316A70A182808BEF19DF29C0D474ABBB7AFA4308F148599DC858F20BD775D885CBA1
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_snprintf$sqlite3_stricmpsqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 1035992805-0
                                                                                        • Opcode ID: ebcd3359e12dcd2a5fae4041d0ac36af9c02f380af15664aff35439f6a22d803
                                                                                        • Instruction ID: 433be5496a6babc551bdf8913a5981c66ad0b4972abed5d5fb3d61fcc7c23791
                                                                                        • Opcode Fuzzy Hash: ebcd3359e12dcd2a5fae4041d0ac36af9c02f380af15664aff35439f6a22d803
                                                                                        • Instruction Fuzzy Hash: 0B313AB1A19324DFD714DF18C482B4ABBE6FBA5358F11C499E4888B251DB74D884CF92
                                                                                        APIs
                                                                                        • sqlite3_win32_mbcs_to_utf8.SQLITE3 ref: 60924D77
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 60924DA3
                                                                                        • sqlite3_free.SQLITE3 ref: 60924DAB
                                                                                        • sqlite3_snprintf.SQLITE3 ref: 60924DD1
                                                                                          • Part of subcall function 6090AF60: sqlite3_free.SQLITE3 ref: 6090B005
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_snprintf$sqlite3_win32_mbcs_to_utf8
                                                                                        • String ID:
                                                                                        • API String ID: 3650497268-0
                                                                                        • Opcode ID: 6c7dd483931a990e2fb92cea1998fd1d3f6be9181f5cba8e29e8aad71d8b3a1e
                                                                                        • Instruction ID: 264b2bd1d4235deda5554058ca1c0d2dc68dda9cae08812b7cf31a7459838ff9
                                                                                        • Opcode Fuzzy Hash: 6c7dd483931a990e2fb92cea1998fd1d3f6be9181f5cba8e29e8aad71d8b3a1e
                                                                                        • Instruction Fuzzy Hash: E931D2B09183059BEB00EF69C58539EBFF5BFA5748F40882DE49997240EBB8C5448F92
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B196), ref: 609034C6
                                                                                        • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B196), ref: 6090350F
                                                                                        • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B196), ref: 60903538
                                                                                        • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B196), ref: 60903551
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1477753154-0
                                                                                        • Opcode ID: 07b7b8c71d1727e6a993e8172ca312882c3d26aba71613c45643e17ca473348a
                                                                                        • Instruction ID: f4f2183782bc848bdfdc6a49e9fb9781c24f369f140041d370a3a1db59819b5f
                                                                                        • Opcode Fuzzy Hash: 07b7b8c71d1727e6a993e8172ca312882c3d26aba71613c45643e17ca473348a
                                                                                        • Instruction Fuzzy Hash: D5111F726186218FDB00AF7CC8817597FEAFB66308F00442DE869D7362E779E8819741
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 60917C0B
                                                                                          • Part of subcall function 6091233C: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609123BA
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60917C25
                                                                                        • sqlite3_realloc.SQLITE3 ref: 60917C54
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60917C7C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_mutex_leavesqlite3_realloc
                                                                                        • String ID:
                                                                                        • API String ID: 1115209729-0
                                                                                        • Opcode ID: d811b2fc91388fb9644b4a755f857067384c0faeab45c771d373d8ee096ac127
                                                                                        • Instruction ID: d53db9b4ab48ad7d6a7f9a16a5eeeed869e773c790bc7794ca7ff54cda56fde6
                                                                                        • Opcode Fuzzy Hash: d811b2fc91388fb9644b4a755f857067384c0faeab45c771d373d8ee096ac127
                                                                                        • Instruction Fuzzy Hash: 1101BC7170C21A9BD700AF28C845649BEFBEBA6798F1044A9D885CB311EB36D8C2D791
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 6092981A
                                                                                          • Part of subcall function 6091233C: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609123BA
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60929830
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60929849
                                                                                        • sqlite3_memory_used.SQLITE3 ref: 60929884
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 2673540737-0
                                                                                        • Opcode ID: ad499e9ceff35dc14cff99968a72c10a3141c39631206db8bac7235578ce54a5
                                                                                        • Instruction ID: 11dd700d4444d1a4a763218a2d2b8e04826ec39a2c2a7de8bebd4a1013eb91e4
                                                                                        • Opcode Fuzzy Hash: ad499e9ceff35dc14cff99968a72c10a3141c39631206db8bac7235578ce54a5
