Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OFjT8HmzFJ.exe

Overview

General Information

Sample name:OFjT8HmzFJ.exe
renamed because original name is a hash value
Original sample name:c776a9efdaba18f15a5f554ae52c0385.exe
Analysis ID:1548912
MD5:c776a9efdaba18f15a5f554ae52c0385
SHA1:32e0de85a222239a0c5a4f8ef283739902c738bb
SHA256:5dea8691394058b4c4e88ac3fc070dd30c5ea528ad07d9fe8d1e6dde566adac7
Tags:32exe
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Uses known network protocols on non-standard ports
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • OFjT8HmzFJ.exe (PID: 6848 cmdline: "C:\Users\user\Desktop\OFjT8HmzFJ.exe" MD5: C776A9EFDABA18F15A5F554AE52C0385)
    • OFjT8HmzFJ.tmp (PID: 6876 cmdline: "C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp" /SL5="$2041C,6149981,54272,C:\Users\user\Desktop\OFjT8HmzFJ.exe" MD5: 0D05E478EC0E67B3670C32F7FCD99AC2)
      • syncplayer32_64.exe (PID: 7112 cmdline: "C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe" -i MD5: 5FBD9E9B8796E7B4A40FD070F0F43F8E)
  • cleanup
{"C2 list": ["bbdxzzh.com"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2901818594.0000000002A93000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: syncplayer32_64.exe PID: 7112JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-05T02:14:14.510768+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449730TCP
        2024-11-05T02:14:53.360891+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449738TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-05T02:14:49.768452+010020494671A Network Trojan was detected192.168.2.449736185.208.158.20280TCP
        2024-11-05T02:14:52.920230+010020494671A Network Trojan was detected192.168.2.449736185.208.158.20280TCP
        2024-11-05T02:14:53.989569+010020494671A Network Trojan was detected192.168.2.449739185.208.158.20280TCP
        2024-11-05T02:14:55.040656+010020494671A Network Trojan was detected192.168.2.449742185.208.158.20280TCP
        2024-11-05T02:14:56.088071+010020494671A Network Trojan was detected192.168.2.449743185.208.158.20280TCP
        2024-11-05T02:14:57.128908+010020494671A Network Trojan was detected192.168.2.449744185.208.158.20280TCP
        2024-11-05T02:14:57.544988+010020494671A Network Trojan was detected192.168.2.449744185.208.158.20280TCP
        2024-11-05T02:14:58.582047+010020494671A Network Trojan was detected192.168.2.449755185.208.158.20280TCP
        2024-11-05T02:14:58.995669+010020494671A Network Trojan was detected192.168.2.449755185.208.158.20280TCP
        2024-11-05T02:15:00.073078+010020494671A Network Trojan was detected192.168.2.449766185.208.158.20280TCP
        2024-11-05T02:15:01.120107+010020494671A Network Trojan was detected192.168.2.449772185.208.158.20280TCP
        2024-11-05T02:15:02.187639+010020494671A Network Trojan was detected192.168.2.449778185.208.158.20280TCP
        2024-11-05T02:15:03.241514+010020494671A Network Trojan was detected192.168.2.449784185.208.158.20280TCP
        2024-11-05T02:15:04.285665+010020494671A Network Trojan was detected192.168.2.449795185.208.158.20280TCP
        2024-11-05T02:15:05.349729+010020494671A Network Trojan was detected192.168.2.449801185.208.158.20280TCP
        2024-11-05T02:15:05.765708+010020494671A Network Trojan was detected192.168.2.449801185.208.158.20280TCP
        2024-11-05T02:15:07.625028+010020494671A Network Trojan was detected192.168.2.449807185.208.158.20280TCP
        2024-11-05T02:15:08.712802+010020494671A Network Trojan was detected192.168.2.449813185.208.158.20280TCP
        2024-11-05T02:15:09.741372+010020494671A Network Trojan was detected192.168.2.449824185.208.158.20280TCP
        2024-11-05T02:15:10.793641+010020494671A Network Trojan was detected192.168.2.449830185.208.158.20280TCP
        2024-11-05T02:15:11.835815+010020494671A Network Trojan was detected192.168.2.449835185.208.158.20280TCP
        2024-11-05T02:15:12.866653+010020494671A Network Trojan was detected192.168.2.449841185.208.158.20280TCP
        2024-11-05T02:15:13.283295+010020494671A Network Trojan was detected192.168.2.449841185.208.158.20280TCP
        2024-11-05T02:15:14.463695+010020494671A Network Trojan was detected192.168.2.449850185.208.158.20280TCP
        2024-11-05T02:15:15.528204+010020494671A Network Trojan was detected192.168.2.449857185.208.158.20280TCP
        2024-11-05T02:15:16.578267+010020494671A Network Trojan was detected192.168.2.449863185.208.158.20280TCP
        2024-11-05T02:15:17.617802+010020494671A Network Trojan was detected192.168.2.449868185.208.158.20280TCP
        2024-11-05T02:15:18.669238+010020494671A Network Trojan was detected192.168.2.449875185.208.158.20280TCP
        2024-11-05T02:15:19.767131+010020494671A Network Trojan was detected192.168.2.449880185.208.158.20280TCP
        2024-11-05T02:15:20.821477+010020494671A Network Trojan was detected192.168.2.449888185.208.158.20280TCP
        2024-11-05T02:15:21.893591+010020494671A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:22.318772+010020494671A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:22.735176+010020494671A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:23.162892+010020494671A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:23.583165+010020494671A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:24.001625+010020494671A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:25.096099+010020494671A Network Trojan was detected192.168.2.449913185.208.158.20280TCP
        2024-11-05T02:15:25.516612+010020494671A Network Trojan was detected192.168.2.449913185.208.158.20280TCP
        2024-11-05T02:15:25.931277+010020494671A Network Trojan was detected192.168.2.449913185.208.158.20280TCP
        2024-11-05T02:15:27.012320+010020494671A Network Trojan was detected192.168.2.449926185.208.158.20280TCP
        2024-11-05T02:15:28.133251+010020494671A Network Trojan was detected192.168.2.449933185.208.158.20280TCP
        2024-11-05T02:15:29.159381+010020494671A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-11-05T02:15:29.570861+010020494671A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-11-05T02:15:30.984896+010020494671A Network Trojan was detected192.168.2.449949185.208.158.20280TCP
        2024-11-05T02:15:32.026991+010020494671A Network Trojan was detected192.168.2.449959185.208.158.20280TCP
        2024-11-05T02:15:33.060397+010020494671A Network Trojan was detected192.168.2.449966185.208.158.20280TCP
        2024-11-05T02:15:34.107691+010020494671A Network Trojan was detected192.168.2.449972185.208.158.20280TCP
        2024-11-05T02:15:35.168076+010020494671A Network Trojan was detected192.168.2.449978185.208.158.20280TCP
        2024-11-05T02:15:36.213862+010020494671A Network Trojan was detected192.168.2.449984185.208.158.20280TCP
        2024-11-05T02:15:37.260423+010020494671A Network Trojan was detected192.168.2.449993185.208.158.20280TCP
        2024-11-05T02:15:38.282394+010020494671A Network Trojan was detected192.168.2.450000185.208.158.20280TCP
        2024-11-05T02:15:38.694908+010020494671A Network Trojan was detected192.168.2.450000185.208.158.20280TCP
        2024-11-05T02:15:39.768544+010020494671A Network Trojan was detected192.168.2.450007185.208.158.20280TCP
        2024-11-05T02:15:40.810716+010020494671A Network Trojan was detected192.168.2.450016185.208.158.20280TCP
        2024-11-05T02:15:41.843737+010020494671A Network Trojan was detected192.168.2.450022185.208.158.20280TCP
        2024-11-05T02:15:42.876658+010020494671A Network Trojan was detected192.168.2.450030185.208.158.20280TCP
        2024-11-05T02:15:43.296295+010020494671A Network Trojan was detected192.168.2.450030185.208.158.20280TCP
        2024-11-05T02:15:44.337863+010020494671A Network Trojan was detected192.168.2.450039185.208.158.20280TCP
        2024-11-05T02:15:45.383395+010020494671A Network Trojan was detected192.168.2.450045185.208.158.20280TCP
        2024-11-05T02:15:46.434284+010020494671A Network Trojan was detected192.168.2.450050185.208.158.20280TCP
        2024-11-05T02:15:47.470593+010020494671A Network Trojan was detected192.168.2.450051185.208.158.20280TCP
        2024-11-05T02:15:47.885636+010020494671A Network Trojan was detected192.168.2.450051185.208.158.20280TCP
        2024-11-05T02:15:48.928882+010020494671A Network Trojan was detected192.168.2.450052185.208.158.20280TCP
        2024-11-05T02:15:49.984342+010020494671A Network Trojan was detected192.168.2.450053185.208.158.20280TCP
        2024-11-05T02:15:51.054715+010020494671A Network Trojan was detected192.168.2.450054185.208.158.20280TCP
        2024-11-05T02:15:52.094748+010020494671A Network Trojan was detected192.168.2.450055185.208.158.20280TCP
        2024-11-05T02:15:53.267725+010020494671A Network Trojan was detected192.168.2.450056185.208.158.20280TCP
        2024-11-05T02:15:54.323361+010020494671A Network Trojan was detected192.168.2.450057185.208.158.20280TCP
        2024-11-05T02:15:55.382684+010020494671A Network Trojan was detected192.168.2.450058185.208.158.20280TCP
        2024-11-05T02:15:56.434637+010020494671A Network Trojan was detected192.168.2.450059185.208.158.20280TCP
        2024-11-05T02:15:57.845030+010020494671A Network Trojan was detected192.168.2.450060185.208.158.20280TCP
        2024-11-05T02:15:58.911115+010020494671A Network Trojan was detected192.168.2.450061185.208.158.20280TCP
        2024-11-05T02:15:59.952574+010020494671A Network Trojan was detected192.168.2.450062185.208.158.20280TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-05T02:14:49.768452+010020501121A Network Trojan was detected192.168.2.449736185.208.158.20280TCP
        2024-11-05T02:14:52.920230+010020501121A Network Trojan was detected192.168.2.449736185.208.158.20280TCP
        2024-11-05T02:14:53.989569+010020501121A Network Trojan was detected192.168.2.449739185.208.158.20280TCP
        2024-11-05T02:14:55.040656+010020501121A Network Trojan was detected192.168.2.449742185.208.158.20280TCP
        2024-11-05T02:14:56.088071+010020501121A Network Trojan was detected192.168.2.449743185.208.158.20280TCP
        2024-11-05T02:14:57.128908+010020501121A Network Trojan was detected192.168.2.449744185.208.158.20280TCP
        2024-11-05T02:14:57.544988+010020501121A Network Trojan was detected192.168.2.449744185.208.158.20280TCP
        2024-11-05T02:14:58.582047+010020501121A Network Trojan was detected192.168.2.449755185.208.158.20280TCP
        2024-11-05T02:14:58.995669+010020501121A Network Trojan was detected192.168.2.449755185.208.158.20280TCP
        2024-11-05T02:15:00.073078+010020501121A Network Trojan was detected192.168.2.449766185.208.158.20280TCP
        2024-11-05T02:15:01.120107+010020501121A Network Trojan was detected192.168.2.449772185.208.158.20280TCP
        2024-11-05T02:15:02.187639+010020501121A Network Trojan was detected192.168.2.449778185.208.158.20280TCP
        2024-11-05T02:15:03.241514+010020501121A Network Trojan was detected192.168.2.449784185.208.158.20280TCP
        2024-11-05T02:15:04.285665+010020501121A Network Trojan was detected192.168.2.449795185.208.158.20280TCP
        2024-11-05T02:15:05.349729+010020501121A Network Trojan was detected192.168.2.449801185.208.158.20280TCP
        2024-11-05T02:15:05.765708+010020501121A Network Trojan was detected192.168.2.449801185.208.158.20280TCP
        2024-11-05T02:15:07.625028+010020501121A Network Trojan was detected192.168.2.449807185.208.158.20280TCP
        2024-11-05T02:15:08.712802+010020501121A Network Trojan was detected192.168.2.449813185.208.158.20280TCP
        2024-11-05T02:15:09.741372+010020501121A Network Trojan was detected192.168.2.449824185.208.158.20280TCP
        2024-11-05T02:15:10.793641+010020501121A Network Trojan was detected192.168.2.449830185.208.158.20280TCP
        2024-11-05T02:15:11.835815+010020501121A Network Trojan was detected192.168.2.449835185.208.158.20280TCP
        2024-11-05T02:15:12.866653+010020501121A Network Trojan was detected192.168.2.449841185.208.158.20280TCP
        2024-11-05T02:15:13.283295+010020501121A Network Trojan was detected192.168.2.449841185.208.158.20280TCP
        2024-11-05T02:15:14.463695+010020501121A Network Trojan was detected192.168.2.449850185.208.158.20280TCP
        2024-11-05T02:15:15.528204+010020501121A Network Trojan was detected192.168.2.449857185.208.158.20280TCP
        2024-11-05T02:15:16.578267+010020501121A Network Trojan was detected192.168.2.449863185.208.158.20280TCP
        2024-11-05T02:15:17.617802+010020501121A Network Trojan was detected192.168.2.449868185.208.158.20280TCP
        2024-11-05T02:15:18.669238+010020501121A Network Trojan was detected192.168.2.449875185.208.158.20280TCP
        2024-11-05T02:15:19.767131+010020501121A Network Trojan was detected192.168.2.449880185.208.158.20280TCP
        2024-11-05T02:15:20.821477+010020501121A Network Trojan was detected192.168.2.449888185.208.158.20280TCP
        2024-11-05T02:15:21.893591+010020501121A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:22.318772+010020501121A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:22.735176+010020501121A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:23.162892+010020501121A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:23.583165+010020501121A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:24.001625+010020501121A Network Trojan was detected192.168.2.449894185.208.158.20280TCP
        2024-11-05T02:15:25.096099+010020501121A Network Trojan was detected192.168.2.449913185.208.158.20280TCP
        2024-11-05T02:15:25.516612+010020501121A Network Trojan was detected192.168.2.449913185.208.158.20280TCP
        2024-11-05T02:15:25.931277+010020501121A Network Trojan was detected192.168.2.449913185.208.158.20280TCP
        2024-11-05T02:15:27.012320+010020501121A Network Trojan was detected192.168.2.449926185.208.158.20280TCP
        2024-11-05T02:15:28.133251+010020501121A Network Trojan was detected192.168.2.449933185.208.158.20280TCP
        2024-11-05T02:15:29.159381+010020501121A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-11-05T02:15:29.570861+010020501121A Network Trojan was detected192.168.2.449941185.208.158.20280TCP
        2024-11-05T02:15:30.984896+010020501121A Network Trojan was detected192.168.2.449949185.208.158.20280TCP
        2024-11-05T02:15:32.026991+010020501121A Network Trojan was detected192.168.2.449959185.208.158.20280TCP
        2024-11-05T02:15:33.060397+010020501121A Network Trojan was detected192.168.2.449966185.208.158.20280TCP
        2024-11-05T02:15:34.107691+010020501121A Network Trojan was detected192.168.2.449972185.208.158.20280TCP
        2024-11-05T02:15:35.168076+010020501121A Network Trojan was detected192.168.2.449978185.208.158.20280TCP
        2024-11-05T02:15:36.213862+010020501121A Network Trojan was detected192.168.2.449984185.208.158.20280TCP
        2024-11-05T02:15:37.260423+010020501121A Network Trojan was detected192.168.2.449993185.208.158.20280TCP
        2024-11-05T02:15:38.282394+010020501121A Network Trojan was detected192.168.2.450000185.208.158.20280TCP
        2024-11-05T02:15:38.694908+010020501121A Network Trojan was detected192.168.2.450000185.208.158.20280TCP
        2024-11-05T02:15:39.768544+010020501121A Network Trojan was detected192.168.2.450007185.208.158.20280TCP
        2024-11-05T02:15:40.810716+010020501121A Network Trojan was detected192.168.2.450016185.208.158.20280TCP
        2024-11-05T02:15:41.843737+010020501121A Network Trojan was detected192.168.2.450022185.208.158.20280TCP
        2024-11-05T02:15:42.876658+010020501121A Network Trojan was detected192.168.2.450030185.208.158.20280TCP
        2024-11-05T02:15:43.296295+010020501121A Network Trojan was detected192.168.2.450030185.208.158.20280TCP
        2024-11-05T02:15:44.337863+010020501121A Network Trojan was detected192.168.2.450039185.208.158.20280TCP
        2024-11-05T02:15:45.383395+010020501121A Network Trojan was detected192.168.2.450045185.208.158.20280TCP
        2024-11-05T02:15:46.434284+010020501121A Network Trojan was detected192.168.2.450050185.208.158.20280TCP
        2024-11-05T02:15:47.470593+010020501121A Network Trojan was detected192.168.2.450051185.208.158.20280TCP
        2024-11-05T02:15:47.885636+010020501121A Network Trojan was detected192.168.2.450051185.208.158.20280TCP
        2024-11-05T02:15:48.928882+010020501121A Network Trojan was detected192.168.2.450052185.208.158.20280TCP
        2024-11-05T02:15:49.984342+010020501121A Network Trojan was detected192.168.2.450053185.208.158.20280TCP
        2024-11-05T02:15:51.054715+010020501121A Network Trojan was detected192.168.2.450054185.208.158.20280TCP
        2024-11-05T02:15:52.094748+010020501121A Network Trojan was detected192.168.2.450055185.208.158.20280TCP
        2024-11-05T02:15:53.267725+010020501121A Network Trojan was detected192.168.2.450056185.208.158.20280TCP
        2024-11-05T02:15:54.323361+010020501121A Network Trojan was detected192.168.2.450057185.208.158.20280TCP
        2024-11-05T02:15:55.382684+010020501121A Network Trojan was detected192.168.2.450058185.208.158.20280TCP
        2024-11-05T02:15:56.434637+010020501121A Network Trojan was detected192.168.2.450059185.208.158.20280TCP
        2024-11-05T02:15:57.845030+010020501121A Network Trojan was detected192.168.2.450060185.208.158.20280TCP
        2024-11-05T02:15:58.911115+010020501121A Network Trojan was detected192.168.2.450061185.208.158.20280TCP
        2024-11-05T02:15:59.952574+010020501121A Network Trojan was detected192.168.2.450062185.208.158.20280TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: OFjT8HmzFJ.exeAvira: detected
        Source: syncplayer32_64.exe.7112.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["bbdxzzh.com"]}
        Source: OFjT8HmzFJ.exeVirustotal: Detection: 29%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\EC SyncPlayer 11.4.45\EC SyncPlayer 11.4.45.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045B9BC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045B9BC
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045BA70 ArcFourCrypt,1_2_0045BA70
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045BA88 ArcFourCrypt,1_2_0045BA88
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeUnpacked PE file: 2.2.syncplayer32_64.exe.400000.0.unpack
        Source: OFjT8HmzFJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: Binary string: MicrosoftWindowsCommon-Controls-6.0.2600.5512-comctl32.pdbr source: is-8817T.tmp.1.dr
        Source: Binary string: d:\gili\gili-cddvds-bitlocker\project\bin\sys\i386\SecCdEnc.pdbp source: is-VL7LS.tmp.1.dr
        Source: Binary string: d:\GS-WORK\Video Tools\Video Recorder\OUTPUT\TextDlg.pdb source: is-CMGGO.tmp.1.dr
        Source: Binary string: d:\GS-WORK\Video Tools\Video Recorder\OUTPUT\TextDlg.pdb$a source: is-CMGGO.tmp.1.dr
        Source: Binary string: msvcr90.i386.pdb source: is-LN7FL.tmp.1.dr
        Source: Binary string: )\release_bin\NvenCoderKernel.pdb source: is-ATOOC.tmp.1.dr
        Source: Binary string: E:\Work\GiliSoft\SerialKernal\output\MagicSkin.pdb source: is-AVN0V.tmp.1.dr
        Source: Binary string: )\release_bin\cudaEncoderKernel.pdb source: is-1R8O6.tmp.1.dr
        Source: Binary string: MFCM90.i386.pdb source: is-R8N4P.tmp.1.dr
        Source: Binary string: d:\gili\gili-cddvds-bitlocker\project\bin\sys\i386\SecCdDbg.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: MFCM90.i386.pdb0 source: is-R8N4P.tmp.1.dr
        Source: Binary string: d:\GS-WORK\OEM\ScreenRecoder\bin\utlis.pdb source: is-O9SMK.tmp.1.dr
        Source: Binary string: d:\gilisoft\gili-cddvd-bitlocker\project\bin\sys\amd64\SecCdDbg.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: mfc90u.i386.pdb source: is-M4GIC.tmp.1.dr
        Source: Binary string: mfc90.i386.pdb source: is-C25HO.tmp.1.dr
        Source: Binary string: \ServiceCtrl\ServiceCtrl\res\Service_32.pdb source: is-EDQQG.tmp.1.dr
        Source: Binary string: d:\gilisoft\gili-cddvd-bitlocker\project\bin\sys\amd64\SecCdEnc.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: msvcp90.i386.pdb source: is-GN1VG.tmp.1.dr
        Source: Binary string: mfc90.i386.pdbpmxt source: is-C25HO.tmp.1.dr
        Source: Binary string: \OutPut\ServiceCtrl.pdb source: is-EDQQG.tmp.1.dr
        Source: Binary string: MicrosoftWindowsCommon-Controls-6.0.2600.5512-comctl32.pdb source: is-8817T.tmp.1.dr
        Source: Binary string: msvcm90.i386.pdb source: is-HL5P4.tmp.1.dr
        Source: Binary string: D:\GS-WORK\MultiMediaKernel2.3\output\IntelHW.pdb source: is-4FGVI.tmp.1.dr
        Source: Binary string: MFCM90U.i386.pdb source: is-5FDD3.tmp.1.dr
        Source: Binary string: MFCM90U.i386.pdb0 source: is-5FDD3.tmp.1.dr
        Source: Binary string: d:\GS-WORK\MultiMediaKernel\output\ApngDecoder.pdb source: is-FCOF0.tmp.1.dr
        Source: Binary string: \ServiceCtrl\ServiceCtrl\res\Service_64.pdb source: is-EDQQG.tmp.1.dr
        Source: Binary string: d:\gili\gili-cddvds-bitlocker\project\bin\sys\i386\SecCdEnc.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: D:\GS-WORK\MultiMediaKernel2.3\output\IntelHW.pdb00 source: is-4FGVI.tmp.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00471184 FindFirstFileA,FindNextFileA,FindClose,1_2_00471184
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00451788 FindFirstFileA,GetLastError,1_2_00451788
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004606EC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004606EC
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00460B68 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00460B68
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045F160 FindFirstFileA,FindNextFileA,FindClose,1_2_0045F160
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00493274 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00493274
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49772 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49772 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49795 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49795 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49784 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49784 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49807 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49807 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49813 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49830 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49830 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49739 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49739 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49835 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49835 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49743 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49766 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49813 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49778 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49766 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49868 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49743 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49868 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49778 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49894 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49894 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49875 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49875 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49742 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49742 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49801 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49736 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49736 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49913 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49913 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49949 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49933 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49949 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49933 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49850 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49850 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49801 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49978 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49978 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49926 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49857 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49857 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49744 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49880 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49744 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49880 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49926 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49984 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49984 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49959 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49959 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49972 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49755 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49755 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49941 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49941 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49863 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49863 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50022 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50022 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50016 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50016 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50000 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50000 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50030 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50030 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50053 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50053 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49993 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49993 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50051 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50050 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49824 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50050 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49888 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50051 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49824 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50039 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50039 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50056 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50055 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50054 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50059 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50056 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50055 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50052 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50059 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49841 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49841 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49888 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50060 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50052 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50045 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50045 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50054 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49972 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50057 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50057 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50060 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50058 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50058 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50061 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50061 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50062 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50007 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50062 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50007 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49966 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49966 -> 185.208.158.202:80