                                                                                        • Instruction Fuzzy Hash: 64018C75F186088BCB00EF6AD88164A7BE7FBAA264F048528E8949B354D735D8808B91
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_text$sqlite3_freesqlite3_load_extension
                                                                                        • String ID:
                                                                                        • API String ID: 3526213481-0
                                                                                        • Opcode ID: 9b92d117bdc2dcd6c7a2d61c9a01ffd2192e56b102c9b428371cb9fbd302bae2
                                                                                        • Instruction ID: 2df50e5992a365e05119b8569b17c0be78e62c87e99d8ff770c8e44f56fcb9f0
                                                                                        • Opcode Fuzzy Hash: 9b92d117bdc2dcd6c7a2d61c9a01ffd2192e56b102c9b428371cb9fbd302bae2
                                                                                        • Instruction Fuzzy Hash: 530125B5A143099BCB00EF69D481AAEBBF9EF69654F00C829ECA497304D734D841CF91
                                                                                        APIs
                                                                                        • sqlite3_vmprintf.SQLITE3 ref: 60928CBA
                                                                                          • Part of subcall function 60928A2B: sqlite3_initialize.SQLITE3 ref: 60928A35
                                                                                        • sqlite3_mprintf.SQLITE3 ref: 60928CDA
                                                                                          • Part of subcall function 60928A92: sqlite3_initialize.SQLITE3 ref: 60928A98
                                                                                          • Part of subcall function 60928A92: sqlite3_vmprintf.SQLITE3 ref: 60928AB2
                                                                                        • sqlite3_free.SQLITE3 ref: 60928CE5
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 60928D00
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_initializesqlite3_vmprintf$sqlite3_mprintfsqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 2126213637-0
                                                                                        • Opcode ID: f1b500402eafc2aa96887bacedf03b06a3db66eba790ecb8c3c6b901a9ec3d5c
                                                                                        • Instruction ID: e7211b1c26a99bd0cb718f15e4a91a4ad3c6b92715d77cac3203594284fe978a
                                                                                        • Opcode Fuzzy Hash: f1b500402eafc2aa96887bacedf03b06a3db66eba790ecb8c3c6b901a9ec3d5c
                                                                                        • Instruction Fuzzy Hash: 6A014C70A053069FDB109F69D48065ABBE9BF24354F00482EE8C4C7200E774D841CB51
                                                                                        APIs
                                                                                          • Part of subcall function 6091D6E0: sqlite3_log.SQLITE3 ref: 6091D71D
                                                                                        • sqlite3_log.SQLITE3 ref: 60921F29
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60921F43
                                                                                        • sqlite3_value_text.SQLITE3 ref: 60921F5C
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60921F76
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log$sqlite3_mutex_entersqlite3_mutex_leavesqlite3_value_text
                                                                                        • String ID:
                                                                                        • API String ID: 645246966-0
                                                                                        • Opcode ID: 3413a270a7f376cda42f96d524332028e8b23b909412e602792307175cbc2f2f
                                                                                        • Instruction ID: b10972df9aa94e45465dc19fdc5e1897ebb43f1eb2aa4ef3591bb8fbe0de5073
                                                                                        • Opcode Fuzzy Hash: 3413a270a7f376cda42f96d524332028e8b23b909412e602792307175cbc2f2f
                                                                                        • Instruction Fuzzy Hash: 74014CB1A183448BDB009F66D5827497BEAEF75748F408869EC958F305E779D8908B01
                                                                                        APIs
                                                                                        • sqlite3_prepare.SQLITE3 ref: 6096853C
                                                                                        • sqlite3_errmsg.SQLITE3 ref: 60968548
                                                                                          • Part of subcall function 60921EEC: sqlite3_log.SQLITE3 ref: 60921F29
                                                                                        • sqlite3_errcode.SQLITE3 ref: 60968560
                                                                                          • Part of subcall function 6091D78A: sqlite3_log.SQLITE3 ref: 6091D7C8
                                                                                        • sqlite3_step.SQLITE3 ref: 6096856D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log$sqlite3_errcodesqlite3_errmsgsqlite3_preparesqlite3_step
                                                                                        • String ID:
                                                                                        • API String ID: 2877408194-0
                                                                                        • Opcode ID: 1277b551866215d041bb16d3363f0389c1c511589f6155ff9e6b1a8267c7932b
                                                                                        • Instruction ID: 59d3e8df93bc7edd8300aa832d49de8373145429ae39b5a41637e9671c32a934
                                                                                        • Opcode Fuzzy Hash: 1277b551866215d041bb16d3363f0389c1c511589f6155ff9e6b1a8267c7932b
                                                                                        • Instruction Fuzzy Hash: E70162B49183049BD704EF69C48125EFBE9EF64354F008A6DF8A987354D774C940CB42