        Source: Malware configuration extractorURLs: bbdxzzh.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 2023 -> 49915
        Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 2023
        Source: global trafficTCP traffic: 192.168.2.4:49737 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.202 185.208.158.202
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49730
        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49738
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386789f918c2e690 HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 91.211.247.248
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B472AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02B472AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386789f918c2e690 HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /cfg/poly-0004f2bd743f.cfg HTTP/1.1User-Agent: PolycomVVX-VVX_410-UA/5.4.1.18405Host: endpoints5-scl.5060sip.comProxy-Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /cfg/poly-0004f2bd743f.cfg HTTP/1.1User-Agent: PolycomVVX-VVX_410-UA/5.4.1.18405Host: endpoints5-scl.5060sip.comProxy-Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1Host: bbdxzzh.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: bbdxzzh.com
        Source: global trafficDNS traffic detected: DNS query: endpoints5-scl.5060sip.com
        Source: is-C25HO.tmp.1.dr, is-M4GIC.tmp.1.drString found in binary or memory: ftp://http://HTTP/1.0
        Source: syncplayer32_64.exe, 00000002.00000002.2901352412.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d8
        Source: syncplayer32_64.exe, 00000002.00000002.2901352412.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
        Source: is-6UNEV.tmp.1.drString found in binary or memory: http://gilisoft.com/webtools/livecheck/IsValidKey.php?key=
        Source: is-6UNEV.tmp.1.drString found in binary or memory: http://gilisoft.com/webtools/livecheck/IsValidKey3.php?key=
        Source: is-6UNEV.tmp.1.drString found in binary or memory: http://gilisoft.com/webtools/livecheck/UploadKeyInfo.php?key=%s&mail=%s&os=%s&lan=%s&mac=%s&vnum=%s
        Source: is-6UNEV.tmp.1.drString found in binary or memory: http://gilisoft.com/webtools/livecheck/ctrlKey2.php?key=%s&ctrl=delete
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
        Source: is-EDQQG.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
        Source: is-GC27D.tmp.1.drString found in binary or memory: http://sources.redhat.com/pthreads-win32/b%
        Source: is-A1FNP.tmp.1.drString found in binary or memory: http://sources.redhat.com/pthreads-win32/d&
        Source: OFjT8HmzFJ.tmp, OFjT8HmzFJ.tmp, 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-DLH94.tmp.1.dr, OFjT8HmzFJ.tmp.0.drString found in binary or memory: http://www.innosetup.com/
        Source: OFjT8HmzFJ.exe, 00000000.00000003.1652030703.0000000002128000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.exe, 00000000.00000003.1651894875.0000000002350000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.tmp, OFjT8HmzFJ.tmp, 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-DLH94.tmp.1.dr, OFjT8HmzFJ.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
        Source: OFjT8HmzFJ.exe, 00000000.00000003.1652030703.0000000002128000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.exe, 00000000.00000003.1651894875.0000000002350000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.tmp, 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-DLH94.tmp.1.dr, OFjT8HmzFJ.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU
        Source: is-8AHH0.tmp.1.dr, is-6CN68.tmp.1.drString found in binary or memory: http://www.tweak-uac.comb
        Source: is-EDQQG.tmp.1.drString found in binary or memory: https://www.globalsign.com/repository/0
        Source: is-EDQQG.tmp.1.drString found in binary or memory: https://www.globalsign.com/repository/06

        System Summary

        barindex
        Source: syncplayer32_64.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: EC SyncPlayer 11.4.45.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0042F000 NtdllDefWindowProc_A,1_2_0042F000
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00423AF4 NtdllDefWindowProc_A,1_2_00423AF4
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00412548 NtdllDefWindowProc_A,1_2_00412548
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0047451C NtdllDefWindowProc_A,1_2_0047451C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00455958 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00455958
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0042E6A0: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E6A0
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_0040936C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0040936C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004540F0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004540F0
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_004083300_2_00408330
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0046CAC41_2_0046CAC4
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00434E081_2_00434E08
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0043D8901_2_0043D890
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00463D141_2_00463D14
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0047BDBF1_2_0047BDBF
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004440081_2_00444008
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004341041_2_00434104
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004445B01_2_004445B0
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045C9D41_2_0045C9D4
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004309AC1_2_004309AC
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00482C541_2_00482C54
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00444CA81_2_00444CA8
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00488E981_2_00488E98
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004450B41_2_004450B4
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004599A81_2_004599A8
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00481D201_2_00481D20
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00465D8C1_2_00465D8C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0042FE3C1_2_0042FE3C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_023D1E901_2_023D1E90
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_023D12001_2_023D1200
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_023D17301_2_023D1730
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B7B4E52_2_02B7B4E5
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B7BF802_2_02B7BF80
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B7BF312_2_02B7BF31
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B5E24D2_2_02B5E24D
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B4F07A2_2_02B4F07A
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B64EE92_2_02B64EE9
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B62E742_2_02B62E74
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B5E6652_2_02B5E665
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B59F442_2_02B59F44
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B5ACFA2_2_02B5ACFA
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B585032_2_02B58503
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B5DD592_2_02B5DD59
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ApngDecoder.dll (copy) ECB3C629A4C97D83DCE819E0D4B211055BE55EFF3444CF28A2564B3F0669FCFF
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: String function: 02B58BA0 appears 37 times
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: String function: 02B653F0 appears 139 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00405964 appears 104 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00406A2C appears 38 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00403400 appears 59 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 0045206C appears 90 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 0040785C appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00408B74 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00445914 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00403494 appears 84 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00445BE4 appears 59 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 004562E4 appears 70 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 004560D8 appears 96 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 0043401C appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: String function: 00403684 appears 212 times
        Source: OFjT8HmzFJ.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: OFjT8HmzFJ.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: OFjT8HmzFJ.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
        Source: OFjT8HmzFJ.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: OFjT8HmzFJ.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: OFjT8HmzFJ.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: syncplayer32_64.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
        Source: is-VL7LS.tmp.1.drStatic PE information: Resource name: DRIVERS type: PE32 executable (DLL) (native) Intel 80386, for MS Windows
        Source: is-VL7LS.tmp.1.drStatic PE information: Resource name: DRIVERS type: PE32+ executable (DLL) (native) x86-64, for MS Windows
        Source: is-VL7LS.tmp.1.drStatic PE information: Resource name: DRIVERS type: PE32 executable (native) Intel 80386, for MS Windows
        Source: is-VL7LS.tmp.1.drStatic PE information: Resource name: DRIVERS type: PE32+ executable (native) x86-64, for MS Windows
        Source: is-EDQQG.tmp.1.drStatic PE information: Resource name: USEDATA type: PE32 executable (console) Intel 80386, for MS Windows
        Source: is-EDQQG.tmp.1.drStatic PE information: Resource name: USEDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-DLH94.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-DLH94.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
        Source: is-DLH94.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-DLH94.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-DLH94.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-O9SMK.tmp.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: EC SyncPlayer 11.4.45.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
        Source: is-B8KUP.tmp.1.drStatic PE information: Number of sections : 12 > 10
        Source: is-E4LUD.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-EHN7D.tmp.1.drStatic PE information: Number of sections : 12 > 10
        Source: is-S18VE.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-1RRKJ.tmp.1.drStatic PE information: Number of sections : 19 > 10
        Source: is-A1FNP.tmp.1.drStatic PE information: Number of sections : 16 > 10
        Source: is-76H43.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: OFjT8HmzFJ.exe, 00000000.00000003.1652030703.0000000002128000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs OFjT8HmzFJ.exe
        Source: OFjT8HmzFJ.exe, 00000000.00000003.1651894875.0000000002350000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs OFjT8HmzFJ.exe
        Source: OFjT8HmzFJ.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/101@2/3
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B508C0 FormatMessageA,GetLastError,FormatMessageA,GetLastError,2_2_02B508C0
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_0040936C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0040936C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004540F0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004540F0
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00454918 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00454918
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: CreateServiceA,2_2_004021BA
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0046A5E0 CoCreateInstance,1_2_0046A5E0
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00409AD0 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409AD0
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_00402774 StartServiceCtrlDispatcherA,2_2_00402774
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_00402774 StartServiceCtrlDispatcherA,2_2_00402774
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8Jump to behavior
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeFile created: C:\Users\user\AppData\Local\Temp\is-DB66J.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: OFjT8HmzFJ.exeVirustotal: Detection: 29%
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeFile read: C:\Users\user\Desktop\OFjT8HmzFJ.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\OFjT8HmzFJ.exe "C:\Users\user\Desktop\OFjT8HmzFJ.exe"
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeProcess created: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp "C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp" /SL5="$2041C,6149981,54272,C:\Users\user\Desktop\OFjT8HmzFJ.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe "C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe" -i
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeProcess created: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp "C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp" /SL5="$2041C,6149981,54272,C:\Users\user\Desktop\OFjT8HmzFJ.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe "C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: OFjT8HmzFJ.exeStatic file information: File size 6401622 > 1048576
        Source: Binary string: MicrosoftWindowsCommon-Controls-6.0.2600.5512-comctl32.pdbr source: is-8817T.tmp.1.dr
        Source: Binary string: d:\gili\gili-cddvds-bitlocker\project\bin\sys\i386\SecCdEnc.pdbp source: is-VL7LS.tmp.1.dr
        Source: Binary string: d:\GS-WORK\Video Tools\Video Recorder\OUTPUT\TextDlg.pdb source: is-CMGGO.tmp.1.dr
        Source: Binary string: d:\GS-WORK\Video Tools\Video Recorder\OUTPUT\TextDlg.pdb$a source: is-CMGGO.tmp.1.dr
        Source: Binary string: msvcr90.i386.pdb source: is-LN7FL.tmp.1.dr
        Source: Binary string: )\release_bin\NvenCoderKernel.pdb source: is-ATOOC.tmp.1.dr
        Source: Binary string: E:\Work\GiliSoft\SerialKernal\output\MagicSkin.pdb source: is-AVN0V.tmp.1.dr
        Source: Binary string: )\release_bin\cudaEncoderKernel.pdb source: is-1R8O6.tmp.1.dr
        Source: Binary string: MFCM90.i386.pdb source: is-R8N4P.tmp.1.dr
        Source: Binary string: d:\gili\gili-cddvds-bitlocker\project\bin\sys\i386\SecCdDbg.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: MFCM90.i386.pdb0 source: is-R8N4P.tmp.1.dr
        Source: Binary string: d:\GS-WORK\OEM\ScreenRecoder\bin\utlis.pdb source: is-O9SMK.tmp.1.dr
        Source: Binary string: d:\gilisoft\gili-cddvd-bitlocker\project\bin\sys\amd64\SecCdDbg.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: mfc90u.i386.pdb source: is-M4GIC.tmp.1.dr
        Source: Binary string: mfc90.i386.pdb source: is-C25HO.tmp.1.dr
        Source: Binary string: \ServiceCtrl\ServiceCtrl\res\Service_32.pdb source: is-EDQQG.tmp.1.dr
        Source: Binary string: d:\gilisoft\gili-cddvd-bitlocker\project\bin\sys\amd64\SecCdEnc.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: msvcp90.i386.pdb source: is-GN1VG.tmp.1.dr
        Source: Binary string: mfc90.i386.pdbpmxt source: is-C25HO.tmp.1.dr
        Source: Binary string: \OutPut\ServiceCtrl.pdb source: is-EDQQG.tmp.1.dr
        Source: Binary string: MicrosoftWindowsCommon-Controls-6.0.2600.5512-comctl32.pdb source: is-8817T.tmp.1.dr
        Source: Binary string: msvcm90.i386.pdb source: is-HL5P4.tmp.1.dr
        Source: Binary string: D:\GS-WORK\MultiMediaKernel2.3\output\IntelHW.pdb source: is-4FGVI.tmp.1.dr
        Source: Binary string: MFCM90U.i386.pdb source: is-5FDD3.tmp.1.dr
        Source: Binary string: MFCM90U.i386.pdb0 source: is-5FDD3.tmp.1.dr
        Source: Binary string: d:\GS-WORK\MultiMediaKernel\output\ApngDecoder.pdb source: is-FCOF0.tmp.1.dr
        Source: Binary string: \ServiceCtrl\ServiceCtrl\res\Service_64.pdb source: is-EDQQG.tmp.1.dr
        Source: Binary string: d:\gili\gili-cddvds-bitlocker\project\bin\sys\i386\SecCdEnc.pdb source: is-VL7LS.tmp.1.dr
        Source: Binary string: D:\GS-WORK\MultiMediaKernel2.3\output\IntelHW.pdb00 source: is-4FGVI.tmp.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeUnpacked PE file: 2.2.syncplayer32_64.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeUnpacked PE file: 2.2.syncplayer32_64.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0044806C LoadLibraryExA,LoadLibraryA,GetProcAddress,1_2_0044806C
        Source: is-8AHH0.tmp.1.drStatic PE information: section name: ve_share
        Source: is-S18VE.tmp.1.drStatic PE information: section name: /4
        Source: is-76H43.tmp.1.drStatic PE information: section name: /4
        Source: is-E4LUD.tmp.1.drStatic PE information: section name: /4
        Source: is-F9AEL.tmp.1.drStatic PE information: section name: /4
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /4
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /19
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /35
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /47
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /61
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /73
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /86
        Source: is-A1FNP.tmp.1.drStatic PE information: section name: /97
        Source: is-B8KUP.tmp.1.drStatic PE information: section name: .rodata
        Source: is-B8KUP.tmp.1.drStatic PE information: section name: /4
        Source: is-EHN7D.tmp.1.drStatic PE information: section name: .rodata
        Source: is-EHN7D.tmp.1.drStatic PE information: section name: /4
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: .rotext
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: .rodata
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /4
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /14
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /29
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /41
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /55
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /67
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /80
        Source: is-1RRKJ.tmp.1.drStatic PE information: section name: /91
        Source: is-6CN68.tmp.1.drStatic PE information: section name: ve_share
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00406518 push 00406555h; ret 0_2_0040654D
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00408028 push ecx; mov dword ptr [esp], eax0_2_0040802D
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00408E5C push 00408E8Fh; ret 0_2_00408E87
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004098B4 push 004098F1h; ret 1_2_004098E9
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00456380 push 004563B8h; ret 1_2_004563B0
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004805C8 push ecx; mov dword ptr [esp], ecx1_2_004805CD
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00410640 push ecx; mov dword ptr [esp], edx1_2_00410645
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0040A6C8 push esp; retf 1_2_0040A6D1
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045C6CC push ecx; mov dword ptr [esp], eax1_2_0045C6D1
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00412898 push 004128FBh; ret 1_2_004128F3
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004309AC push ecx; mov dword ptr [esp], eax1_2_004309B1
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0047EF74 push 0047F052h; ret 1_2_0047F04A
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00442F80 push ecx; mov dword ptr [esp], ecx1_2_00442F84
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0040CF98 push ecx; mov dword ptr [esp], edx1_2_0040CF9A
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00451024 push 00451057h; ret 1_2_0045104F
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0040F4F8 push ecx; mov dword ptr [esp], edx1_2_0040F4FA
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00473828 push ecx; mov dword ptr [esp], edx1_2_00473829
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00457BEC push 00457C30h; ret 1_2_00457C28
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00419B98 push ecx; mov dword ptr [esp], ecx1_2_00419B9D
        Source: is-LN7FL.tmp.1.drStatic PE information: section name: .text entropy: 6.92063892456726

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02B4F8A3
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfcm90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\RecWin7.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-A1FNP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-76H43.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\avutil-52.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-R8N4P.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\cudaEncoderKernel.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-N0A7K.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\VE64.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-ATOOC.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-LN7FL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\xvidcore.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\swscale-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-VL7LS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-E4LUD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-C25HO.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-DLH94.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.Windows.Common-Controls\is-8817T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\postproc-51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ScreenHook.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\avdevice-55.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\IntelHW.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-CBP2N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\CamCapture.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-EDQQG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-6CN68.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\utlis.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\postproc-52.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\swresample-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-B8KUP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-P4C7K.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeFile created: C:\ProgramData\EC SyncPlayer 11.4.45\EC SyncPlayer 11.4.45.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-GN1VG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\TextDlg.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-8AHH0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-AVN0V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ApngDecoder.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-CMGGO.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\InstallHelp.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-1RRKJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\NvenCoderKernel.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Verify.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfcm90u.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-4FGVI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\pthreadGC2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-GC27D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-1R8O6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-UOUU3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\WaveRec.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\VE32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.Windows.Common-Controls\comctl32.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeFile created: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\MagicSkin.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-F9AEL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\AudioResample.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ServiceCtrl.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-O9SMK.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfc90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\pthreadVC2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-6UNEV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-JJ68A.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ISTask.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-EHN7D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcr90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-5FDD3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcp90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-HL5P4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-S18VE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-FCOF0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-T16J5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-RFD24.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfc90u.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcm90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile created: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-M4GIC.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeFile created: C:\ProgramData\EC SyncPlayer 11.4.45\EC SyncPlayer 11.4.45.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02B4F8A3
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_00402774 StartServiceCtrlDispatcherA,2_2_00402774

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 2023 -> 49915
        Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 2023
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423B7C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423B7C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0042414C IsIconic,SetActiveWindow,SetFocus,1_2_0042414C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00424104 IsIconic,SetActiveWindow,1_2_00424104
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004182F4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_004182F4
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004227CC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_004227CC
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0047E930 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0047E930
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00417508 IsIconic,GetCapture,1_2_00417508
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00417C40 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417C40
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00417C3E IsIconic,SetWindowPos,1_2_00417C3E
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0041F088 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F088
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02B4F9A7