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 60929A02
                                                                                          • Part of subcall function 6091233C: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609123BA
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60929A19
                                                                                        • strcmp.MSVCRT ref: 60929A34
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60929A47
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_mutex_leavestrcmp
                                                                                        • String ID:
                                                                                        • API String ID: 1894734062-0
                                                                                        • Opcode ID: ba069c8216be4532b8f6b916214a16911225e5c3b0e8133d694eced18d7fa94b
                                                                                        • Instruction ID: 6463ce1a98f736a81b8b54a180cb5803acdac12d713b7324d525aeb5340eacaf
                                                                                        • Opcode Fuzzy Hash: ba069c8216be4532b8f6b916214a16911225e5c3b0e8133d694eced18d7fa94b
                                                                                        • Instruction Fuzzy Hash: 6CF0BE717183048BCB00AF6A98C265A7BEAEFB1258B00447CEC588B309E730DC058761
                                                                                        APIs
                                                                                        • sqlite3_prepare_v2.SQLITE3 ref: 60960981
                                                                                        • sqlite3_step.SQLITE3 ref: 60960990
                                                                                        • sqlite3_column_int.SQLITE3 ref: 609609A8
                                                                                          • Part of subcall function 60918C1F: sqlite3_value_int.SQLITE3 ref: 60918C37
                                                                                        • sqlite3_finalize.SQLITE3 ref: 609609B5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_column_intsqlite3_finalizesqlite3_prepare_v2sqlite3_stepsqlite3_value_int
                                                                                        • String ID:
                                                                                        • API String ID: 4265739436-0
                                                                                        • Opcode ID: ce7f9ff9171ff03c9e527be6ba34f5003622ceb96917cba2437505ffc974f595
                                                                                        • Instruction ID: 19f3e066f7aea0be90207b64734869eaf454b22832ee484edc7dd96a79c67deb
                                                                                        • Opcode Fuzzy Hash: ce7f9ff9171ff03c9e527be6ba34f5003622ceb96917cba2437505ffc974f595
                                                                                        • Instruction Fuzzy Hash: 2A01FBB49183059BE700AF69C48534EFBF6EFA4318F00896DE8E897340E775D9408B82
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID:
                                                                                        • API String ID: 1163609955-0
                                                                                        • Opcode ID: 90cc7c4f47505d7a334aff1fcf07a3719d5d1a103fba55e034d76773b0258f31
                                                                                        • Instruction ID: b5caf9bb402504d36d2bb5076da33f841c862ad70789ebbb1d40aaddd55b472f
                                                                                        • Opcode Fuzzy Hash: 90cc7c4f47505d7a334aff1fcf07a3719d5d1a103fba55e034d76773b0258f31
                                                                                        • Instruction Fuzzy Hash: 8DF0B4B17293109FC714AF39A48125A7AE6DFA5658F11846DE485DB304EBB5CC828782
                                                                                        APIs
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 60908486
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609084B5
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 609084C5
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 609084F8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1477753154-0
                                                                                        • Opcode ID: 1d2e2572f9aefdde2b8969d27c42b70107582082fca2b54313376722f891324e
                                                                                        • Instruction ID: 39acc191a039d3cfceb26e113b3c02210e2740cde266dc9eefb778865c525e82
                                                                                        • Opcode Fuzzy Hash: 1d2e2572f9aefdde2b8969d27c42b70107582082fca2b54313376722f891324e
                                                                                        • Instruction Fuzzy Hash: 5001E4B09093148BDB40AF25C0D97CABBA5FF11318F0884BDDC894F34AD3B9E5408BA0
                                                                                        APIs
                                                                                          • Part of subcall function 60940B1B: sqlite3_blob_close.SQLITE3 ref: 60940B29
                                                                                          • Part of subcall function 6093F8E8: sqlite3_free.SQLITE3 ref: 6093F90D
                                                                                          • Part of subcall function 6093F8E8: sqlite3_free.SQLITE3 ref: 6093F918
                                                                                        • sqlite3_free.SQLITE3 ref: 60940B61
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 60940B6C
                                                                                        • sqlite3_free.SQLITE3 ref: 60940B77
                                                                                        • sqlite3_free.SQLITE3 ref: 60940B7F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_blob_closesqlite3_mutex_enter
                                                                                        • String ID:
                                                                                        • API String ID: 1319845086-0
                                                                                        • Opcode ID: 2f595e198f8f19ed35dba4809c81e125244c5bb4d03a5d4affec8e75baeb0482
                                                                                        • Instruction ID: 496d63b55e7462032bedac55d16342f57a120ac14036606ab51c9771602d6460
                                                                                        • Opcode Fuzzy Hash: 2f595e198f8f19ed35dba4809c81e125244c5bb4d03a5d4affec8e75baeb0482
                                                                                        • Instruction Fuzzy Hash: A8F01570640214CFCB40FFB9D4C2A08B7E9AF35A1CF4588A9E8828B306E735E8408B52
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F879
                                                                                        • sqlite3_blob_close.SQLITE3 ref: 6093F884
                                                                                          • Part of subcall function 6093F804: sqlite3_mutex_enter.SQLITE3 ref: 6093F81F
                                                                                          • Part of subcall function 6093F804: sqlite3_finalize.SQLITE3 ref: 6093F82A
                                                                                          • Part of subcall function 6093F804: sqlite3_mutex_leave.SQLITE3 ref: 6093F840
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F868
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_free.SQLITE3 ref: 6093F88C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_mutex_enter$sqlite3_blob_closesqlite3_finalizesqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 3376080156-0
                                                                                        • Opcode ID: 62bba8bded67edb3e7ec5b4190a567f2186f1725189168df9a038347470dbc26
                                                                                        • Instruction ID: 785070c11091b27beedb1923df3051fde6321d9708a41447b1e299322a6ade37
                                                                                        • Opcode Fuzzy Hash: 62bba8bded67edb3e7ec5b4190a567f2186f1725189168df9a038347470dbc26
                                                                                        • Instruction Fuzzy Hash: 23E06DB09443108FDB08BFB9C4D5B057BE9AF3461CF4218ADD8828B202E775D880CB52
                                                                                        APIs
                                                                                        • sqlite3_initialize.SQLITE3 ref: 60912749
                                                                                          • Part of subcall function 6091233C: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609128CE,?), ref: 609123BA
                                                                                        • sqlite3_mutex_enter.SQLITE3 ref: 6091275E
                                                                                        • sqlite3_free.SQLITE3 ref: 6091276B
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                        • sqlite3_mutex_leave.SQLITE3 ref: 60912787
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_mutex_enter$sqlite3_freesqlite3_initializesqlite3_mutex_leave
                                                                                        • String ID:
                                                                                        • API String ID: 1885817404-0
                                                                                        • Opcode ID: 32192f4b060c8cdb535655f6391389faadb47ee6b1d02519a96caad349a8157d
                                                                                        • Instruction ID: fb9b9c7ce7f19a123a704cd52bb1fa8b494f8929be3796d734782b4ad5de11eb
                                                                                        • Opcode Fuzzy Hash: 32192f4b060c8cdb535655f6391389faadb47ee6b1d02519a96caad349a8157d
                                                                                        • Instruction Fuzzy Hash: FFE04FB561C3194BDB007FB5888A70A7EEAAB7264CF01086DE4928B242E77AD4C04B56
                                                                                        APIs
                                                                                        • sqlite3_randomness.SQLITE3 ref: 6093D94D
                                                                                        • sqlite3_randomness.SQLITE3 ref: 6093DA6B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_randomness
                                                                                        • String ID:
                                                                                        • API String ID: 2799796375-3916222277
                                                                                        • Opcode ID: 86a05b88fd4f3eeb61a04e355b1a0b602efd30488178628e252a7fe5a866f1e2
                                                                                        • Instruction ID: 7da2d73c3ceaca5e1c436202d8be1cddab305f296c7319ec9abc882ff73b10ac
                                                                                        • Opcode Fuzzy Hash: 86a05b88fd4f3eeb61a04e355b1a0b602efd30488178628e252a7fe5a866f1e2
                                                                                        • Instruction Fuzzy Hash: 4C122674A056288BDB24CF68D89078DBBF6BFA8314F20856DD859AB741DB34ED85CF40
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: into$out of
                                                                                        • API String ID: 632333372-1114767565
                                                                                        • Opcode ID: df17e1249b8b45d09fbd943c8d1550bfca99f6752e91fa8f205bee5d7f83209f
                                                                                        • Instruction ID: 2a38e26b48d2468c6d58097b87fc40ca8b3ee28a2764ed852850590cc35dcded
                                                                                        • Opcode Fuzzy Hash: df17e1249b8b45d09fbd943c8d1550bfca99f6752e91fa8f205bee5d7f83209f
                                                                                        • Instruction Fuzzy Hash: 6FA1F370A052298FDB21DF18C88878DFBBABF65304F1486EAD849AB245D774DE80CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: ($out of memory