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeWindow / User API: threadDelayed 2048Jump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeWindow / User API: threadDelayed 7832Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\RecWin7.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfcm90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-76H43.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-A1FNP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\avutil-52.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-R8N4P.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\cudaEncoderKernel.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-N0A7K.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\VE64.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-ATOOC.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-LN7FL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\xvidcore.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\swscale-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-VL7LS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-E4LUD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-C25HO.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.Windows.Common-Controls\is-8817T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-DLH94.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\postproc-51.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ScreenHook.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\avdevice-55.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\IntelHW.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-CBP2N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\CamCapture.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-6CN68.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-EDQQG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\utlis.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\postproc-52.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\swresample-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-B8KUP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-P4C7K.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-E0FEP.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-GN1VG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\TextDlg.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-8AHH0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-AVN0V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ApngDecoder.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-CMGGO.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\InstallHelp.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\NvenCoderKernel.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-1RRKJ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Verify.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfcm90u.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\pthreadGC2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-4FGVI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-GC27D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-1R8O6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-UOUU3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\WaveRec.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\VE32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.Windows.Common-Controls\comctl32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\MagicSkin.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-F9AEL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\AudioResample.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ServiceCtrl.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfc90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-O9SMK.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\pthreadVC2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-6UNEV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-JJ68A.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ISTask.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-EHN7D.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcr90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-5FDD3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcp90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-S18VE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-HL5P4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-FCOF0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-T16J5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-RFD24.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfc90u.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcm90.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-M4GIC.tmpJump to dropped file
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-6442
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-18544
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe TID: 7108Thread sleep count: 2048 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe TID: 7108Thread sleep time: -4096000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe TID: 1892Thread sleep count: 59 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe TID: 1892Thread sleep time: -3540000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe TID: 7108Thread sleep count: 7832 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe TID: 7108Thread sleep time: -15664000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00471184 FindFirstFileA,FindNextFileA,FindClose,1_2_00471184
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00451788 FindFirstFileA,GetLastError,1_2_00451788
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004606EC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004606EC
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00460B68 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00460B68
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045F160 FindFirstFileA,FindNextFileA,FindClose,1_2_0045F160
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00493274 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00493274
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00409A14 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409A14
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeThread delayed: delay time: 60000Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\RoamingJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\userJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppDataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
        Source: is-E4LUD.tmp.1.drBinary or memory string: xvmcidct
        Source: syncplayer32_64.exe, 00000002.00000002.2901352412.00000000009EE000.00000004.00000020.00020000.00000000.sdmp, syncplayer32_64.exe, 00000002.00000002.2902441667.00000000033F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: is-E4LUD.tmp.1.drBinary or memory string: d->log2_chroma_h <= 3d->nb_components <= 4d->name && d->name[0](d->nb_components==4 || d->nb_components==2) == !!(d->flags & (1 << 7))!c->plane && !c->step_minus1 && !c->offset_plus1 && !c->shift && !c->depth_minus1c->step_minus1 >= c->depth_minus18*(c->step_minus1+1) >= c->depth_minus1+1bayer_tmp[0] == 0 && tmp[1] == 0beyuv420pyuyv422rgb24bgr24yuv422pyuv444pyuv410pyuv411pgraymonowmonobpal8yuvj420pyuvj422pyuvj444pxvmcmcxvmcidctuyvy422uyyvyy411bgr8bgr4bgr4_bytergb8rgb4rgb4_bytenv12nv21argbabgrgray16begray16leyuv440pyuvj440pyuva420pvdpau_h264vdpau_mpeg1vdpau_mpeg2vdpau_wmv3vdpau_vc1rgb48bergb48lergb565bergb565lergb555bergb555lebgr565bebgr565lebgr555bebgr555levaapi_mocovaapi_idctvaapi_vldyuv420p16leyuv420p16beyuv422p16leyuv422p16beyuv444p16leyuv444p16bevdpau_mpeg4dxva2_vldrgb444lergb444bebgr444lebgr444begray8abgr48bebgr48leyuv420p9beyuv420p9leyuv420p10beyuv420p10leyuv422p10beyuv422p10leyuv444p9beyuv444p9leyuv444p10beyuv444p10leyuv422p9beyuv422p9levda_vldgbrpgbrp9begbrp9legbrp10begbrp10legbrp16begbrp16leyuva420p9beyuva420p9leyuva422p9beyuva422p9leyuva444p9beyuva444p9leyuva420p10beyuva420p10leyuva422p10beyuva422p10leyuva444p10beyuva444p10leyuva420p16beyuva420p16leyuva422p16beyuva422p16leyuva444p16beyuva444p16levdpauxyz12lexyz12benv16nv20lenv20beyvyu422vdargba64bergba64lebgra64bebgra64le0rgbrgb00bgrbgr0yuva444pyuva422pyuv420p12beyuv420p12leyuv420p14beyuv420p14leyuv422p12beyuv422p12leyuv422p14beyuv422p14leyuv444p12beyuv444p12leyuv444p14beyuv444p14legbrp12begbrp12legbrp14begbrp14legbrapgbrap16begbrap16leyuvj411pbayer_bggr8bayer_rggb8bayer_gbrg8bayer_grbg8bayer_bggr16lebayer_bggr16bebayer_rggb16lebayer_rggb16bebayer_gbrg16lebayer_gbrg16bebayer_grbg16lebayer_grbg16be
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeAPI call chain: ExitProcess graph end nodegraph_0-6300
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-18362
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-18839
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B601BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02B601BE
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B601BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02B601BE
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0044806C LoadLibraryExA,LoadLibraryA,GetProcAddress,1_2_0044806C
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B4648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02B4648B
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B59528 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02B59528
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00473FB8 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00473FB8
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_0045B3F4 GetVersion,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,AllocateAndInitializeSid,GetLastError,LocalFree,1_2_0045B3F4
        Source: is-8AHH0.tmp.1.dr, is-6CN68.tmp.1.drBinary or memory string: Progman
        Source: is-6CN68.tmp.1.drBinary or memory string: HH:mm:ssdddd, MMMM dd, yyyyMM/dd/yyPMAMDecemberNovemberOctoberSeptemberAugustJulyJuneAprilMarchFebruaryJanuaryDecNovOctSepAugJulJunMayAprMarFebJanSaturdayFridayThursdayWednesdayTuesdayMondaySundaySatFriThuWedTueMonSunSunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDecIsWow64Processkernel32runasRunNonElevated S_FALSE == IsElevated()RunNonElevated IsWow64VistaElevatorMsgProgmanRunNonElevated Error hwndShellRunNonElevated Error GetModuleHandleExRunNonElevated Error SetWindowsHookExRunNonElevated Error StringCchCopyRunNonElevated Error StringCchCopy 2RunNonElevated Error StringCchCopy 3RunNonElevated overH
        Source: is-8AHH0.tmp.1.drBinary or memory string: HH:mm:ssdddd, MMMM dd, yyyyMM/dd/yyPMAMDecemberNovemberOctoberSeptemberAugustJulyJuneAprilMarchFebruaryJanuaryDecNovOctSepAugJulJunMayAprMarFebJanSaturdayFridayThursdayWednesdayTuesdayMondaySundaySatFriThuWedTueMonSunSunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDecrunasVistaElevatorMsgProgman!
        Source: C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exeCode function: 2_2_02B5806E cpuid 2_2_02B5806E
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: GetLocaleInfoA,0_2_0040515C
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: GetLocaleInfoA,0_2_004051A8
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: GetLocaleInfoA,1_2_004084D0
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: GetLocaleInfoA,1_2_0040851C
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_00456EE4 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00456EE4
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmpCode function: 1_2_004540A8 GetUserNameA,1_2_004540A8
        Source: C:\Users\user\Desktop\OFjT8HmzFJ.exeCode function: 0_2_00405C44 GetVersionExA,0_2_00405C44

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2901818594.0000000002A93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: syncplayer32_64.exe PID: 7112, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2901818594.0000000002A93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: syncplayer32_64.exe PID: 7112, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        4
        Windows Service
        1
        DLL Side-Loading
        3
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        1
        Access Token Manipulation
        22
        Software Packing
        Security Account Manager3
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive11
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook4
        Windows Service
        1
        DLL Side-Loading
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script3
        Process Injection
        1
        Masquerading
        LSA Secrets41
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job3
        Process Injection
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Bootkit
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        OFjT8HmzFJ.exe30%VirustotalBrowse
        OFjT8HmzFJ.exe100%AviraHEUR/AGEN.1332570
        SourceDetectionScannerLabelLink
        C:\ProgramData\EC SyncPlayer 11.4.45\EC SyncPlayer 11.4.45.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ApngDecoder.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\AudioResample.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\CamCapture.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ISTask.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\InstallHelp.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\IntelHW.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\MagicSkin.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-GN1VG.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-HL5P4.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\is-LN7FL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcm90.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcp90.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.CRT\msvcr90.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-5FDD3.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-C25HO.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-M4GIC.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\is-R8N4P.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfc90.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfc90u.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfcm90.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.VC90.MFC\mfcm90u.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.Windows.Common-Controls\comctl32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Microsoft.Windows.Common-Controls\is-8817T.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\NvenCoderKernel.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\RecWin7.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ScreenHook.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ServiceCtrl.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\TextDlg.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\VE32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\VE64.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\Verify.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\WaveRec.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\avdevice-55.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\avutil-52.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\cudaEncoderKernel.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-1R8O6.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-1RRKJ.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-4FGVI.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-6CN68.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-6UNEV.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-76H43.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-8AHH0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-A1FNP.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-ATOOC.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-AVN0V.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-B8KUP.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-CBP2N.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-CMGGO.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-DLH94.tmp3%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-E4LUD.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-EDQQG.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-EHN7D.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-F9AEL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-FCOF0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-GC27D.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-JJ68A.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-N0A7K.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-O9SMK.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-P4C7K.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-RFD24.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-S18VE.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\SyncPlayer 1.2.8\is-T16J5.tmp0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.tweak-uac.comb0%Avira URL Cloudsafe
        http://sources.redhat.com/pthreads-win32/d&0%Avira URL Cloudsafe
        http://bbdxzzh.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a0%Avira URL Cloudsafe
        http://sources.redhat.com/pthreads-win32/b%0%Avira URL Cloudsafe
        http://bbdxzzh.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386789f918c2e6900%Avira URL Cloudsafe
        http://endpoints5-scl.5060sip.com/cfg/poly-0004f2bd743f.cfg0%Avira URL Cloudsafe
        bbdxzzh.com0%Avira URL Cloudsafe
        http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d80%Avira URL Cloudsafe
        http://sources.redhat.com/pthreads-win32/b%0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        endpoints5-scl.5060sip.com
        199.101.131.210
        truefalse
          unknown
          bbdxzzh.com
          185.208.158.202
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            http://bbdxzzh.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386789f918c2e690true
            • Avira URL Cloud: safe
            unknown
            http://bbdxzzh.com/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46atrue
            • Avira URL Cloud: safe
            unknown
            bbdxzzh.comtrue
            • Avira URL Cloud: safe
            unknown
            http://endpoints5-scl.5060sip.com/cfg/poly-0004f2bd743f.cfgfalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.innosetup.com/OFjT8HmzFJ.tmp, OFjT8HmzFJ.tmp, 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-DLH94.tmp.1.dr, OFjT8HmzFJ.tmp.0.drfalse
              high
              http://www.tweak-uac.combis-8AHH0.tmp.1.dr, is-6CN68.tmp.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.remobjects.com/psUOFjT8HmzFJ.exe, 00000000.00000003.1652030703.0000000002128000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.exe, 00000000.00000003.1651894875.0000000002350000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.tmp, 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-DLH94.tmp.1.dr, OFjT8HmzFJ.tmp.0.drfalse
                high
                ftp://http://HTTP/1.0is-C25HO.tmp.1.dr, is-M4GIC.tmp.1.drfalse
                  high
                  http://sources.redhat.com/pthreads-win32/d&is-A1FNP.tmp.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://sources.redhat.com/pthreads-win32/b%is-GC27D.tmp.1.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://gilisoft.com/webtools/livecheck/IsValidKey3.php?key=is-6UNEV.tmp.1.drfalse
                    high
                    http://gilisoft.com/webtools/livecheck/ctrlKey2.php?key=%s&ctrl=deleteis-6UNEV.tmp.1.drfalse
                      high
                      http://www.remobjects.com/psOFjT8HmzFJ.exe, 00000000.00000003.1652030703.0000000002128000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.exe, 00000000.00000003.1651894875.0000000002350000.00000004.00001000.00020000.00000000.sdmp, OFjT8HmzFJ.tmp, OFjT8HmzFJ.tmp, 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-DLH94.tmp.1.dr, OFjT8HmzFJ.tmp.0.drfalse
                        high
                        http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dsyncplayer32_64.exe, 00000002.00000002.2901352412.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://gilisoft.com/webtools/livecheck/IsValidKey.php?key=is-6UNEV.tmp.1.drfalse
                            high
                            http://gilisoft.com/webtools/livecheck/UploadKeyInfo.php?key=%s&mail=%s&os=%s&lan=%s&mac=%s&vnum=%sis-6UNEV.tmp.1.drfalse
                              high
                              http://185.208.158.202/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d8syncplayer32_64.exe, 00000002.00000002.2901352412.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              185.208.158.202
                              bbdxzzh.comSwitzerland
                              34888SIMPLECARRER2ITtrue
                              89.105.201.183
                              unknownNetherlands
                              24875NOVOSERVE-ASNLfalse
                              199.101.131.210
                              endpoints5-scl.5060sip.comUnited States
                              22450XN-NC-ASN01USfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1548912
                              Start date and time:2024-11-05 02:13:05 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 21s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:7
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:OFjT8HmzFJ.exe
                              renamed because original name is a hash value
                              Original Sample Name:c776a9efdaba18f15a5f554ae52c0385.exe
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@5/101@2/3
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 93%
                              • Number of executed functions: 197
                              • Number of non-executed functions: 244
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              20:14:29API Interceptor476860x Sleep call for process: syncplayer32_64.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              185.208.158.202BJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Socks5Systemz, Stealc, VidarBrowse
                                  G4G14X6zxY.exeGet hashmaliciousSocks5SystemzBrowse
                                    K5G8ehb2X4.exeGet hashmaliciousSocks5SystemzBrowse
                                      VgTEzAer6E.exeGet hashmaliciousSocks5SystemzBrowse
                                        iv2Mm5SEJF.exeGet hashmaliciousSocks5SystemzBrowse
                                          R3Tb6f1QFD.exeGet hashmaliciousSocks5SystemzBrowse
                                            FrYYvqvO2s.exeGet hashmaliciousSocks5SystemzBrowse
                                              urHdxJtF4p.exeGet hashmaliciousSocks5SystemzBrowse
                                                gi5qOqqypd.exeGet hashmaliciousSocks5SystemzBrowse
                                                  89.105.201.183N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 200
                                                  cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 200
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  SIMPLECARRER2ITBJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.208.158.202
                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Socks5Systemz, Stealc, VidarBrowse
                                                  • 185.208.158.202
                                                  kC3x9xfqbq.exeGet hashmaliciousAmadeyBrowse
                                                  • 185.208.159.121
                                                  G4G14X6zxY.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.208.158.202
                                                  kC3x9xfqbq.exeGet hashmaliciousAmadeyBrowse
                                                  • 185.208.159.121
                                                  K5G8ehb2X4.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 185.208.158.202
                                                  EL2pA2iHak.dllGet hashmaliciousAmadeyBrowse
                                                  • 185.208.159.121
                                                  EL2pA2iHak.dllGet hashmaliciousAmadeyBrowse
                                                  • 185.208.159.121
                                                  mX4cezhMEH.dllGet hashmaliciousAmadeyBrowse
                                                  • 185.208.159.121
                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                  • 185.208.159.121
                                                  NOVOSERVE-ASNLBJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Socks5Systemz, Stealc, VidarBrowse
                                                  • 89.105.201.183
                                                  G4G14X6zxY.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  K5G8ehb2X4.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  VgTEzAer6E.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  iv2Mm5SEJF.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  R3Tb6f1QFD.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  FrYYvqvO2s.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  urHdxJtF4p.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  gi5qOqqypd.exeGet hashmaliciousSocks5SystemzBrowse
                                                  • 89.105.201.183
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  C:\Users\user\AppData\Local\SyncPlayer 1.2.8\ApngDecoder.dll (copy)BJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                                    8hN4C25a0O.exeGet hashmaliciousNetSupport RATBrowse
                                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                                        file.exeGet hashmaliciousSocks5SystemzBrowse
                                                          file.exeGet hashmaliciousSocks5SystemzBrowse
                                                            tuc5.exeGet hashmaliciousSocks5SystemzBrowse
                                                              tuc5.exeGet hashmaliciousSocks5SystemzBrowse
                                                                Process:C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2565120
                                                                Entropy (8bit):6.743990559862836
                                                                Encrypted:false
                                                                SSDEEP:49152:tBCeezHk9xf76j9r750ZVA09v0ybQMBEsvjlmB7fRn6:aEzcyZVZ9v0yUKvjlmT
                                                                MD5:5FBD9E9B8796E7B4A40FD070F0F43F8E
                                                                SHA1:A8F7C0ED0A95D0DE6760C6F98805B31CED75AE79
                                                                SHA-256:028A437887E0A5A12493C3EC0A5D23C6ED182CD0E88E40F0E8180904ED6A41C1
                                                                SHA-512:02A40D5DC8044B8875F8846204D4F0C76C1BEE7E81422E0CB209BDA05C46F88E61B802520F445FABFF5DD17B9DFBD0DE82B9EE8312F5863AF3C902BF9F7C1754
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....,.L..........'......."..........."......."...@...........................'......j'.....................................t.".......#..............................................................................."..............................text.....".......".................`....rdata..|<...."..>....".............@..@.data....... #..0....#.............@....rsrc.........#......8#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):2.0
                                                                Encrypted:false
                                                                SSDEEP:3:Btn:Ln
                                                                MD5:180C38148AF7996E8873FF649916E3A8
                                                                SHA1:75DA25EE676BFA612F60158A8DA7B0CC89928199
                                                                SHA-256:AC1176C4484722274A674C020DC462BD1D205211912503B967EE697FC14840FB
                                                                SHA-512:DFE52AFB479812EBDC367D1A31BDDE3B34A10836B9013280A7DD52ADAC57E7A92410AACA7BEE9399086E4D6C436E35D882D41415059AFE6869DA0C6B64F1DBF3
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:.q)g....