                                                                                        • API String ID: 632333372-3520566864
                                                                                        • Opcode ID: a6ec86479acf62f1172f7832276c7406a850c1dcc57b3e26bc981c1f423df4df
                                                                                        • Instruction ID: 57528ff02e980b5a617a8a24fb32beaa1cbd7132d3e202487c736154e204374a
                                                                                        • Opcode Fuzzy Hash: a6ec86479acf62f1172f7832276c7406a850c1dcc57b3e26bc981c1f423df4df
                                                                                        • Instruction Fuzzy Hash: DDB1A3B49056298FDB24CF09C984B89FBB6BF58314F1586DAD8486B361D770EE81CF80
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: out of memory$string or blob too big
                                                                                        • API String ID: 0-2410398255
                                                                                        • Opcode ID: ebee43659b7f8bf695b1e3221daee135339e68f8d5b5864fc3fd6f115d13bf24
                                                                                        • Instruction ID: 29de3dc8bb06f76481b6f03c9795450ae05a2a7bfad631a35687455996f3b8f6
                                                                                        • Opcode Fuzzy Hash: ebee43659b7f8bf695b1e3221daee135339e68f8d5b5864fc3fd6f115d13bf24
                                                                                        • Instruction Fuzzy Hash: 71810A75A052298BDB24DF18C984B8DBBB6FF65304F1485DAD848AB351D774EE81CF80
                                                                                        APIs
                                                                                          • Part of subcall function 6093A0AF: sqlite3_log.SQLITE3 ref: 6093A11D
                                                                                        • sqlite3_log.SQLITE3 ref: 609493A0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: out of memory$string or blob too big
                                                                                        • API String ID: 632333372-2410398255
                                                                                        • Opcode ID: 50ca98b92805e2001fd64d2774f33ebbf331861a7c2e7fbad606820df154b568
                                                                                        • Instruction ID: 64b14b175dec7052d98ba8bcf718dc380351e01931d50d0e00c2da15f5966479
                                                                                        • Opcode Fuzzy Hash: 50ca98b92805e2001fd64d2774f33ebbf331861a7c2e7fbad606820df154b568
                                                                                        • Instruction Fuzzy Hash: 9A81C874A092258FDB24DF18C988B8DBBF6BF55304F1485DAE448AB252D774EE81CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: INTEGER
                                                                                        • API String ID: 912767213-1699370257
                                                                                        • Opcode ID: cc1262c5c824b207f15ca099f5bb6c91ae751b250b6c1ba8e7265cba0501f4f2
                                                                                        • Instruction ID: 18c396d1e988457f9d478eb4d2ea4a9d5f3c53259eba0fa9b18afdb20929863b
                                                                                        • Opcode Fuzzy Hash: cc1262c5c824b207f15ca099f5bb6c91ae751b250b6c1ba8e7265cba0501f4f2
                                                                                        • Instruction Fuzzy Hash: 456190B0A086059FCB06CFAAC48079DBBF2BF99314F14852DD869AB341C774D819CF95
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_value_text
                                                                                        • String ID: (
                                                                                        • API String ID: 2320820228-3887548279
                                                                                        • Opcode ID: 2cdfde153b0dd0d7a176b8fbafdccdde2bf468f898a32de5cac31368735875f5
                                                                                        • Instruction ID: 57980e95b4affd92190af58e46d1cff89b26af68728c943b2e47049b584cf3ac
                                                                                        • Opcode Fuzzy Hash: 2cdfde153b0dd0d7a176b8fbafdccdde2bf468f898a32de5cac31368735875f5
                                                                                        • Instruction Fuzzy Hash: B3719AB49052698BDB60DF18C888B8DFBB5BF59304F1486DAD848AB291D774AEC4CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: out of memory$string or blob too big
                                                                                        • API String ID: 632333372-2410398255
                                                                                        • Opcode ID: de0c9d0e072b60a9c8be32b4226086e4d59a5a6681b3c7ea36258ea541018584
                                                                                        • Instruction ID: 88890b6169472447c0e12a94e273194792a0938a04fe59a076fdf3d6463261b0
                                                                                        • Opcode Fuzzy Hash: de0c9d0e072b60a9c8be32b4226086e4d59a5a6681b3c7ea36258ea541018584
                                                                                        • Instruction Fuzzy Hash: 7C51E6B49092658BDB20DF18C984B8CBBF2BF59314F1486DAD858AB391C375EE81CF41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free
                                                                                        • String ID: (NULL)$NULL
                                                                                        • API String ID: 2313487548-873412390
                                                                                        • Opcode ID: 02a56a79d51ef4881dfad510899b03fa13167ff8caca7218705a1a4be3164689
                                                                                        • Instruction ID: ac56df034cd484bb756d6cb67b2fb73b738b149018bb5d4d7c4f4d456b84913a