                                                                Process:C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):4
                                                                Entropy (8bit):0.8112781244591328
                                                                Encrypted:false
                                                                SSDEEP:3:B:B
                                                                MD5:B1DD6CE1962B44284E65236B55569647
                                                                SHA1:431843DD3CC038DAD438BD24384025DBC2A56BB7
                                                                SHA-256:BA8C9EAC092A503E4FB70771C34A00C5BB651043DE24DB4D3525EBBB3EE7FF08
                                                                SHA-512:3094130EEC92FF403E7529287BA26EF0AFF8A9BB77572B0CCBD143CCFB2B4FC2175AD8D6137559475C78418C33C253A87F5462E9C6430D463540250CABE110E2
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:F...
                                                                Process:C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):128
                                                                Entropy (8bit):2.9545817380615236
                                                                Encrypted:false
                                                                SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                Process:C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):128
                                                                Entropy (8bit):1.7095628900165245
                                                                Encrypted:false
                                                                SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):371200
                                                                Entropy (8bit):6.426535807098075
                                                                Encrypted:false
                                                                SSDEEP:6144:3xLKtTtx9C3XSnuNFOFyso3R/cUnpCYQJmY62FTBqRAON7w:f3CuNn7BJCYQ9TsRQ
                                                                MD5:77DB62270B198C2ACBC463E3F1F0B982
                                                                SHA1:EE293FEFD9C439B01F4B0584A4816D2EC86221BD
                                                                SHA-256:ECB3C629A4C97D83DCE819E0D4B211055BE55EFF3444CF28A2564B3F0669FCFF
                                                                SHA-512:64E153891D1C636B25804404680B13E8A1F3A33CB4C41A92AF6363DECA7C1D4E779933556A1EB97D55B15A6BA500F102C09E4480CC5B7C91BB284E735AFE8132
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: BJqvg1iEdr.exe, Detection: malicious, Browse
                                                                • Filename: 8hN4C25a0O.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: tuc5.exe, Detection: malicious, Browse
                                                                • Filename: tuc5.exe, Detection: malicious, Browse
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1P..u1..u1..u1..R...r1..R...`1..u1...0..|In.S1..|Ix..1..|I...1..kc..v1..|Iq.v1..|Ii.t1..kco.t1..|Ij.t1..Richu1..........PE..L....).Y...........!................................................................SE....@.........................0...F............`..........................<)..`..................................@...................l...@....................text............................... ..`.rdata..v...........................@..@.data...<].......$..................@....rsrc........`...0..................@..@.reloc...u.......v...4..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):68608
                                                                Entropy (8bit):6.447992421693984
                                                                Encrypted:false
                                                                SSDEEP:768:M+qgK9p/K0fUyeAEBqCRUpJosqKXeHd5Fkv6pxh4WgfskSnChTe1QsHj5dBcjkTX:M+/KX/ZeTb0uHd5FigxhcfskSj75I92
                                                                MD5:D5F9F42D8F864A9021C6BEA8E12074AD
                                                                SHA1:7D326672F2C15A78EFF890534D7BF28DFADDBD45
                                                                SHA-256:8B5D9098E881F00E18C94FF2AB30945429207F7D849B49DD5462E23401A57ABB
                                                                SHA-512:03087777BB0FA7B7AE811360F747A3B8A5DF3D201A553C6260F0E9D6A6C7F34321C8F99B046C34CA660B24CC89BD0AD162D356BEAD67C0CEF62504F3E1F8FA87
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........\.o.\.o.\.o.U...O.o.U...1.o..k.V.o.{,.._.o.\.n.9.o.U...~.o.U...].o.U...].o.Rich\.o.................PE..L...jT.\...........!.........H...............................................P......]w..............................`...L............0.......................@..........................................@...............p............................text............................... ..`.rdata...".......$..................@..@.data....-..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):851
                                                                Entropy (8bit):5.0869947237388375
                                                                Encrypted:false
                                                                SSDEEP:24:qPnRuV4MPgicifznCCgIdIcfzWCCgIdITl:MRuqS5CCgIdIMFCgIdITl
                                                                MD5:EE45F127C55EF85DDFCA0F7A0087240B
                                                                SHA1:9647DD4A6EB34AD4324C582F5108EDB80228C42F
                                                                SHA-256:EA9A5CF003E5CC55AB8F2AA81C38646648F4ACB71FA408ACE428CE0144CEFAF4
                                                                SHA-512:543361602177A99B32B23B7EB0E1CDA79AB4D77C9F2E64EA7A1F80216F488E7461E8663FDA28381BC4D337C1983EEF8005951DFBD05A006AFDFF11D7F7F55D62
                                                                Malicious:false
                                                                Preview:<?xml version='1.0' encoding='UTF-8' standalone='yes'?>..<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">.. <security>.. <requestedPrivileges>.. <requestedExecutionLevel level='asInvoker' uiAccess='false' />.. </requestedPrivileges>.. </security>.. </trustInfo>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type='win32' name='Microsoft.VC90.CRT' version='9.0.21022.8' processorArchitecture='x86' publicKeyToken='1fc8b3b9a1e18e3b' />.. </dependentAssembly>.. </dependency>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type='win32' name='Microsoft.VC90.MFC' version='9.0.21022.8' processorArchitecture='x86' publicKeyToken='1fc8b3b9a1e18e3b' />.. </dependentAssembly>.. </dependency>..</assembly>..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):28672
                                                                Entropy (8bit):3.6440630653513795
                                                                Encrypted:false
                                                                SSDEEP:192:h7kY3pPkw9Bpj8srMkzQuR7awElf+cn4G5ey4SyJRQ0jwO44lwib6w0gEGD+NS:DMwSEzdaw0tnfqyowJ4lwi2UEG
                                                                MD5:62400F82750F17936091B90863A59566
                                                                SHA1:D304408B4FDBDB99B6D03DB848EC2B9210EB90C8
                                                                SHA-256:E06668D58414F436C498A2278CB067AD4BAA22735C223509DBF851ECBD6FE645
                                                                SHA-512:ADC57BB638397F5A565B5CED5A0E6F47C855EB50C2498FB527C7D15B74AF34A14A0D4E4E8B709151A988A350311C5B488D0022540979B423B494D58714826B58
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........G..&..&..&.U...&..9..&..&..&..9..&..9..&..:..&..9..&..9..&.....&..&..&.....&.H ..&.p...&.Rich.&.................PE..L....%rS...........!..... ...P.......,.......0......................................................................p:......(7.......`.. ....................p.......................................................0..\............................text............ .................. ..`.rdata.......0.......0..............@..@.data...L....@.......@..............@....rsrc... ....`.......P..............@..@.reloc.......p.......`..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                                                                Category:dropped
                                                                Size (bytes):69166
                                                                Entropy (8bit):7.329060163500274
                                                                Encrypted:false
                                                                SSDEEP:1536:dFOWzH8eklX5ALvJwBuHEXNAewSUnX4wEpNkub9mjuZ8yPKOCj9p5Zn3Ii:fm7A7GFdzkX41p+ucI7Kpn3f
                                                                MD5:F61EC1668464115772F8FA2FD562A70D
                                                                SHA1:5A8A4BE4C84B77EBEF3B2AA65A8814D04E2ADA2B
                                                                SHA-256:3A56C607D4BB495A6477D94A9E6ECD7A37BA50E0D1DDF287768633F8B274DD71
                                                                SHA-512:EE560A3CF171C2CF01395FA7D8FE0F4CB1AC2AC10C26CE47EAD7B01D54E6C04DE2FA749C7A41433AB67EDE74000450D28D32C17316E81831946119CFB92F9C91
                                                                Malicious:false
                                                                Preview:RIFF&...WAVEfmt ........D.............data..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:ISO-8859 text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):691
                                                                Entropy (8bit):4.123292651950357
                                                                Encrypted:false
                                                                SSDEEP:12:hnHT/W+qV9LRa5IGnH17fOV98EaOcXnHXUp7fOV9kjRaxnHifOV9BHavnHM4iVUq:hnz+f9oVnVzK984cXnuzK9kjcnIK9Qnu
                                                                MD5:CD7B70EF111EDC855756233899FC201E
                                                                SHA1:DC3DA2E402E4F503F40A7266D737B96A73F771C7
                                                                SHA-256:480A7DC890285A51BA785432AA00747CA7B5F207E48A2AED8DE4D53FB99EF26E
                                                                SHA-512:5B0C04A71B3F18685CA3518754B44147004AE73F829AB2012B5CF0CAB5318AE6B5EB9FB4D43D6BCE2248912C026D55C6A8B17D89A2A5FEC8F374A07C04893363
                                                                Malicious:false
                                                                Preview://......[HD]..VideoBitrate = 6000..Fps = 30..Sample = 44100..AudioBitrate = 128 ..Channel = 2....//......[High]..VideoBitrate = 3000..Fps = 24..Sample = 44100..AudioBitrate = 96 ..Channel = 2....//......[Medium]..VideoBitrate = 2000..Fps = 24..Sample = 44100..AudioBitrate = 64 ..Channel = 2....//.....[Standard]..VideoBitrate = 1500..Fps = 24..Sample = 44100..AudioBitrate = 32 ..Channel = 2....//.....[Lower]..VideoBitrate = 1000..Fps = 15..Sample = 22050..AudioBitrate = 16..Channel = 1
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):67584
                                                                Entropy (8bit):6.357541095717686
                                                                Encrypted:false
                                                                SSDEEP:1536:KVqiEnH9RGX9xXLUWB1GOlb3MvH4xK+RRlm9A:isGX3Vwwbc6Rlm9A
                                                                MD5:86A1311D51C00B278CB7F27796EA442E
                                                                SHA1:AC08AC9D08F8F5380E2A9A65F4117862AA861A19
                                                                SHA-256:E916BDF232744E00CBD8D608168A019C9F41A68A7E8390AA48CFB525276C483D
                                                                SHA-512:129E4B8DD2665BCFC5E72B4585343C51127B5D027DBB0234291E7A197BAECA1BAB5ED074E65E5E8C969EE01F9F65CC52C9993037416DE9BFFF2F872E5AEBA7EC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................<......0.............@..........................`.......................................................@....................... ..h...................................................................................CODE....\........................... ..`DATA....h...........................@...BSS......................................idata..............................@....edata..............................@..P.reloc..h.... ......................@..P.rsrc........@......................@..P.............`......................@..P................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):192512
                                                                Entropy (8bit):6.24460502377909
                                                                Encrypted:false
                                                                SSDEEP:3072:qHKVfLsXRDEBmJ3pmjc2wjo8PaqJSreQ6i9:1VgXyBmJ3gjc20o8yqsr96i
                                                                MD5:9CD220AF0338B8BBD8FB63205C259018
                                                                SHA1:D687A1E58781D7B5F5983D48457720AFEDC8D8DD
                                                                SHA-256:9B71083991EA70D126EB773658EEFD489E950350BFA26B9EE1E899FE4CAA5DBA
                                                                SHA-512:C1218CE655B16F2B7FFD311D7C7C14C61FA1C0E2F8C0A4AD0A4F64843EEA711BF26495B4EFCA4E25803010106FB2703E04273F26B6F6E055DE91AE07FED03776
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............................~...............................:........Rich..........................PE..L....z.J...........!......................... ......................................................................P&.......#..P....P..X............................................................................ ..P............................text...V........................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc...X....P.......@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):67584
                                                                Entropy (8bit):6.205685784114478
                                                                Encrypted:false
                                                                SSDEEP:1536:oacSu67RJwNzZzGqdqAAfnjWG5d+nY3kubrNfF8:o8XMzZSqILfnjWG2Y3ku/NfF8
                                                                MD5:3442F2ED6AF66C75AD4F42FD8DE2917D
                                                                SHA1:AAB69C6A498BC0A629B49BCDF06A66FC658EAE24
                                                                SHA-256:C2F9C9913395D50DA23CB5AE9BC40AE98B1B74862FB584819654D27F5A0199BE
                                                                SHA-512:DC0D7FD02FF51D696CEE4A2385B97B7D9D860707AD6B7D0DBF41BF161FA1DF7AEF39C000AE6589A2E53142CE4D6530245F227D7305824BBC4BED8D16D27B7A05
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......(...lO..lO..lO..e7..fO..>'..nO..>'..xO..>'..eO..>'..nO...P..hO...)..mO...)..iO..lO...O......fO...&..dO...&..mO...&d.mO...&..mO..RichlO..................PE..L...Bx.\...........!.........h......~........................................@............@.........................p...t............ .......................0..........p...........................p...@............................................text............................... ..`.rdata...Q.......R..................@..@.data...H...........................@....rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36931
                                                                Entropy (8bit):4.264495375774686
                                                                Encrypted:false
                                                                SSDEEP:768:J2VMCksOwdrmlbeAGk41qCDubRsHYjx3tUvPcha/I:iFv+tzts4jNtUvPchyI
                                                                MD5:FF243859F3548636AA2963B919FA6E72
                                                                SHA1:781F3BF5B0F4D8C6D1F6DA1B27A373D6DF9A474F
                                                                SHA-256:B8B07BDC4AD631076BF865A7B076CF09B9B0B0CDFDF37D423BF9D6F5FF6DAB3D
                                                                SHA-512:93C9FF2AEE4070D7111A235C020022F68754313BBEC8117AF77EE11CBF56E0897172E0C258E272D3CEA15E3BFE162BBB3D55257B1612CE74BA47BCC04EEB9C6B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.u.7...7...7...7...4...U...3.......6......3...7...j......1.......6......1...Rich7...................PE..L.....'U...........!.....@...P.......G.......P......................................................................pY..#....U..x.......X.......................t....Q...............................................P...............................text...";.......@.................. ..`.rdata.......P.......P..............@..@.data...,....`.......`..............@....rsrc...X............p..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):524
                                                                Entropy (8bit):5.024125169592838
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdtXBFN8u3/3XO5WSN4dKF+MHlVI4gVW/wnbE0xSxHyG:2dtXD+u/eVN40+sVI4gAwngJ
                                                                MD5:6BB5D2AAD0AE1B4A82E7DDF7CF58802A
                                                                SHA1:70F7482F5F5C89CE09E26D745C532A9415CD5313
                                                                SHA-256:9E0220511D4EBDB014CC17ECB8319D57E3B0FEA09681A80D8084AA8647196582
                                                                SHA-512:3EA373DACFD3816405F6268AC05886A7DC8709752C6D955EF881B482176F0671BCDC900906FC1EBDC22E9D349F6D5A8423D19E9E7C0E6F9F16B334C68137DF2B
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>.. Copyright (c) Microsoft Corporation. All rights reserved. -->..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <noInheritable/>.. <assemblyIdentity.. type="win32".. name="Microsoft.VC90.CRT".. version="9.0.21022.8".. processorArchitecture="x86".. publicKeyToken="1fc8b3b9a1e18e3b".. />.. <file name="msvcr90.dll" /> <file name="msvcp90.dll" /> <file name="msvcm90.dll" />..</assembly>..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):524
                                                                Entropy (8bit):5.024125169592838
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdtXBFN8u3/3XO5WSN4dKF+MHlVI4gVW/wnbE0xSxHyG:2dtXD+u/eVN40+sVI4gAwngJ
                                                                MD5:6BB5D2AAD0AE1B4A82E7DDF7CF58802A
                                                                SHA1:70F7482F5F5C89CE09E26D745C532A9415CD5313
                                                                SHA-256:9E0220511D4EBDB014CC17ECB8319D57E3B0FEA09681A80D8084AA8647196582
                                                                SHA-512:3EA373DACFD3816405F6268AC05886A7DC8709752C6D955EF881B482176F0671BCDC900906FC1EBDC22E9D349F6D5A8423D19E9E7C0E6F9F16B334C68137DF2B
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>.. Copyright (c) Microsoft Corporation. All rights reserved. -->..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <noInheritable/>.. <assemblyIdentity.. type="win32".. name="Microsoft.VC90.CRT".. version="9.0.21022.8".. processorArchitecture="x86".. publicKeyToken="1fc8b3b9a1e18e3b".. />.. <file name="msvcr90.dll" /> <file name="msvcp90.dll" /> <file name="msvcm90.dll" />..</assembly>..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):568832
                                                                Entropy (8bit):6.529348877830445
                                                                Encrypted:false
                                                                SSDEEP:12288:iUmYoJC//83zMHZg7/yToyvYXO84hUgiW6QR7t5C3Ooc8SHkC2eRZRzS:iUmYoO83W0y8yeO8L3Ooc8SHkC2e8
                                                                MD5:6DE5C66E434A9C1729575763D891C6C2
                                                                SHA1:A230E64E0A5830544A25890F70CE9C9296245945
                                                                SHA-256:4F7ED27B532888CE72B96E52952073EAB2354160D1156924489054B7FA9B0B1A
                                                                SHA-512:27EC83EE49B752A31A9469E17104ED039D74919A103B625A9250AC2D4D8B8601034D8B3E2FA87AADBAFBDB89B01C1152943E8F9A470293CC7D62C2EEFA389D2C
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........?..qQ.qQ.qQ..*.qQ.#..qQ.qP..qQ..>..qQ.#..qQ.#..qQ.#..qQ.#..qQ.#..qQ.#..qQ.Rich.qQ.................PE..L....=1G...........!.....$...p......B........@....Hx................................`.....@.........................@C......d8..<....p...................$......D2...................................$..@............................................text...!#.......$.................. ..`.data...h&...@.......(..............@....rsrc........p.......B..............@..@.reloc...B.......D...F..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):224768
                                                                Entropy (8bit):6.040336415310379
                                                                Encrypted:false
                                                                SSDEEP:6144:ge7iXDX5qmzXOZc/cU4HqsKvts6tifkglMqbO0YLJbc89XTiuq5Kz3OaOyp:ge7iXVDzXOGJb5XTiuq5Kz+
                                                                MD5:4A8BC195ABDC93F0DB5DAB7F5093C52F
                                                                SHA1:B55A206FC91ECC3ADEDA65D286522AA69F04AC88
                                                                SHA-256:B371AF3CE6CB5D0B411919A188D5274DF74D5EE49F6DD7B1CCB5A31466121A18
                                                                SHA-512:197C12825EFA2747AFD10FAFE3E198C1156ED20D75BAD07984CAA83447D0C7D498EF67CEE11004232CA5D4DBBB9AE9D43BFD073002D3D0D8385476876EF48A94
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........3...`...`...`..{`...`..~`...`..}`...`.@.`...`.j.`...`...`<..`..k`...`..l`..`..z`...`..|`...`..y`...`Rich...`........PE..L....=1G...........!.....:...................P....?x.........................0.......L....@..........................1..4....%..d...............................d...P...............................P...@...............(...........p...H............text....8.......:.................. ..`.data...|....P.......>..............@....rsrc................H..............@..@.reloc...!......."...L..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):655872
                                                                Entropy (8bit):6.890160476095281
                                                                Encrypted:false
                                                                SSDEEP:12288:whr4UCeaHTA80gIZ4BgmOEGVN9vtI0E5uO9FAOu8axTFmRyyrRzS:ga2g5gmO791I0E5uO9FANpmRyyg
                                                                MD5:E7D91D008FE76423962B91C43C88E4EB
                                                                SHA1:29268EF0CD220AD3C5E9812BEFD3F5759B27A266
                                                                SHA-256:ED0170D3DE86DA33E02BFA1605EEC8FF6010583481B1C530843867C1939D2185
                                                                SHA-512:C3D5DA1631860C92DECF4393D57D8BFF0C7A80758C9B9678D291B449BE536465BDA7A4C917E77B58A82D1D7BFC1F4B3BEE9216D531086659C40C41FEBCDCAE92