                                                                                        • Opcode Fuzzy Hash: 02a56a79d51ef4881dfad510899b03fa13167ff8caca7218705a1a4be3164689
                                                                                        • Instruction Fuzzy Hash: 39519A35F4C2698FEB218F288890799BBB6AF66304F5480EDC499AB241DB34DDC5CF51
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: -- $d
                                                                                        • API String ID: 632333372-777087308
                                                                                        • Opcode ID: 0af258dbc5a79b1f9d16ab12c24f8c799fb422000b6795feb1d63c0737d811ef
                                                                                        • Instruction ID: 1ed6b73e0330db7bf9a62b8524688fe1e4f524cad73b6bda43ea9ace2f57bd6b
                                                                                        • Opcode Fuzzy Hash: 0af258dbc5a79b1f9d16ab12c24f8c799fb422000b6795feb1d63c0737d811ef
                                                                                        • Instruction Fuzzy Hash: 9C510574A052688FEB21CF18C988B8CBBF6FF59304F1441E9D458AB291C7B5AE85CF41
                                                                                        APIs
                                                                                          • Part of subcall function 60904394: sqlite3_mutex_try.SQLITE3(?,?,?,609081D2), ref: 609043B6
                                                                                        • sqlite3_log.SQLITE3 ref: 60948434
                                                                                        • sqlite3_log.SQLITE3 ref: 609493A0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log$sqlite3_mutex_try
                                                                                        • String ID: e
                                                                                        • API String ID: 3410241545-4024072794
                                                                                        • Opcode ID: 0ad99e45c95323bd9625d78c3301ac39909a141b24bdb58177bcfeaeadaa8898
                                                                                        • Instruction ID: c4c5b1be62c4f9d664eeec7ccf46ce4218fb73e86402cdbf583f8395bdac2e8a
                                                                                        • Opcode Fuzzy Hash: 0ad99e45c95323bd9625d78c3301ac39909a141b24bdb58177bcfeaeadaa8898
                                                                                        • Instruction Fuzzy Hash: 7E51E1B4A092258BDB24DF18C885B8DB7B6BF68304F1085DAE859AB351C774EE81CF41
                                                                                        APIs
                                                                                        • sqlite3_free.SQLITE3 ref: 60924F81
                                                                                          • Part of subcall function 60911C76: sqlite3_win32_sleep.SQLITE3 ref: 60911CAE
                                                                                        • sqlite3_free.SQLITE3 ref: 60924F49
                                                                                          • Part of subcall function 60901C69: sqlite3_mutex_enter.SQLITE3 ref: 60901C88
                                                                                          • Part of subcall function 60924E12: sqlite3_log.SQLITE3 ref: 60924E9D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_free$sqlite3_logsqlite3_mutex_entersqlite3_win32_sleep
                                                                                        • String ID: winAccess
                                                                                        • API String ID: 3558905852-3605117275
                                                                                        • Opcode ID: d7d27a323599c20bea479708036fe64064d69901d5341584f085874d699add56
                                                                                        • Instruction ID: 30eeedab9841f8a2f92837915b5eedf53e95d05516e6c63d1be0cea1d5a99dd7
                                                                                        • Opcode Fuzzy Hash: d7d27a323599c20bea479708036fe64064d69901d5341584f085874d699add56
                                                                                        • Instruction Fuzzy Hash: 9731A0319242188FDB109F68DA443DEBBFBBFA5324F114629E86597298DB78CC44CF91
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_logsqlite3_value_text
                                                                                        • String ID: string or blob too big
                                                                                        • API String ID: 2320820228-2803948771
                                                                                        • Opcode ID: fb8f91039fa6eab3207ad4c7debfa97743c81751d00667f9f6983b2afb8665e3
                                                                                        • Instruction ID: 21f8ce10b1ec1b55dd3b91ec778dca42e2d1aa130b3ca3979e02043445f145f4
                                                                                        • Opcode Fuzzy Hash: fb8f91039fa6eab3207ad4c7debfa97743c81751d00667f9f6983b2afb8665e3
                                                                                        • Instruction Fuzzy Hash: 8141B5B4A052298FDB20DF18C985B8DBBB5BF69304F1085DAE858AB351D774EE81CF41
                                                                                        APIs
                                                                                        • sqlite3_aggregate_context.SQLITE3 ref: 60913F63
                                                                                        • sqlite3_value_numeric_type.SQLITE3 ref: 60913F6F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_aggregate_contextsqlite3_value_numeric_type
                                                                                        • String ID:
                                                                                        • API String ID: 3265351223-3916222277
                                                                                        • Opcode ID: 52fe6c93557eb16af9519daca86b6a258f2b51c5a561586f9270093859f095ea
                                                                                        • Instruction ID: 0a4d92abe8eb7079bace19fa65d79f2ad9d5e4aab659b591c0c83c7173708a6b