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O...a...a...a..,....a...a...a...3)..`...3?.^a...3...a...38..a...3>..a...3;..a..Rich.a..................PE..L....=1G...........!.....Z..........@-.......p....Rx.........................0............@.........................`....|......(........................$.......3......................................@............................................text....X.......Z.................. ..`.data....g...p...D...^..............@....rsrc...............................@..@.reloc...7.......8..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):224768
                                                                Entropy (8bit):6.040336415310379
                                                                Encrypted:false
                                                                SSDEEP:6144:ge7iXDX5qmzXOZc/cU4HqsKvts6tifkglMqbO0YLJbc89XTiuq5Kz3OaOyp:ge7iXVDzXOGJb5XTiuq5Kz+
                                                                MD5:4A8BC195ABDC93F0DB5DAB7F5093C52F
                                                                SHA1:B55A206FC91ECC3ADEDA65D286522AA69F04AC88
                                                                SHA-256:B371AF3CE6CB5D0B411919A188D5274DF74D5EE49F6DD7B1CCB5A31466121A18
                                                                SHA-512:197C12825EFA2747AFD10FAFE3E198C1156ED20D75BAD07984CAA83447D0C7D498EF67CEE11004232CA5D4DBBB9AE9D43BFD073002D3D0D8385476876EF48A94
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........3...`...`...`..{`...`..~`...`..}`...`.@.`...`.j.`...`...`<..`..k`...`..l`..`..z`...`..|`...`..y`...`Rich...`........PE..L....=1G...........!.....:...................P....?x.........................0.......L....@..........................1..4....%..d...............................d...P...............................P...@...............(...........p...H............text....8.......:.................. ..`.data...|....P.......>..............@....rsrc................H..............@..@.reloc...!......."...L..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):568832
                                                                Entropy (8bit):6.529348877830445
                                                                Encrypted:false
                                                                SSDEEP:12288:iUmYoJC//83zMHZg7/yToyvYXO84hUgiW6QR7t5C3Ooc8SHkC2eRZRzS:iUmYoO83W0y8yeO8L3Ooc8SHkC2e8
                                                                MD5:6DE5C66E434A9C1729575763D891C6C2
                                                                SHA1:A230E64E0A5830544A25890F70CE9C9296245945
                                                                SHA-256:4F7ED27B532888CE72B96E52952073EAB2354160D1156924489054B7FA9B0B1A
                                                                SHA-512:27EC83EE49B752A31A9469E17104ED039D74919A103B625A9250AC2D4D8B8601034D8B3E2FA87AADBAFBDB89B01C1152943E8F9A470293CC7D62C2EEFA389D2C
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........?..qQ.qQ.qQ..*.qQ.#..qQ.qP..qQ..>..qQ.#..qQ.#..qQ.#..qQ.#..qQ.#..qQ.#..qQ.Rich.qQ.................PE..L....=1G...........!.....$...p......B........@....Hx................................`.....@.........................@C......d8..<....p...................$......D2...................................$..@............................................text...!#.......$.................. ..`.data...h&...@.......(..............@....rsrc........p.......B..............@..@.reloc...B.......D...F..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):655872
                                                                Entropy (8bit):6.890160476095281
                                                                Encrypted:false
                                                                SSDEEP:12288:whr4UCeaHTA80gIZ4BgmOEGVN9vtI0E5uO9FAOu8axTFmRyyrRzS:ga2g5gmO791I0E5uO9FANpmRyyg
                                                                MD5:E7D91D008FE76423962B91C43C88E4EB
                                                                SHA1:29268EF0CD220AD3C5E9812BEFD3F5759B27A266
                                                                SHA-256:ED0170D3DE86DA33E02BFA1605EEC8FF6010583481B1C530843867C1939D2185
                                                                SHA-512:C3D5DA1631860C92DECF4393D57D8BFF0C7A80758C9B9678D291B449BE536465BDA7A4C917E77B58A82D1D7BFC1F4B3BEE9216D531086659C40C41FEBCDCAE92
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O...a...a...a..,....a...a...a...3)..`...3?.^a...3...a...38..a...3>..a...3;..a..Rich.a..................PE..L....=1G...........!.....Z..........@-.......p....Rx.........................0............@.........................`....|......(........................$.......3......................................@............................................text....X.......Z.................. ..`.data....g...p...D...^..............@....rsrc...............................@..@.reloc...7.......8..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):548
                                                                Entropy (8bit):5.016046602668665
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdtXBFN8u3/3XO5WSN4dKF+nVI4gVW/wnbEJRxJ0xoxF2G:2dtXD+u/eVN40+nVI4gAwnAt
                                                                MD5:CE3AB3BD3FF80FCE88DCB0EA3D48A0C9
                                                                SHA1:C6BA2C252C6D102911015D0211F6CAB48095931C
                                                                SHA-256:F7205C5C0A629D0CC60E30E288E339F08616BE67B55757D4A403A2B54E23922B
                                                                SHA-512:211E247EA82458FD68BCC91A6731E9E3630A9D5901F4BE4AF6099AD15A90CAF2826E14846951FDD7D3B199994FD3AC97CA9E325CF0DFEB9474AEA9B0D6339DD3
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>.. Copyright (c) Microsoft Corporation. All rights reserved. -->..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <noInheritable/>.. <assemblyIdentity.. type="win32".. name="Microsoft.VC90.MFC".. version="9.0.21022.8".. processorArchitecture="x86".. publicKeyToken="1fc8b3b9a1e18e3b".. />.. <file name="mfc90.dll" /> <file name="mfc90u.dll" /> <file name="mfcm90.dll" /> <file name="mfcm90u.dll" />..</assembly>..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):59904
                                                                Entropy (8bit):6.048382351359956
                                                                Encrypted:false
                                                                SSDEEP:768:Q2q4fSp3W9sHSIeXNKIv3dJcZqXIq9BVO5nOC6u58rrYlyQRvVFtTiO1lqNkdZ:9TqpwsH1eTJWZv6FrrsNFtmO1oNk
                                                                MD5:371226B8346F29011137C7AA9E93F2F6
                                                                SHA1:485DE5A0CA0564C12EACC38D1B39F5EF5670A2E2
                                                                SHA-256:5B08FE55E4BBF2FBFD405E2477E023137CFCEB4D115650A5668269C03300A8F8
                                                                SHA-512:119A5E16E3A3F2FF0B5ACB6B5D5777997102A3CAE00D48C0F8921DF5818F5FBDA036974E23C6F77A6B9380C6A1065372E70F8D4E665DFD37E5F90EB27DB7420C
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(<.hFo.hFo.hFo..+o.hFo..=o.hFo.:.o.hFo9'.o.hFo.:.o.hFo.:.o.hFo..=o.hFo.hGo.hFo.:.o.hFo.:.o.hFo.:.o.hFo.:.o.hFoRich.hFo................PE..L...Y`1G...........!.....:..........rG.......P.....x.........................0......Ko....@.................................|................................ .......R...............................T..@............P..,............R..H............text....8.......:.................. ..`.rdata.......P.......>..............@..@.data...P...........................@....rsrc...............................@..@.reloc..n.... ......................@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1156600
                                                                Entropy (8bit):6.52546095742681
                                                                Encrypted:false
                                                                SSDEEP:24576:HMh/PZa3TrShmbjRbf/zxUK4BpifCqY5TcB2sQL+XmDOl:HMh/PZa3HTjtFUKwhqY5TcyL+XmE
                                                                MD5:462DDCC5EB88F34AED991416F8E354B2
                                                                SHA1:6F4DBB36A8E7E594E12A2A9ED4B71AF0FAA762C1
                                                                SHA-256:287BD98054C5D2C4126298EE50A2633EDC745BC76A1CE04E980F3ECC577CE943
                                                                SHA-512:35D21E545CE6436F5E70851E0665193BB1C696F61161145C92025A090D09E08F28272CBF1E271FF62FF31862544025290E22B15A7ACDE1AEA655560300EFE1EC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C.R."..."..."......"......."......"...p^.."..\m[.."...pX.."...pN.."...pI.."......"..."...!...pG.>"...p_.."...pY.."...p\.."..Rich."..................PE..L....`1G...........!.....T...N......C+.......p....^x................................g.....@..............................f......x.......x................#.......... ..................................@...............@...........................text....R.......T.................. ..`.data....j...p...H...X..............@....rsrc...x...........................@..@.reloc...1.......2...P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):548
                                                                Entropy (8bit):5.016046602668665
                                                                Encrypted:false
                                                                SSDEEP:12:TMHdtXBFN8u3/3XO5WSN4dKF+nVI4gVW/wnbEJRxJ0xoxF2G:2dtXD+u/eVN40+nVI4gAwnAt
                                                                MD5:CE3AB3BD3FF80FCE88DCB0EA3D48A0C9
                                                                SHA1:C6BA2C252C6D102911015D0211F6CAB48095931C
                                                                SHA-256:F7205C5C0A629D0CC60E30E288E339F08616BE67B55757D4A403A2B54E23922B
                                                                SHA-512:211E247EA82458FD68BCC91A6731E9E3630A9D5901F4BE4AF6099AD15A90CAF2826E14846951FDD7D3B199994FD3AC97CA9E325CF0DFEB9474AEA9B0D6339DD3
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>.. Copyright (c) Microsoft Corporation. All rights reserved. -->..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <noInheritable/>.. <assemblyIdentity.. type="win32".. name="Microsoft.VC90.MFC".. version="9.0.21022.8".. processorArchitecture="x86".. publicKeyToken="1fc8b3b9a1e18e3b".. />.. <file name="mfc90.dll" /> <file name="mfc90u.dll" /> <file name="mfcm90.dll" /> <file name="mfcm90u.dll" />..</assembly>..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1162744
                                                                Entropy (8bit):6.531289155070338
                                                                Encrypted:false
                                                                SSDEEP:24576:ACmuzoNEIkc0FV/IvA+hJpHgbe18MVc/AKDbZOUWJGLaDenEKH:AC9zoNEIkbFV/IvA+hJyq1FVc/FDbZOQ
                                                                MD5:B9030D821E099C79DE1C9125B790E2DA
                                                                SHA1:79189E6F7887CA8F41FB17603BD9C2D46180EFCF
                                                                SHA-256:E30AABB518361FBEAF8068FFC786845EE84ABBF1F71AE7D2733A11286531595A
                                                                SHA-512:2E1EBCBE595C5A1FE09F5933D4BA190081EF343EA313725BB0F8FCBF98079A091AB8C0465EF437B310A1753FFC2D48D9D70EC80D773E7919A6485EF730E93EA1
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........Y...Y...Y...~H.X......X...~H..I...G.>.[.....;.X...G.8.R...G...F...G.).P...~H.P...Y...;...G.'.....G.?.X...G.9.X...G.<.X...RichY...........................PE..L...*`1G...........!.....j...P......a@.............x.................................x....@.........................P....g......x........................#......h.......................................@...............<............................text...kh.......j.................. ..`.data....l.......J...n..............@....rsrc...............................@..@.reloc...1.......2...h..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):59904
                                                                Entropy (8bit):6.049630833293433
                                                                Encrypted:false
                                                                SSDEEP:768:kXS5hxqhOz9XNpOb/AXVuips6Pm550971BVO5nkcwo5ArrwlyQ6mrCHrO1MquTSU:kC/IMZHO0lu+s60VwvrrDmrCrO1HuTR
                                                                MD5:D4E7C1546CF3131B7D84B39F8DA9E321
                                                                SHA1:6B096858723C76848B85D63B4DA334299BECED5B
                                                                SHA-256:C4243BA85C2D130B4DEC972CD291916E973D9D60FAC5CEEA63A01837ECC481C2
                                                                SHA-512:4383E2BC34B078819777DA73F1BD4A88B367132E653A7226ED73F43E4387ED32E8C2BCAFD8679EF5E415F0B63422DB05165A9E794F055AA8024FE3E7CABC66B9
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(<.hFo.hFo.hFo..+o.hFo..=o.hFo.:.o.hFo9'.o.hFo.:.o.hFo.:.o.hFo..=o.hFo.hGo.hFo.:.o.hFo.:.o.hFo.:.o.hFo.:.o.hFoRich.hFo................PE..L...X`1G...........!.....:..........rG.......P.....x.........................0............@.................................L................................ .......R...............................S..@............P..,............R..H............text....8.......:.................. ..`.rdata..^....P.......>..............@..@.data...............................@....rsrc...............................@..@.reloc..n.... ......................@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1156600
                                                                Entropy (8bit):6.52546095742681
                                                                Encrypted:false
                                                                SSDEEP:24576:HMh/PZa3TrShmbjRbf/zxUK4BpifCqY5TcB2sQL+XmDOl:HMh/PZa3HTjtFUKwhqY5TcyL+XmE
                                                                MD5:462DDCC5EB88F34AED991416F8E354B2
                                                                SHA1:6F4DBB36A8E7E594E12A2A9ED4B71AF0FAA762C1
                                                                SHA-256:287BD98054C5D2C4126298EE50A2633EDC745BC76A1CE04E980F3ECC577CE943
                                                                SHA-512:35D21E545CE6436F5E70851E0665193BB1C696F61161145C92025A090D09E08F28272CBF1E271FF62FF31862544025290E22B15A7ACDE1AEA655560300EFE1EC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C.R."..."..."......"......."......"...p^.."..\m[.."...pX.."...pN.."...pI.."......"..."...!...pG.>"...p_.."...pY.."...p\.."..Rich."..................PE..L....`1G...........!.....T...N......C+.......p....^x................................g.....@..............................f......x.......x................#.......... ..................................@...............@...........................text....R.......T.................. ..`.data....j...p...H...X..............@....rsrc...x...........................@..@.reloc...1.......2...P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1162744
                                                                Entropy (8bit):6.531289155070338
                                                                Encrypted:false
                                                                SSDEEP:24576:ACmuzoNEIkc0FV/IvA+hJpHgbe18MVc/AKDbZOUWJGLaDenEKH:AC9zoNEIkbFV/IvA+hJyq1FVc/FDbZOQ
                                                                MD5:B9030D821E099C79DE1C9125B790E2DA
                                                                SHA1:79189E6F7887CA8F41FB17603BD9C2D46180EFCF
                                                                SHA-256:E30AABB518361FBEAF8068FFC786845EE84ABBF1F71AE7D2733A11286531595A
                                                                SHA-512:2E1EBCBE595C5A1FE09F5933D4BA190081EF343EA313725BB0F8FCBF98079A091AB8C0465EF437B310A1753FFC2D48D9D70EC80D773E7919A6485EF730E93EA1
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........Y...Y...Y...~H.X......X...~H..I...G.>.[.....;.X...G.8.R...G...F...G.).P...~H.P...Y...;...G.'.....G.?.X...G.9.X...G.<.X...RichY...........................PE..L...*`1G...........!.....j...P......a@.............x.................................x....@.........................P....g......x........................#......h.......................................@...............<............................text...kh.......j.................. ..`.data....l.......J...n..............@....rsrc...............................@..@.reloc...1.......2...h..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):59904
                                                                Entropy (8bit):6.049630833293433
                                                                Encrypted:false
                                                                SSDEEP:768:kXS5hxqhOz9XNpOb/AXVuips6Pm550971BVO5nkcwo5ArrwlyQ6mrCHrO1MquTSU:kC/IMZHO0lu+s60VwvrrDmrCrO1HuTR
                                                                MD5:D4E7C1546CF3131B7D84B39F8DA9E321
                                                                SHA1:6B096858723C76848B85D63B4DA334299BECED5B
                                                                SHA-256:C4243BA85C2D130B4DEC972CD291916E973D9D60FAC5CEEA63A01837ECC481C2
                                                                SHA-512:4383E2BC34B078819777DA73F1BD4A88B367132E653A7226ED73F43E4387ED32E8C2BCAFD8679EF5E415F0B63422DB05165A9E794F055AA8024FE3E7CABC66B9
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(<.hFo.hFo.hFo..+o.hFo..=o.hFo.:.o.hFo9'.o.hFo.:.o.hFo.:.o.hFo..=o.hFo.hGo.hFo.:.o.hFo.:.o.hFo.:.o.hFo.:.o.hFoRich.hFo................PE..L...X`1G...........!.....:..........rG.......P.....x.........................0............@.................................L................................ .......R...............................S..@............P..,............R..H............text....8.......:.................. ..`.rdata..^....P.......>..............@..@.data...............................@....rsrc...............................@..@.reloc..n.... ......................@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):59904
                                                                Entropy (8bit):6.048382351359956
                                                                Encrypted:false
                                                                SSDEEP:768:Q2q4fSp3W9sHSIeXNKIv3dJcZqXIq9BVO5nOC6u58rrYlyQRvVFtTiO1lqNkdZ:9TqpwsH1eTJWZv6FrrsNFtmO1oNk
                                                                MD5:371226B8346F29011137C7AA9E93F2F6
                                                                SHA1:485DE5A0CA0564C12EACC38D1B39F5EF5670A2E2
                                                                SHA-256:5B08FE55E4BBF2FBFD405E2477E023137CFCEB4D115650A5668269C03300A8F8
                                                                SHA-512:119A5E16E3A3F2FF0B5ACB6B5D5777997102A3CAE00D48C0F8921DF5818F5FBDA036974E23C6F77A6B9380C6A1065372E70F8D4E665DFD37E5F90EB27DB7420C
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(<.hFo.hFo.hFo..+o.hFo..=o.hFo.:.o.hFo9'.o.hFo.:.o.hFo.:.o.hFo..=o.hFo.hGo.hFo.:.o.hFo.:.o.hFo.:.o.hFo.:.o.hFoRich.hFo................PE..L...Y`1G...........!.....:..........rG.......P.....x.........................0......Ko....@.................................|................................ .......R...............................T..@............P..,............R..H............text....8.......:.................. ..`.rdata.......P.......>..............@..@.data...P...........................@....rsrc...............................@..@.reloc..n.... ......................@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1054208
                                                                Entropy (8bit):6.044183195357732
                                                                Encrypted:false
                                                                SSDEEP:12288:eQ/l0cg4oP3iFxiu7iojd3Gp6Yv4aiBjYUnApVccsafw32+pNmU8c6f8VPtXobJq:eQAl/iFiODBjYUApVQafw32+mQ6x
                                                                MD5:2E641E9DF345D202726EB2DAF9D3F453
                                                                SHA1:325740FE6A4F7A968F0839126ADB1706D11697F0
                                                                SHA-256:B4C2DD5DA4BA9CC4AA79CDEF49C1C0E54E8E38C087A068970E59947269A9C070
                                                                SHA-512:F2457243BD9D49E0C523727B6DC6DB3B1B8BF98BB866CB20C3B14207E72BEF0865D56798D06A818FB4F6BB63F884EE489354D53F01B8EB1FE62E8E30D9624DB5
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......QV'..7I..7I..7I..8...7I..8F..7I..7H..5I..8...7I..8...7I..8)..7I..8.._7I..8...7I.Rich.7I.........................PE..L...l..H...........!................VB....... .....w.........................0.......M..............................P.......h........0...........................T..................................p>..@............................................text...J........................... ..`.data...P.... ......................@....rsrc........0......................@..@.reloc..(^.......`..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1054208
                                                                Entropy (8bit):6.044183195357732
                                                                Encrypted:false
                                                                SSDEEP:12288:eQ/l0cg4oP3iFxiu7iojd3Gp6Yv4aiBjYUnApVccsafw32+pNmU8c6f8VPtXobJq:eQAl/iFiODBjYUApVQafw32+mQ6x
                                                                MD5:2E641E9DF345D202726EB2DAF9D3F453
                                                                SHA1:325740FE6A4F7A968F0839126ADB1706D11697F0
                                                                SHA-256:B4C2DD5DA4BA9CC4AA79CDEF49C1C0E54E8E38C087A068970E59947269A9C070
                                                                SHA-512:F2457243BD9D49E0C523727B6DC6DB3B1B8BF98BB866CB20C3B14207E72BEF0865D56798D06A818FB4F6BB63F884EE489354D53F01B8EB1FE62E8E30D9624DB5
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......QV'..7I..7I..7I..8...7I..8F..7I..7H..5I..8...7I..8...7I..8)..7I..8.._7I..8...7I.Rich.7I.........................PE..L...l..H...........!................VB....... .....w.........................0.......M..............................P.......h........0...........................T..................................p>..@............................................text...J........................... ..`.data...P.... ......................@....rsrc........0......................@..@.reloc..(^.......`..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):170496
                                                                Entropy (8bit):6.106350948348404
                                                                Encrypted:false
                                                                SSDEEP:3072:4o/xbk9GvULHHu4SnwRVzXH75xcvvvWzpN:Fxg9/uls7fcvvvwp
                                                                MD5:E14075E1E6DE40EDFF919368DE072234
                                                                SHA1:289BF827E2C2D070BD0D919CF04284B29F34BD1C