                                                                                        • Opcode Fuzzy Hash: 52fe6c93557eb16af9519daca86b6a258f2b51c5a561586f9270093859f095ea
                                                                                        • Instruction Fuzzy Hash: 54114CB0A086189BEF059F69D4D539ABFF6EF29314F0084D8D8908B349E771C9A4C782
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_stricmp
                                                                                        • String ID: log
                                                                                        • API String ID: 912767213-2403297477
                                                                                        • Opcode ID: 469c422b82c0304097227aebe544f3ac187898f53a775b57dbbe1fefbcfe24fc
                                                                                        • Instruction ID: 51e9089e0280fe452963e106d2ce1007e2549237f6d8f192060f84e4c07cd6f3
                                                                                        • Opcode Fuzzy Hash: 469c422b82c0304097227aebe544f3ac187898f53a775b57dbbe1fefbcfe24fc
                                                                                        • Instruction Fuzzy Hash: A3113AB07087048BD7169F65C5A231EBBF2EB65708F10C82CE4954B385C7BAC986CB83
                                                                                        APIs
                                                                                        • sqlite3_aggregate_context.SQLITE3 ref: 60913EDE
                                                                                        • sqlite3_result_double.SQLITE3 ref: 60913F1D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_aggregate_contextsqlite3_result_double
                                                                                        • String ID: integer overflow
                                                                                        • API String ID: 1477370529-1678498654
                                                                                        • Opcode ID: 296516dbfbaca934b699d5c173a289a27bf89b9b5c805250d6f97587ebbdf3e3
                                                                                        • Instruction ID: 6f77e9a1bd74d415917b433016566087d4ddf66e0ae786ef96b87b06cdd333f8
                                                                                        • Opcode Fuzzy Hash: 296516dbfbaca934b699d5c173a289a27bf89b9b5c805250d6f97587ebbdf3e3
                                                                                        • Instruction Fuzzy Hash: 6301C0B5A083089AEB01AF29C4857457FFAEF60318F0580EAD8850F366C374C8C5C791
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_strnicmp
                                                                                        • String ID: SQLITE_
                                                                                        • API String ID: 1961171630-787686576
                                                                                        • Opcode ID: 1b653509fd6a2ca2d82ac213d3e13ea8f2208fa36ef32664e967a4c270926436
                                                                                        • Instruction ID: c5fd6b10acae7fcfc9342472056554fa454398933afea81bb1ad8304700bfe3c
                                                                                        • Opcode Fuzzy Hash: 1b653509fd6a2ca2d82ac213d3e13ea8f2208fa36ef32664e967a4c270926436
                                                                                        • Instruction Fuzzy Hash: E801D6B1A0C3505BD741AF29C88075BFFFAEBA5358F51886DD58A87201D370DC81CB91
                                                                                        APIs
                                                                                        • sqlite3_value_bytes.SQLITE3 ref: 60923045
                                                                                        • sqlite3_value_blob.SQLITE3 ref: 60923064
                                                                                        Strings
                                                                                        • Invalid argument to rtreedepth(), xrefs: 6092304D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_value_blobsqlite3_value_bytes
                                                                                        • String ID: Invalid argument to rtreedepth()
                                                                                        • API String ID: 1063208240-2843521569
                                                                                        • Opcode ID: 5a3a80a8c759ec60c98340c288cd9be849c7915d1ed3a52ff3aa6867b2f7a2cb
                                                                                        • Instruction ID: a33090071c106c949c0dc619530ad41a05f681282c090b5d001e13ec3890229f
                                                                                        • Opcode Fuzzy Hash: 5a3a80a8c759ec60c98340c288cd9be849c7915d1ed3a52ff3aa6867b2f7a2cb
                                                                                        • Instruction Fuzzy Hash: 1BF022B29183008BDB00AF28C8862853BEAEF34214F514499EC858F34BE775DD40C7D4
                                                                                        APIs
                                                                                        • sqlite3_soft_heap_limit64.SQLITE3 ref: 609557E6
                                                                                          • Part of subcall function 60929808: sqlite3_initialize.SQLITE3 ref: 6092981A
                                                                                          • Part of subcall function 60929808: sqlite3_mutex_enter.SQLITE3 ref: 60929830
                                                                                          • Part of subcall function 60929808: sqlite3_mutex_leave.SQLITE3 ref: 60929849
                                                                                          • Part of subcall function 60929808: sqlite3_memory_used.SQLITE3 ref: 60929884
                                                                                        • sqlite3_soft_heap_limit64.SQLITE3 ref: 609557FA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_soft_heap_limit64$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_entersqlite3_mutex_leave