                                                                SHA-256:2A596EDC9B4400CB1D494C0C6FD63253F74FFA2CB1CC7690A45205219AFBFF69
                                                                SHA-512:6D00C632C671917DB6D433C38C4589544AB380CA84779D706662ACC37A9144F5F03C81A87F3394CA5136BF18FBBB8745251695CD76DE84D2C2B77A7F4001464F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........JU.$..$..$.u....$.....$....M.$......$..}_..$..%...$.....$.....$.....$.Rich.$.........................PE..L.....DZ...........!...............................................................>.....@.........................0"..........x......................................................................@............................................text...%........................... ..`.rdata...s.......t..................@..@.data...D{...0...`..................@....rsrc................r..............@..@.reloc..V$.......&...t..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36864
                                                                Entropy (8bit):6.09448972504833
                                                                Encrypted:false
                                                                SSDEEP:384:/33MgxjUjNrZ/6CCj6TLdLn5xv2ZdV3bdAf6zAC2ACc4dFukNLOtuh1Sg2L:fMgxohrZ///vYdV3bGE74dcIOtg2L
                                                                MD5:5828961B2978F3457740770F6F07AE2E
                                                                SHA1:9D04736ABD68DDDB7BD4EA115E4B7FE2BAEF1B0A
                                                                SHA-256:7612D408EF46256D2B4E85FFB6EFEACF0C2BE2C1E96EE90A3B6FAF525BE80C4E
                                                                SHA-512:5510E9EC3678D2FA4BA3D0928BB674CF88C9464818DA51D06194DE4BA9C3A4E052A9BE4CC7EDB9E5B0E430364122117A069ABB1BBE216A4682274392650EC8DF
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........|.d./.d./.d./.+t/.d./..w/.d./..a/.d./..f/.d./..q/.d./.../.d./.../.d./.d./.d./..h/.d./..p/.d./..s/.d./Rich.d./................PE..L....._...........!.....N...>.......T.......`......................................z.....@.........................@...g....z......................................................................Xw..@............`...............................text...gM.......N.................. ..`.rdata...1...`...2...R..............@..@.data...0...........................@....rsrc...............................@..@.reloc..^...........................@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):45056
                                                                Entropy (8bit):4.068445105760994
                                                                Encrypted:false
                                                                SSDEEP:384:Hyl3eok/STRXEPI4yHNpFrSHY537Fs0sHx3jyAo99jzunIPknttyJzzZ2noC:Sl3U6TRXOr0sHY53GFjs99jzenttEtJ
                                                                MD5:6BA61053DC82AD14DFFEB110771266D1
                                                                SHA1:D0B44272B9C7109E359ED5F64EF3537EBA092786
                                                                SHA-256:5E6AFF4AE3987023B06ED3936C7608F758E3E826DB11A1DA5A5E8EDF0107E023
                                                                SHA-512:CF590BBD0965C74C71F4713EF7972FF7E52CCB40411BDD0500E34EAFF6894A7C659C7E8033EB4E4BA056CA565595A73D300A62CDDCF6007F4471CB05D3E6240F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r..6..6..6....."............3..6..p.....5....7..Rich6..........PE..L....4BM...........!.....P...`......Y........`......................................................................@k...... f..<...............................D....................................................`...............................text....@.......P.................. ..`.rdata.......`.......`..............@..@.data...@1...p...0...p..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):707072
                                                                Entropy (8bit):6.206491339823504
                                                                Encrypted:false
                                                                SSDEEP:12288:8jYr3vhpHQE6B+sU+SVZ+LFWf1C6NGZVmVRfqb4tr3xY:8jgpDV+YZ+LF9UVRfqY6
                                                                MD5:C2D89C0BA1D3616B03191E4CE5FC96E3
                                                                SHA1:CD485AEA151D99D8170E32608C1BBDA5B7B920B5
                                                                SHA-256:AC26AEFC4BBAA15EFB2EFFE81B7BDDD796609256E87679339E5F8E2AE9A271CF
                                                                SHA-512:AA5F6832021A20104C3E966F2C4C28538EBE0218DFF4CEAA80D4B70232CD5F6607A8A52CEEC35A1FC227DE35ABDF7A7E31E56263986B7F114D29F25FCDA00B81
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m...t...t...t.......t.......t...u...t..t..t..t....t..t...t..^..t..t....t..t..t..^..t..t..t.Rich..t.................PE..L....D.]...........!................-........................................0.......|....@..........................w.......b................................... ..................................H;..@....................b..@....................text...k........................... ..`.rdata...x.......z..................@..@.data....Z....... ...n..............@....rsrc...............................@..@.reloc...p.......r...X..............@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):257024
                                                                Entropy (8bit):6.188312331763729
                                                                Encrypted:false
                                                                SSDEEP:6144:gjdRIa917/l0Aw2Qf2jmCJYBYjn6hKn3kcaZ:gj7/lpwZOjmCJYonWZ
                                                                MD5:F258AC2BD27DA86FE911F2E7414D7CA8
                                                                SHA1:8A1CC7D65A5192B9233E0EC46123A2F209E64B1E
                                                                SHA-256:0C5AC6846D86A8FBCF1E4327195881D510E7C4C4D86F7E75E0C8762415F86DB9
                                                                SHA-512:2F786F5328117E685AFBDEA193BA1E075F17CF5CFFBEFBC2D6D25393DE834890076063A9CB4BC37B0E56625BBE9C155317FF21031B68DA8CEABA40AF03203FAD
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@+.,.J...J...J..#....J..#....J...J..2H...2B..J...2T..J...2S.yJ....A..J....S..J...2]..J...2E..J....C..J...2F..J..Rich.J..................PE..L......Z...........!.........f.......f.......................................P......K2....@..........................;..l...8...........(/.......................)......................................@...............|.......@....................text............................... ..`.rdata..\...........................@..@.data...x_...@...$...$..............@....rsrc...(/.......0...H..............@..@.reloc..Lr.......t...x..............@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):57344
                                                                Entropy (8bit):5.130680079534511
                                                                Encrypted:false
                                                                SSDEEP:768:kEFohyrArHI0WRWeI2XhTGQQzA07nZqqx5P:kLhfrlFsTG3AQj5P
                                                                MD5:F0A4E6B345A8AD91FF529DE0702B58F5
                                                                SHA1:7DEE326B32285A485E339040DDABA3A66038F176
                                                                SHA-256:B20A1A2827FB12D7E5D39DA84773AE6E4EE21899AF066A666312DDA2A24960F4
                                                                SHA-512:6F6BEE64EB99A4F8A5FE438539F287F3B5AE2AB1189763C6EA057648628FFEB990E95F2F5CD2A0250395EA80F79D5CFE4E36913EF85392E7BA474D092C6D4460
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................c.....c.......c......c..........c.....c.....c.....c....Rich..................PE..L...XB.Q...........!.....p...p......j...........................................................................................d.......................................................................@...............0............................text...mh.......p.................. ..`.rdata........... ..................@..@.data...\...........................@...ve_share$...........................@....rsrc...............................@..@.reloc..F...........................@..B................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):51200
                                                                Entropy (8bit):5.646816199679047
                                                                Encrypted:false
                                                                SSDEEP:768:OMlp3fx2wk8DhoyLh38OHUHXgx0TYk5GfWfOo1LxF/cQ:OMlpvx20FNUHXgGTYytfVLxFb
                                                                MD5:E399CDA9A9518D9C69153CCB6D511F8A
                                                                SHA1:8F0FD4318E32A1D6A1C94AD9887C510E80AC9AA3
                                                                SHA-256:C94E6C2175097758C67D8524CBE72206683641E58D7A9A73A8A36B4AF1D53D3B
                                                                SHA-512:F0DC07C8ECEB2F27CE9D16304B3C2EF50F81CA6822271E659EDD0159E3A64FD4F5FA5D08A7082720B0199EF1C6E1B7E6512B11FB326A0B5A56815F870E75D465
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E<.B.]...]...]..&....]..&....]..&...C]..w....]...]..X]..&....]..&....]..&....]..&....]..Rich.]..........PE..d....6.Q.........." .....r...b...............................................0..............................................................d...d............................ ..........................................................h............................text...~q.......r.................. ..`.rdata...(.......*...v..............@..@.data....!..........................@....pdata..............................@..@ve_share4...........................@....rsrc...............................@..@.reloc..\.... ......................@..B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):686080
                                                                Entropy (8bit):6.599346864475418
                                                                Encrypted:false
                                                                SSDEEP:12288:Ou/F+MoQxHSbb6lQIrvw7A87cNzqmYWmQ+uYI0qV+h2uCpmL:prxybb6l9zw79GzqjWmQdYLqYUTs
                                                                MD5:1583338F5D055CD5B4EA5677B2CCFF6E
                                                                SHA1:2335761BD200D0008CB041EB3D7D4860E9E421E9
                                                                SHA-256:C1F8E9F30A5BF7CA4A0F2F1F60FFD97A0F49F65448BF5B6B4BBDBC8A263A321F
                                                                SHA-512:8A44820050D955D1401EF7B912AC4B86FCF5839FC2A64C1AE4CC8AC1A3FE9BB1AA1FA6063DF863D3DC2A1D0804451F6FCAC4F188390D5A27A68891273BBED957
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................n............... ....@..............................................................................-.......f......................|...................................................T................................text............................... ..`.itext.............................. ..`.data...@-... ......................@....bss.....D...P.......8...................idata...-...........8..............@....edata...............f..............@..@.reloc..|............j..............@..B.rsrc....f.......f..................@..@.....................x..............@..@........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):157696
                                                                Entropy (8bit):6.588815894817083
                                                                Encrypted:false
                                                                SSDEEP:3072:4vgQzfb7Tam/UofCMs9B3a87Kw2PgDaqa75nW0B6bS:qg+fOm/2MsX7qWF
                                                                MD5:0C25DE9D7007B3810934B92D708CFDF0
                                                                SHA1:311866DD1D3E61DFAB7B4B43114EB2BDC76B57BB
                                                                SHA-256:464709B85BE4E48B19821B967C600B7CCD51AAF013C53504B349B6B424933675
                                                                SHA-512:AFE9401D3F0E1D4D779D1563EE0295B17088C85B980A46729D3BF16683F8CB25D65E96EB0B6E183266B65CCEDE37246E04CB093D03FEE965180C583E5DB0C819
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........E.$..$..$..\..$..\..$..\...$.....$..$..r$..\..$..\..$..v..$..\..$..Rich.$..........................PE..L......\...........!.................................................................q....@.........................P................`..X7......................p...................................P...@............................................text............................... ..`.rdata...[.......\..................@..@.data...hK..........................@....rsrc...X7...`...8..................@..@.reloc..` ......."...F..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:ISO-8859 text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):270
                                                                Entropy (8bit):5.462454074658514
                                                                Encrypted:false
                                                                SSDEEP:6:LAKQZU2VyhBho/5dpWkAe/y3efsDxvodagPJXo/55er16i0iWlRWVsn:LIZU2VyhPoRdpWcy33ptgPhoR5ersi1m
                                                                MD5:79B3E50CC7CDFE892C9B342ACF0A5D8B
                                                                SHA1:E25415ED7D847E9EB3EC9E9763C7C67A6A0E69CC
                                                                SHA-256:E6FB7CAC469EF2B59DFEFB8BA2D0973C4E8366F3EFF1955483E9DE248DAD231E
                                                                SHA-512:ED3A19247F624FF1D72271E1379D149792DE8EA549FC9BDB1FA1904AF9B7BCA3F70050FA9894D1B31DC3F0382BD64ACF2FD64B20EBE665BD850512ACF8A284A5
                                                                Malicious:false
                                                                Preview:[RecordSound]..SpkRec=1..SpkDevice="...... (Realtek High Definition Audio)"..SpkLine=".........."..SpkPlus=0..MicRec=1..MicDevice=".... (Realtek High Definition Audio)"..MicLine="........"..MicPlus=0..Channels=2..SamplesPerSec=22050..BitsPerSample=16..NotViewVol=0..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):89102
                                                                Entropy (8bit):6.433101399482147
                                                                Encrypted:false
                                                                SSDEEP:1536:U2Vt7zQkCgHY99TMa8OrZducFOOF0vBKec1:UGFQkCgHYCOr/utG
                                                                MD5:41465204A0947156F06267FD609A406D
                                                                SHA1:B278E36DE90DAA44F3408DBB00B0D80169677FBF
                                                                SHA-256:8554AA62925EFD12B0773D078FFED55F2B285E737A48F604C3E9C535D74636BB
                                                                SHA-512:6D4F6EECF9CCFE65E9BBF67FF876C2E152ED254B831D00923B4658DED42F3103220E19EDA4083933F02178A08084D96CC694024AAEE66F59C48BA5E1ABBA7735
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1.2[.\.........#.........X......`..............o................................3O....@... ......................p..q.......h.......d.......................`....................................................................................text...t...........................`.P`.data...............................@.`..rdata..$|.......~..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..q....p.......0..............@.0@.idata..h............4..............@.0..CRT....,............J..............@.0..tls.... ............L..............@.0..rsrc...d............N..............@.0..reloc..`............R..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):23
                                                                Entropy (8bit):4.0559581516151235
                                                                Encrypted:false
                                                                SSDEEP:3:jLkAgzAay:jLui
                                                                MD5:9CE01B30D887F6E66A3A0E1A6305AD40
                                                                SHA1:A47E65E26C120D863125F4A07290258E6934191A
                                                                SHA-256:653C8A34477856F11C0CA9759766972AFD0CD4CE28B1419C4B1D9BA27E3C207C
                                                                SHA-512:3E0402963F580FA9D0368A06665920077F84D121AA22CF940D4E606E674BC4B2DCE4CD4FDC55B93592C8AD96D4ED757D10538A77671F2714FE2CA04CB2DDAB84
                                                                Malicious:false
                                                                Preview:[Camera]..typeEnbed=0..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):334350
                                                                Entropy (8bit):6.476941251422441
                                                                Encrypted:false
                                                                SSDEEP:6144:6RXFp5Ik38GxNMHOfdCWBTjpmD/CiPTiD9w/U5XsdPVrHB5HrvQSFYd:Yp593DxamdBibxFYd
                                                                MD5:9ECE73CA6C29378BB33146D90408CC47
                                                                SHA1:5DAE13BA39EF8DC323CBCD8F39D119B4615FD541
                                                                SHA-256:793D7AA16585FF581F757546EDAB36380632A1C1812C51A1185AA89387963AAA
                                                                SHA-512:F2AACF2862D26F42266600C7C763847F6E45995CDD49F8A18DC0D3F1A7771821272C6CAFAAFE9C0C908CE09FE50A5CABCFC7E8EFFF73FFD1EE34246AC379E13F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...;.2[...........#................`..............f......................................@... ..........................3...@.......p..L....................................................`......................\B...............................text...t...........................`.P`.data...............................@.`..rdata..............................@.`@/4......(s...p...t...F..............@.0@.bss....@.............................`..edata...3.......4..................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...L....p......................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):235008
                                                                Entropy (8bit):6.153080920702548
                                                                Encrypted:false
                                                                SSDEEP:6144:FHyaJDqrKHdok8Wa+f5LdMwqBI8Fnvfg:FHpLra849jFnvfg
                                                                MD5:BB51F3A2E9672DB7570DAAB779F0F9F6
                                                                SHA1:DC55628146324245AE2863736B1EB8F79D6519AE
                                                                SHA-256:C1BE6B75DB7C81ACA2AAE4088546BD56038CD84CFAF32FDEB265618E2B1E60DC
                                                                SHA-512:37CB8A7421B12218E043A3EFD188781F4D107F003E9F02047EBF9BEEDB89648F3FF6176D2CC50DE585DF0B52C7E52EF69D23018EE3852D98E9D931F6D447B20B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........I.i|..i|..i|......i|......i|..i}.Oh|......i|...../i|.....1i|..;...i|......i|......i|..;...i|......i|.Rich.i|.........................PE..L......Y...........!.....$...n...............@............................................@.........................@................P...........................(..`D..................................@............@......$...@....................text...{#.......$.................. ..`.rdata..(....@.......(..............@..@.data....k.......2..................@....rsrc........P...0..................@..@.reloc...t.......v... ..............@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):235008
                                                                Entropy (8bit):6.153080920702548
                                                                Encrypted:false
                                                                SSDEEP:6144:FHyaJDqrKHdok8Wa+f5LdMwqBI8Fnvfg:FHpLra849jFnvfg
                                                                MD5:BB51F3A2E9672DB7570DAAB779F0F9F6
                                                                SHA1:DC55628146324245AE2863736B1EB8F79D6519AE
                                                                SHA-256:C1BE6B75DB7C81ACA2AAE4088546BD56038CD84CFAF32FDEB265618E2B1E60DC
                                                                SHA-512:37CB8A7421B12218E043A3EFD188781F4D107F003E9F02047EBF9BEEDB89648F3FF6176D2CC50DE585DF0B52C7E52EF69D23018EE3852D98E9D931F6D447B20B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........I.i|..i|..i|......i|......i|..i}.Oh|......i|...../i|.....1i|..;...i|......i|......i|..;...i|......i|.Rich.i|.........................PE..L......Y...........!.....$...n...............@............................................@.........................@................P...........................(..`D..................................@............@......$...@....................text...{#.......$.................. ..`.rdata..(....@.......(..............@..@.data....k.......2..................@....rsrc........P...0..................@..@.reloc...t.......v... ..............@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):791481
                                                                Entropy (8bit):6.217228015320556
                                                                Encrypted:false
                                                                SSDEEP:24576:A0Q0PEiRC+tRj9fPFU0L2gNAtFhlHdQPdbf3lpXmxi5OKD:A0Q/DAD
                                                                MD5:4962D3BB23AAA3B389F986335E6C4EE2
                                                                SHA1:1B01A8F626A0CBAEA18622CD4DCFB3C0CC632AD8
                                                                SHA-256:C205DF696F37D6C6AA0832F2B776B2E461665FFB5588A7AB7D35BCF24BE4506D
                                                                SHA-512:38F1FBC8A35D481FC7B12D85FEA29A228E5A5918CBEE6C18B90CA8C1E43A295088E28FABE1D5ED832821CAF1E2B6FA573759819D2232455D9EE163F706B91143
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.Y...........!................`.............`b.........................`......Y......... ......................`..`....p..................................H:..................................................<q...............................text...............................`.P`.rotext............................. .P`.data...............................@.`..rdata...............l..............@.`@.rodata..2.......4..................@.P@/4......xc...P...d... ..............@.0@.bss..................................`..edata..`....`......................@.0@.idata.......p......................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..H:.......<..................@.0B/14.................................@.@B/29....._...........................@..B/41.................................@..B/55.......... ..........
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):67584
                                                                Entropy (8bit):6.205685784114478
                                                                Encrypted:false
                                                                SSDEEP:1536:oacSu67RJwNzZzGqdqAAfnjWG5d+nY3kubrNfF8:o8XMzZSqILfnjWG2Y3ku/NfF8
                                                                MD5:3442F2ED6AF66C75AD4F42FD8DE2917D
                                                                SHA1:AAB69C6A498BC0A629B49BCDF06A66FC658EAE24
                                                                SHA-256:C2F9C9913395D50DA23CB5AE9BC40AE98B1B74862FB584819654D27F5A0199BE
                                                                SHA-512:DC0D7FD02FF51D696CEE4A2385B97B7D9D860707AD6B7D0DBF41BF161FA1DF7AEF39C000AE6589A2E53142CE4D6530245F227D7305824BBC4BED8D16D27B7A05
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......(...lO..lO..lO..e7..fO..>'..nO..>'..xO..>'..eO..>'..nO...P..hO...)..mO...)..iO..lO...O......fO...&..dO...&..mO...&d.mO...&..mO..RichlO..................PE..L...Bx.\...........!.........h......~........................................@............@.........................p...t............ .......................0..........p...........................p...@............................................text............................... ..`.rdata...Q.......R..................@..@.data...H...........................@....rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):57344
                                                                Entropy (8bit):5.130680079534511
                                                                Encrypted:false
                                                                SSDEEP:768:kEFohyrArHI0WRWeI2XhTGQQzA07nZqqx5P:kLhfrlFsTG3AQj5P
                                                                MD5:F0A4E6B345A8AD91FF529DE0702B58F5
                                                                SHA1:7DEE326B32285A485E339040DDABA3A66038F176
                                                                SHA-256:B20A1A2827FB12D7E5D39DA84773AE6E4EE21899AF066A666312DDA2A24960F4
                                                                SHA-512:6F6BEE64EB99A4F8A5FE438539F287F3B5AE2AB1189763C6EA057648628FFEB990E95F2F5CD2A0250395EA80F79D5CFE4E36913EF85392E7BA474D092C6D4460
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................c.....c.......c......c..........c.....c.....c.....c....Rich..................PE..L...XB.Q...........!.....p...p......j...........................................................................................d.......................................................................@...............0............................text...mh.......p.................. ..`.rdata........... ..................@..@.data...\...........................@...ve_share$...........................@....rsrc...............................@..@.reloc..F...........................@..B................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):686080
                                                                Entropy (8bit):6.599346864475418
                                                                Encrypted:false
                                                                SSDEEP:12288:Ou/F+MoQxHSbb6lQIrvw7A87cNzqmYWmQ+uYI0qV+h2uCpmL:prxybb6l9zw79GzqjWmQdYLqYUTs
                                                                MD5:1583338F5D055CD5B4EA5677B2CCFF6E
                                                                SHA1:2335761BD200D0008CB041EB3D7D4860E9E421E9
                                                                SHA-256:C1F8E9F30A5BF7CA4A0F2F1F60FFD97A0F49F65448BF5B6B4BBDBC8A263A321F
                                                                SHA-512:8A44820050D955D1401EF7B912AC4B86FCF5839FC2A64C1AE4CC8AC1A3FE9BB1AA1FA6063DF863D3DC2A1D0804451F6FCAC4F188390D5A27A68891273BBED957
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................n............... ....@..............................................................................-.......f......................|...................................................T................................text............................... ..`.itext.............................. ..`.data...@-... ......................@....bss.....D...P.......8...................idata...-...........8..............@....edata...............f..............@..@.reloc..|............j..............@..B.rsrc....f.......f..................@..@.....................x..............@..@........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):189966
                                                                Entropy (8bit):6.281703857040552
                                                                Encrypted:false
                                                                SSDEEP:3072:exxxxRxRw6vxxxxRxRw6RsP4aa6aa663cQexwaa6aa663s2Wm548/+lr74angtFa:exxxxRxRw6vxxxxRxRw604aa6aa663cq
                                                                MD5:06EE1D0F5A60783DE0846466B95CF758
                                                                SHA1:0A82AAADD658B8EB4807F61447CAEECF1050CB1C
                                                                SHA-256:C0E8BEC9F8178F73C20A76B26D206FB79AD3112C3A78D3380CC8A661493B28C1
                                                                SHA-512:0E15D7A6833A8C2D77583ACB0CC28332D27371169F4E3E03B1CBB1D9C0F290B78D9CD3F5014522764758EDCF9B9392E50885E4C341A3832F49CBB9E3CB658D6E
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...7.2[...........#................`..............j.........................p.......,....@... .........................K.... .......P..`....................`..L............................@......................$!...............................text...............................`.P`.data...............................@.0..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata..K...........................@.0@.idata....... ......................@.0..CRT....,....0......................@.0..tls.... ....@......................@.0..rsrc...`....P......................@.0..reloc..L....`......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:ISO-8859 text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):270
                                                                Entropy (8bit):5.462454074658514
                                                                Encrypted:false
                                                                SSDEEP:6:LAKQZU2VyhBho/5dpWkAe/y3efsDxvodagPJXo/55er16i0iWlRWVsn:LIZU2VyhPoRdpWcy33ptgPhoR5ersi1m
                                                                MD5:79B3E50CC7CDFE892C9B342ACF0A5D8B
                                                                SHA1:E25415ED7D847E9EB3EC9E9763C7C67A6A0E69CC
                                                                SHA-256:E6FB7CAC469EF2B59DFEFB8BA2D0973C4E8366F3EFF1955483E9DE248DAD231E
                                                                SHA-512:ED3A19247F624FF1D72271E1379D149792DE8EA549FC9BDB1FA1904AF9B7BCA3F70050FA9894D1B31DC3F0382BD64ACF2FD64B20EBE665BD850512ACF8A284A5
                                                                Malicious:false
                                                                Preview:[RecordSound]..SpkRec=1..SpkDevice="...... (Realtek High Definition Audio)"..SpkLine=".........."..SpkPlus=0..MicRec=1..MicDevice=".... (Realtek High Definition Audio)"..MicLine="........"..MicPlus=0..Channels=2..SamplesPerSec=22050..BitsPerSample=16..NotViewVol=0..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):23
                                                                Entropy (8bit):4.0559581516151235
                                                                Encrypted:false
                                                                SSDEEP:3:jLkAgzAay:jLui
                                                                MD5:9CE01B30D887F6E66A3A0E1A6305AD40
                                                                SHA1:A47E65E26C120D863125F4A07290258E6934191A
                                                                SHA-256:653C8A34477856F11C0CA9759766972AFD0CD4CE28B1419C4B1D9BA27E3C207C
                                                                SHA-512:3E0402963F580FA9D0368A06665920077F84D121AA22CF940D4E606E674BC4B2DCE4CD4FDC55B93592C8AD96D4ED757D10538A77671F2714FE2CA04CB2DDAB84
                                                                Malicious:false
                                                                Preview:[Camera]..typeEnbed=0..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):51200
                                                                Entropy (8bit):5.646816199679047
                                                                Encrypted:false
                                                                SSDEEP:768:OMlp3fx2wk8DhoyLh38OHUHXgx0TYk5GfWfOo1LxF/cQ:OMlpvx20FNUHXgGTYytfVLxFb
                                                                MD5:E399CDA9A9518D9C69153CCB6D511F8A
                                                                SHA1:8F0FD4318E32A1D6A1C94AD9887C510E80AC9AA3
                                                                SHA-256:C94E6C2175097758C67D8524CBE72206683641E58D7A9A73A8A36B4AF1D53D3B
                                                                SHA-512:F0DC07C8ECEB2F27CE9D16304B3C2EF50F81CA6822271E659EDD0159E3A64FD4F5FA5D08A7082720B0199EF1C6E1B7E6512B11FB326A0B5A56815F870E75D465
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E<.B.]...]...]..&....]..&....]..&...C]..w....]...]..X]..&....]..&....]..&....]..&....]..Rich.]..........PE..d....6.Q.........." .....r...b...............................................0..............................................................d...d............................ ..........................................................h............................text...~q.......r.................. ..`.rdata...(.......*...v..............@..@.data....!..........................@....pdata..............................@..@ve_share4...........................@....rsrc...............................@..@.reloc..\.... ......................@..B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):70598
                                                                Entropy (8bit):5.27556266441527
                                                                Encrypted:false
                                                                SSDEEP:1536:C+Sg9oMF5bqgRePiHyYelXevOzWAPehIt2uhZD:C49oI5bqliHyYcudAPehIt2Q5
                                                                MD5:6F346D712C867CF942D6B599ADB61081
                                                                SHA1:24D942DFC2D0C7256C50B80204BB30F0D98B887A
                                                                SHA-256:72E6C8DD77FA7E10A7B05EF6C3E21D3F7E4147301B0BF6E416B2D33D4E19A9C3
                                                                SHA-512:1F95A211D5DD3E58D4E2682F6BF2C5380B230E9907E2882097B77B99520CD2C788F43AD2ABCCE617DD8DED0043E4EF1C8B6E083C44688B23109868E6CDD2364C
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ZWH....X......!...8.d...&......`.............Hb.........................p......H+........ .........................................d............................................................................................................text....b.......d.................. ..`.data...D............h..............@....rdata...............j..............@..@.bss....`................................edata...............l..............@..@.idata...............|..............@....rsrc...d...........................@....reloc..............................@..B/4...... .............................../19.....U.............................../35...................................../47.....!.... ........................../61..........0........................../73.....4....@........................../86..........P........................../97.....h....`..........
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):170496
                                                                Entropy (8bit):6.106350948348404
                                                                Encrypted:false
                                                                SSDEEP:3072:4o/xbk9GvULHHu4SnwRVzXH75xcvvvWzpN:Fxg9/uls7fcvvvwp
                                                                MD5:E14075E1E6DE40EDFF919368DE072234
                                                                SHA1:289BF827E2C2D070BD0D919CF04284B29F34BD1C
                                                                SHA-256:2A596EDC9B4400CB1D494C0C6FD63253F74FFA2CB1CC7690A45205219AFBFF69
                                                                SHA-512:6D00C632C671917DB6D433C38C4589544AB380CA84779D706662ACC37A9144F5F03C81A87F3394CA5136BF18FBBB8745251695CD76DE84D2C2B77A7F4001464F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........JU.$..$..$.u....$.....$....M.$......$..}_..$..%...$.....$.....$.....$.Rich.$.........................PE..L.....DZ...........!...............................................................>.....@.........................0"..........x......................................................................@............................................text...%........................... ..`.rdata...s.......t..................@..@.data...D{...0...`..................@....rsrc................r..............@..@.reloc..V$.......&...t..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36931
                                                                Entropy (8bit):4.264495375774686
                                                                Encrypted:false
                                                                SSDEEP:768:J2VMCksOwdrmlbeAGk41qCDubRsHYjx3tUvPcha/I:iFv+tzts4jNtUvPchyI
                                                                MD5:FF243859F3548636AA2963B919FA6E72
                                                                SHA1:781F3BF5B0F4D8C6D1F6DA1B27A373D6DF9A474F
                                                                SHA-256:B8B07BDC4AD631076BF865A7B076CF09B9B0B0CDFDF37D423BF9D6F5FF6DAB3D
                                                                SHA-512:93C9FF2AEE4070D7111A235C020022F68754313BBEC8117AF77EE11CBF56E0897172E0C258E272D3CEA15E3BFE162BBB3D55257B1612CE74BA47BCC04EEB9C6B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.u.7...7...7...7...4...U...3.......6......3...7...j......1.......6......1...Rich7...................PE..L.....'U...........!.....@...P.......G.......P......................................................................pY..#....U..x.......X.......................t....Q...............................................P...............................text...";.......@.................. ..`.rdata.......P.......P..............@..@.data...,....`.......`..............@....rsrc...X............p..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):103438
                                                                Entropy (8bit):6.451459241635566
                                                                Encrypted:false
                                                                SSDEEP:3072:3xSmkPMjmRj0RqKgBUmLDkw+OCocHNMs8LJ:BSmk8mx04EtMs2
                                                                MD5:75135E7BB53A99DF134A049457637AF8
                                                                SHA1:C06D0C49457F3FFA6C077C6AD774BD264038B1D3
                                                                SHA-256:A3565FCCDF1D74ABBAF7AA5A095D8BB20567DB55B76303FDD6CE4B2143C37951
                                                                SHA-512:4E2C516CC8DF26DC541CA4DB9B0803B72CE4D84A0BF75595431BA6808413F0D64A94DE00A61B50DB5B2B8EBE5F59F09880993BA0DE8EEECFEFD75C8EDEE0AA26
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.2[...........#................`........0....|p.........................0............@... .........................$...............l.................... ......................................................X................................text...............................`.P`.data...<....0......................@.P..rdata...6...@...8..................@.`@.rodata..............T..............@.`@/4.......!......."...V..............@.0@.bss..................................`..edata..$............x..............@.0@.idata...............|..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...l...........................@.0..reloc....... ......................@.0B................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):28672
                                                                Entropy (8bit):3.6440630653513795
                                                                Encrypted:false
                                                                SSDEEP:192:h7kY3pPkw9Bpj8srMkzQuR7awElf+cn4G5ey4SyJRQ0jwO44lwib6w0gEGD+NS:DMwSEzdaw0tnfqyowJ4lwi2UEG
                                                                MD5:62400F82750F17936091B90863A59566
                                                                SHA1:D304408B4FDBDB99B6D03DB848EC2B9210EB90C8
                                                                SHA-256:E06668D58414F436C498A2278CB067AD4BAA22735C223509DBF851ECBD6FE645
                                                                SHA-512:ADC57BB638397F5A565B5CED5A0E6F47C855EB50C2498FB527C7D15B74AF34A14A0D4E4E8B709151A988A350311C5B488D0022540979B423B494D58714826B58
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........G..&..&..&.U...&..9..&..&..&..9..&..9..&..:..&..9..&..9..&.....&..&..&.....&.H ..&.p...&.Rich.&.................PE..L....%rS...........!..... ...P.......,.......0......................................................................p:......(7.......`.. ....................p.......................................................0..\............................text............ .................. ..`.rdata.......0.......0..............@..@.data...L....@.......@..............@....rsrc... ....`.......P..............@..@.reloc.......p.......`..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):257024
                                                                Entropy (8bit):6.188312331763729
                                                                Encrypted:false
                                                                SSDEEP:6144:gjdRIa917/l0Aw2Qf2jmCJYBYjn6hKn3kcaZ:gj7/lpwZOjmCJYonWZ
                                                                MD5:F258AC2BD27DA86FE911F2E7414D7CA8
                                                                SHA1:8A1CC7D65A5192B9233E0EC46123A2F209E64B1E
                                                                SHA-256:0C5AC6846D86A8FBCF1E4327195881D510E7C4C4D86F7E75E0C8762415F86DB9
                                                                SHA-512:2F786F5328117E685AFBDEA193BA1E075F17CF5CFFBEFBC2D6D25393DE834890076063A9CB4BC37B0E56625BBE9C155317FF21031B68DA8CEABA40AF03203FAD
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......@+.,.J...J...J..#....J..#....J...J..2H...2B..J...2T..J...2S.yJ....A..J....S..J...2]..J...2E..J....C..J...2F..J..Rich.J..................PE..L......Z...........!.........f.......f.......................................P......K2....@..........................;..l...8...........(/.......................)......................................@...............|.......@....................text............................... ..`.rdata..\...........................@..@.data...x_...@...$...$..............@....rsrc...(/.......0...H..............@..@.reloc..Lr.......t...x..............@..B................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):710426
                                                                Entropy (8bit):6.472191768138159
                                                                Encrypted:false
                                                                SSDEEP:12288:q0QfKb+GlrPj37VzHEA6Yd2qKvJ4wyyrNQIRZCGkKLch/bcXExy4P:qfKb+GlrPj37VzHEA6B3vDaCCGkF/bcc
                                                                MD5:192C8E6CE2BE9654E76962992BFD6CF7
                                                                SHA1:455161093A42E611574A4B19994250BD664D084A
                                                                SHA-256:50014C3C9131D818BB3105B65A4FCFEF85873C966644F781481079194ACCD075
                                                                SHA-512:81B6B073A3119CA81071AE8D43A0EE9FD6C43E6EDDA2FD0B094A96CDED2E312DE1F62C343E0D6E11922101D2650A07B37C51D1618A843C1E6F5E3AA9821E2A25
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................0..........0=.......@....@..............................................@...............................%...`...@..........................................................................................................CODE....h/.......0.................. ..`DATA....@....@.......4..............@...BSS..........`.......F...................idata...%.......&...F..............@....tls.................l...................rdata...............l..............@..P.reloc.............................@..P.rsrc....@...`...@...n..............@..P.....................6..............@..P........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):334350
                                                                Entropy (8bit):6.476941251422441
                                                                Encrypted:false
                                                                SSDEEP:6144:6RXFp5Ik38GxNMHOfdCWBTjpmD/CiPTiD9w/U5XsdPVrHB5HrvQSFYd:Yp593DxamdBibxFYd
                                                                MD5:9ECE73CA6C29378BB33146D90408CC47
                                                                SHA1:5DAE13BA39EF8DC323CBCD8F39D119B4615FD541
                                                                SHA-256:793D7AA16585FF581F757546EDAB36380632A1C1812C51A1185AA89387963AAA
                                                                SHA-512:F2AACF2862D26F42266600C7C763847F6E45995CDD49F8A18DC0D3F1A7771821272C6CAFAAFE9C0C908CE09FE50A5CABCFC7E8EFFF73FFD1EE34246AC379E13F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...;.2[...........#................`..............f......................................@... ..........................3...@.......p..L....................................................`......................\B...............................text...t...........................`.P`.data...............................@.`..rdata..............................@.`@/4......(s...p...t...F..............@.0@.bss....@.............................`..edata...3.......4..................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...L....p......................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):707072