                                                                                        • String ID: soft_heap_limit
                                                                                        • API String ID: 1251656441-405162809
                                                                                        • Opcode ID: b3161b46f62c823347d26a4a85013238af43fb701a1e4ae56391df75405bd1bd
                                                                                        • Instruction ID: 482b5935adb22df30e70bee26d296aab6b654398c0012b3c052da312fa0a7a43
                                                                                        • Opcode Fuzzy Hash: b3161b46f62c823347d26a4a85013238af43fb701a1e4ae56391df75405bd1bd
                                                                                        • Instruction Fuzzy Hash: 02011671A042048BC710DFA8D88079DB7B3FFA5318F108629E8A89B294D730DC869B41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_strnicmp
                                                                                        • String ID: $rowid
                                                                                        • API String ID: 1961171630-2179333698
                                                                                        • Opcode ID: 0affbe61697ea606b25f85e0f4b5e21d177a9cc0537f3e99dcddf49b2de7dad9
                                                                                        • Instruction ID: 24360152f9bfab4881c7f154cc8aebd1e35b821d020967f864c49883a5b8ac71
                                                                                        • Opcode Fuzzy Hash: 0affbe61697ea606b25f85e0f4b5e21d177a9cc0537f3e99dcddf49b2de7dad9
                                                                                        • Instruction Fuzzy Hash: 0F01F6B09093148FE720CF69C985B4ABBB2BB64308F0184ACD88C97341C7B5DD98CF52
                                                                                        APIs
                                                                                        • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A088), ref: 6091D80A
                                                                                        • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A088), ref: 6091D843
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: sqlite3_log
                                                                                        • String ID: NULL
                                                                                        • API String ID: 632333372-324932091
                                                                                        • Opcode ID: a06f2a432a70b7db8004ee1c9394a506b75590da80eb3543a5c7fd5e0ccfff5b
                                                                                        • Instruction ID: 2391085b5a4ce31be24bc8d281f292d098ff09ba6e2f4b2b830e76d9448f8e85
                                                                                        • Opcode Fuzzy Hash: a06f2a432a70b7db8004ee1c9394a506b75590da80eb3543a5c7fd5e0ccfff5b
                                                                                        • Instruction Fuzzy Hash: 61F082B122D309DAD7211F54854230A79AAABE0354F4088FC95954B241D7FAC4C4C752
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterLeavefree
                                                                                        • String ID:
                                                                                        • API String ID: 4020351045-0
                                                                                        • Opcode ID: 19411dc0e5c2c1b12278a05795f8f36d1713264734acb24f97834f454ffaa4cb
                                                                                        • Instruction ID: 749c274a933e79b635dcd1d47ed358eb90c9fccdbe5cd68fe4631c1fed8c0242
                                                                                        • Opcode Fuzzy Hash: 19411dc0e5c2c1b12278a05795f8f36d1713264734acb24f97834f454ffaa4cb
                                                                                        • Instruction Fuzzy Hash: 5C0156B17282018B9B14DF69C881A29BBFB6BA6304B648D5CF488E7311D771DC84DB52
                                                                                        APIs
                                                                                        • EnterCriticalSection.KERNEL32(?,?,?,6096C9FD,?,?,?,?,?,6096C330), ref: 6096C887
                                                                                        • TlsGetValue.KERNEL32(?,?,?,?,6096C9FD,?,?,?,?,?,6096C330), ref: 6096C89D
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,6096C9FD,?,?,?,?,?,6096C330), ref: 6096C8A5
                                                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,6096C9FD,?,?,?,?,?,6096C330), ref: 6096C8C8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.1431168727.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                                                        • Associated: 00000010.00000002.1431137307.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432117129.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432144059.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432259752.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432301754.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.1432329997.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_60900000_SPONotifications.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                                        • String ID:
                                                                                        • API String ID: 682475483-0
                                                                                        • Opcode ID: 9120d609a84ff04c0ca02b109cdcc25c60f5d1a41800b0e0ad1dfeff862d17ff
                                                                                        • Instruction ID: 5753f1cb301ac24ef6a225c6fdb314220d19585bc117aae447b329e40cadcd46
                                                                                        • Opcode Fuzzy Hash: 9120d609a84ff04c0ca02b109cdcc25c60f5d1a41800b0e0ad1dfeff862d17ff
                                                                                        • Instruction Fuzzy Hash: 90F0CDB2A253105BFF30AF65CCC569A7BEEDF75354F000858F950A7301D770D94486A2