                                                                Entropy (8bit):6.206491339823504
                                                                Encrypted:false
                                                                SSDEEP:12288:8jYr3vhpHQE6B+sU+SVZ+LFWf1C6NGZVmVRfqb4tr3xY:8jgpDV+YZ+LF9UVRfqY6
                                                                MD5:C2D89C0BA1D3616B03191E4CE5FC96E3
                                                                SHA1:CD485AEA151D99D8170E32608C1BBDA5B7B920B5
                                                                SHA-256:AC26AEFC4BBAA15EFB2EFFE81B7BDDD796609256E87679339E5F8E2AE9A271CF
                                                                SHA-512:AA5F6832021A20104C3E966F2C4C28538EBE0218DFF4CEAA80D4B70232CD5F6607A8A52CEEC35A1FC227DE35ABDF7A7E31E56263986B7F114D29F25FCDA00B81
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m...t...t...t.......t.......t...u...t..t..t..t....t..t...t..^..t..t....t..t..t..^..t..t..t.Rich..t.................PE..L....D.]...........!................-........................................0.......|....@..........................w.......b................................... ..................................H;..@....................b..@....................text...k........................... ..`.rdata...x.......z..................@..@.data....Z....... ...n..............@....rsrc...............................@..@.reloc...p.......r...X..............@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):502798
                                                                Entropy (8bit):6.518579223762868
                                                                Encrypted:false
                                                                SSDEEP:6144:ptzLXexEuVq48FRnGiRnJiyn1ipwdw1IXWAqBXkNZdNqSwA7YOl0+ajnzrEUTZkI:p0wdw1IXWAqBXkNZqSFlJaj0Q5gc3
                                                                MD5:1B236618E8F5A0BE415C5D2543057208
                                                                SHA1:5C325931FFCBA70FF799D58E0A892DCC7858E2A3
                                                                SHA-256:67E725889C8053E39A2E440A669766643AC08E1EE6900A114DB423A6206F10EE
                                                                SHA-512:33EBD8A38DE97649D74BFDB413240A2A0CAFFD62B8C41EE206AF7FB9317B646348375905D5D7A591A13B266BC66D862E459CDC4B659ED8958D96A518B9A9C636
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:.2[...........#................`..............j................................e.....@... ......................@.."....P..8.......\....................................................p......................LQ...............................text...d...........................`.P`.data...<...........................@.P..rdata...-..........................@.`@.rodata.@...........................@.P@/4......L...........................@.0@.bss..................................`..edata.."....@.......x..............@.0@.idata..8....P.......~..............@.0..CRT....,....`......................@.0..tls.... ....p......................@.0..rsrc...\...........................@.0..reloc..............................@.0B................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):164366
                                                                Entropy (8bit):6.285599258858671
                                                                Encrypted:false
                                                                SSDEEP:3072:nxxxxRxRw6e3LDM1xaa6aa66oSFniTmeU9EgBMtCkKM89+PmN2DT:nxxxxRxRw6eUxaa6aa66oS8ZU9EPtCMD
                                                                MD5:AC8DEB67AA83178FF73A9DA6FC93F91C
                                                                SHA1:4EE6B2ABC8503E3B672CB2A0C7ABD0F75F79C5D5
                                                                SHA-256:02060FF03FC054028BAD0028D5401A3A82F07FAE29C9DF092EB7B84C02F3BD68
                                                                SHA-512:639A8A569573C1BC815D7A14AD9419E0EEAC7B857E72E127C0030808CFD514C506750F033F1D80417C75B39D41680AEBE04A3DF2610EBE4D84C87A7F27CA2279
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....,P...........#.....H...~......`........`.....m.......................................... ......................................................................................................................................................text...TG.......H..................`.P`.data........`.......L..............@.0..rdata.......p.......N..............@.`@/4......P............b..............@.0@.bss..................................`..edata...............p..............@.0@.idata...............r..............@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc...............|..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):371200
                                                                Entropy (8bit):6.426535807098075
                                                                Encrypted:false
                                                                SSDEEP:6144:3xLKtTtx9C3XSnuNFOFyso3R/cUnpCYQJmY62FTBqRAON7w:f3CuNn7BJCYQ9TsRQ
                                                                MD5:77DB62270B198C2ACBC463E3F1F0B982
                                                                SHA1:EE293FEFD9C439B01F4B0584A4816D2EC86221BD
                                                                SHA-256:ECB3C629A4C97D83DCE819E0D4B211055BE55EFF3444CF28A2564B3F0669FCFF
                                                                SHA-512:64E153891D1C636B25804404680B13E8A1F3A33CB4C41A92AF6363DECA7C1D4E779933556A1EB97D55B15A6BA500F102C09E4480CC5B7C91BB284E735AFE8132
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1P..u1..u1..u1..R...r1..R...`1..u1...0..|In.S1..|Ix..1..|I...1..kc..v1..|Iq.v1..|Ii.t1..kco.t1..|Ij.t1..Richu1..........PE..L....).Y...........!................................................................SE....@.........................0...F............`..........................<)..`..................................@...................l...@....................text............................... ..`.rdata..v...........................@..@.data...<].......$..................@....rsrc........`...0..................@..@.reloc...u.......v...4..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):45056
                                                                Entropy (8bit):4.21823111580972
                                                                Encrypted:false
                                                                SSDEEP:384:W6E5etE/YrPfUMH+R/6NNzRUOI0havjIAGRdqMKHWjFYeOphngA9iHy2J0+:WpI+/QfU3N6NNR/atUfid9iHyY0+
                                                                MD5:54AEDDC619EED2FAEEE9533D58F778B9
                                                                SHA1:CA9D723B87E0C688450B34F2A606C957391FBBF4
                                                                SHA-256:EE15E6E3F82C48461EB638C1EA11019AE9E3E303E067E879115C6272139026E7
                                                                SHA-512:7CEC39F32804109B3D502027D1EC42A594C1E4A2D93512195C60BD41AAD7E32A8B0EB21A0EE859FECB403EE939EEBC4608D9D27A4002B8C282DE32F696136506
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........2.].\.].\.].\..R._.\.].].k.\.?.O.X.\...V.X.\..Z.\.\...X.^.\.Rich].\.................PE..L...1..O...........!.....P...P.......T.......`.......................................................................e.......`..P.......p.......................l....................................................`...............................text...xE.......P.................. ..`.rdata..G....`... ...`..............@..@.data...............................@....rsrc...p...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):851
                                                                Entropy (8bit):5.0869947237388375
                                                                Encrypted:false
                                                                SSDEEP:24:qPnRuV4MPgicifznCCgIdIcfzWCCgIdITl:MRuqS5CCgIdIMFCgIdITl
                                                                MD5:EE45F127C55EF85DDFCA0F7A0087240B
                                                                SHA1:9647DD4A6EB34AD4324C582F5108EDB80228C42F
                                                                SHA-256:EA9A5CF003E5CC55AB8F2AA81C38646648F4ACB71FA408ACE428CE0144CEFAF4
                                                                SHA-512:543361602177A99B32B23B7EB0E1CDA79AB4D77C9F2E64EA7A1F80216F488E7461E8663FDA28381BC4D337C1983EEF8005951DFBD05A006AFDFF11D7F7F55D62
                                                                Malicious:false
                                                                Preview:<?xml version='1.0' encoding='UTF-8' standalone='yes'?>..<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">.. <security>.. <requestedPrivileges>.. <requestedExecutionLevel level='asInvoker' uiAccess='false' />.. </requestedPrivileges>.. </security>.. </trustInfo>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type='win32' name='Microsoft.VC90.CRT' version='9.0.21022.8' processorArchitecture='x86' publicKeyToken='1fc8b3b9a1e18e3b' />.. </dependentAssembly>.. </dependency>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type='win32' name='Microsoft.VC90.MFC' version='9.0.21022.8' processorArchitecture='x86' publicKeyToken='1fc8b3b9a1e18e3b' />.. </dependentAssembly>.. </dependency>..</assembly>..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:ISO-8859 text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):691
                                                                Entropy (8bit):4.123292651950357
                                                                Encrypted:false
                                                                SSDEEP:12:hnHT/W+qV9LRa5IGnH17fOV98EaOcXnHXUp7fOV9kjRaxnHifOV9BHavnHM4iVUq:hnz+f9oVnVzK984cXnuzK9kjcnIK9Qnu
                                                                MD5:CD7B70EF111EDC855756233899FC201E
                                                                SHA1:DC3DA2E402E4F503F40A7266D737B96A73F771C7
                                                                SHA-256:480A7DC890285A51BA785432AA00747CA7B5F207E48A2AED8DE4D53FB99EF26E
                                                                SHA-512:5B0C04A71B3F18685CA3518754B44147004AE73F829AB2012B5CF0CAB5318AE6B5EB9FB4D43D6BCE2248912C026D55C6A8B17D89A2A5FEC8F374A07C04893363
                                                                Malicious:false
                                                                Preview://......[HD]..VideoBitrate = 6000..Fps = 30..Sample = 44100..AudioBitrate = 128 ..Channel = 2....//......[High]..VideoBitrate = 3000..Fps = 24..Sample = 44100..AudioBitrate = 96 ..Channel = 2....//......[Medium]..VideoBitrate = 2000..Fps = 24..Sample = 44100..AudioBitrate = 64 ..Channel = 2....//.....[Standard]..VideoBitrate = 1500..Fps = 24..Sample = 44100..AudioBitrate = 32 ..Channel = 2....//.....[Lower]..VideoBitrate = 1000..Fps = 15..Sample = 22050..AudioBitrate = 16..Channel = 1
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):157696
                                                                Entropy (8bit):6.588815894817083
                                                                Encrypted:false
                                                                SSDEEP:3072:4vgQzfb7Tam/UofCMs9B3a87Kw2PgDaqa75nW0B6bS:qg+fOm/2MsX7qWF
                                                                MD5:0C25DE9D7007B3810934B92D708CFDF0
                                                                SHA1:311866DD1D3E61DFAB7B4B43114EB2BDC76B57BB
                                                                SHA-256:464709B85BE4E48B19821B967C600B7CCD51AAF013C53504B349B6B424933675
                                                                SHA-512:AFE9401D3F0E1D4D779D1563EE0295B17088C85B980A46729D3BF16683F8CB25D65E96EB0B6E183266B65CCEDE37246E04CB093D03FEE965180C583E5DB0C819
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........E.$..$..$..\..$..\..$..\...$.....$..$..r$..\..$..\..$..v..$..\..$..Rich.$..........................PE..L......\...........!.................................................................q....@.........................P................`..X7......................p...................................P...@............................................text............................... ..`.rdata...[.......\..................@..@.data...hK..........................@....rsrc...X7...`...8..................@..@.reloc..` ......."...F..............@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):67584
                                                                Entropy (8bit):6.357541095717686
                                                                Encrypted:false
                                                                SSDEEP:1536:KVqiEnH9RGX9xXLUWB1GOlb3MvH4xK+RRlm9A:isGX3Vwwbc6Rlm9A
                                                                MD5:86A1311D51C00B278CB7F27796EA442E
                                                                SHA1:AC08AC9D08F8F5380E2A9A65F4117862AA861A19
                                                                SHA-256:E916BDF232744E00CBD8D608168A019C9F41A68A7E8390AA48CFB525276C483D
                                                                SHA-512:129E4B8DD2665BCFC5E72B4585343C51127B5D027DBB0234291E7A197BAECA1BAB5ED074E65E5E8C969EE01F9F65CC52C9993037416DE9BFFF2F872E5AEBA7EC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................<......0.............@..........................`.......................................................@....................... ..h...................................................................................CODE....\........................... ..`DATA....h...........................@...BSS......................................idata..............................@....edata..............................@..P.reloc..h.... ......................@..P.rsrc........@......................@..P.............`......................@..P................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):221696
                                                                Entropy (8bit):6.044861431828742
                                                                Encrypted:false
                                                                SSDEEP:6144:oy6EiahKdODexmbUwTiTy8CfJMtoupgmRc:oyTYsTiTy8SJMtPF
                                                                MD5:A142AE884D8D6B0BB9FAC780087E2934
                                                                SHA1:7161A8467A6CF4AC9EF82223F44D2D1DD814F575
                                                                SHA-256:B134D81F09281112E4AD8A3FD9702A6434489D82282F8A4835E59739BCC60F7B
                                                                SHA-512:5986645BAAAE04C4FFA6E26D552A89A48513F3BDF8B02AAE3F8ECD8C175B16C77C8BC80523D9EE6C67DF8133E0B8EE86A1BEE666DD5F4710E922C226BF939349
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6.OW..OW..OW..h...GW..h...XW..OW..FU..F/..WW..F/...W..F/..5W..Q...LW..F/..JW..F/..NW..Q...NW..F/..NW..RichOW..........PE..L...@W.Q...........!.........N............... ............................................@.........................P........................................@..l#...$...............................e..@............ ......0...@....................text...;........................... ..`.rdata...... ......................@..@.data...8]......."..................@....rsrc............0..................@..@.reloc..rp...@...r..................@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36864
                                                                Entropy (8bit):6.09448972504833
                                                                Encrypted:false
                                                                SSDEEP:384:/33MgxjUjNrZ/6CCj6TLdLn5xv2ZdV3bdAf6zAC2ACc4dFukNLOtuh1Sg2L:fMgxohrZ///vYdV3bGE74dcIOtg2L
                                                                MD5:5828961B2978F3457740770F6F07AE2E
                                                                SHA1:9D04736ABD68DDDB7BD4EA115E4B7FE2BAEF1B0A
                                                                SHA-256:7612D408EF46256D2B4E85FFB6EFEACF0C2BE2C1E96EE90A3B6FAF525BE80C4E
                                                                SHA-512:5510E9EC3678D2FA4BA3D0928BB674CF88C9464818DA51D06194DE4BA9C3A4E052A9BE4CC7EDB9E5B0E430364122117A069ABB1BBE216A4682274392650EC8DF
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........|.d./.d./.d./.+t/.d./..w/.d./..a/.d./..f/.d./..q/.d./.../.d./.../.d./.d./.d./..h/.d./..p/.d./..s/.d./Rich.d./................PE..L....._...........!.....N...>.......T.......`......................................z.....@.........................@...g....z......................................................................Xw..@............`...............................text...gM.......N.................. ..`.rdata...1...`...2...R..............@..@.data...0...........................@....rsrc...............................@..@.reloc..^...........................@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):2565120
                                                                Entropy (8bit):6.743990298987904
                                                                Encrypted:false
                                                                SSDEEP:49152:gBCeezHk9xf76j9r750ZVA09v0ybQMBEsvjlmB7fRn6:BEzcyZVZ9v0yUKvjlmT
                                                                MD5:F6F0065F11489BD75C91FECE80F36BAC
                                                                SHA1:F51103DE4D549CB020058EBE993C5580BF10E7A9
                                                                SHA-256:B8F038D9795F4E4510B35A8BA39C6C5F46481EFE9BE26D29FF05F5B571BA9F3F
                                                                SHA-512:9EFB10E75B934B1E0EEAACE9F4A9AB7198B73A203481646C1867DCC8ED3F6D5EEC7ED56D02E99EC6FBC7945319F5D760677DF2B68840B9CD77F892A27B85DA47
                                                                Malicious:false
                                                                Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....,.L..........'......."..........."......."...@...........................'......j'.....................................t.".......#..............................................................................."..............................text.....".......".................`....rdata..|<...."..>....".............@..@.data....... #..0....#.............@....rsrc.........#......8#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):45056
                                                                Entropy (8bit):4.068445105760994
                                                                Encrypted:false
                                                                SSDEEP:384:Hyl3eok/STRXEPI4yHNpFrSHY537Fs0sHx3jyAo99jzunIPknttyJzzZ2noC:Sl3U6TRXOr0sHY53GFjs99jzenttEtJ
                                                                MD5:6BA61053DC82AD14DFFEB110771266D1
                                                                SHA1:D0B44272B9C7109E359ED5F64EF3537EBA092786
                                                                SHA-256:5E6AFF4AE3987023B06ED3936C7608F758E3E826DB11A1DA5A5E8EDF0107E023
                                                                SHA-512:CF590BBD0965C74C71F4713EF7972FF7E52CCB40411BDD0500E34EAFF6894A7C659C7E8033EB4E4BA056CA565595A73D300A62CDDCF6007F4471CB05D3E6240F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r..6..6..6....."............3..6..p.....5....7..Rich6..........PE..L....4BM...........!.....P...`......Y........`......................................................................@k...... f..<...............................D....................................................`...............................text....@.......P.................. ..`.rdata.......`.......`..............@..@.data...@1...p...0...p..............@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):89102
                                                                Entropy (8bit):6.433101399482147
                                                                Encrypted:false
                                                                SSDEEP:1536:U2Vt7zQkCgHY99TMa8OrZducFOOF0vBKec1:UGFQkCgHYCOr/utG
                                                                MD5:41465204A0947156F06267FD609A406D
                                                                SHA1:B278E36DE90DAA44F3408DBB00B0D80169677FBF
                                                                SHA-256:8554AA62925EFD12B0773D078FFED55F2B285E737A48F604C3E9C535D74636BB
                                                                SHA-512:6D4F6EECF9CCFE65E9BBF67FF876C2E152ED254B831D00923B4658DED42F3103220E19EDA4083933F02178A08084D96CC694024AAEE66F59C48BA5E1ABBA7735
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1.2[.\.........#.........X......`..............o................................3O....@... ......................p..q.......h.......d.......................`....................................................................................text...t...........................`.P`.data...............................@.`..rdata..$|.......~..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..q....p.......0..............@.0@.idata..h............4..............@.0..CRT....,............J..............@.0..tls.... ............L..............@.0..rsrc...d............N..............@.0..reloc..`............R..............@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):68608
                                                                Entropy (8bit):6.447992421693984
                                                                Encrypted:false
                                                                SSDEEP:768:M+qgK9p/K0fUyeAEBqCRUpJosqKXeHd5Fkv6pxh4WgfskSnChTe1QsHj5dBcjkTX:M+/KX/ZeTb0uHd5FigxhcfskSj75I92
                                                                MD5:D5F9F42D8F864A9021C6BEA8E12074AD
                                                                SHA1:7D326672F2C15A78EFF890534D7BF28DFADDBD45
                                                                SHA-256:8B5D9098E881F00E18C94FF2AB30945429207F7D849B49DD5462E23401A57ABB
                                                                SHA-512:03087777BB0FA7B7AE811360F747A3B8A5DF3D201A553C6260F0E9D6A6C7F34321C8F99B046C34CA660B24CC89BD0AD162D356BEAD67C0CEF62504F3E1F8FA87
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........\.o.\.o.\.o.U...O.o.U...1.o..k.V.o.{,.._.o.\.n.9.o.U...~.o.U...].o.U...].o.Rich\.o.................PE..L...jT.\...........!.........H...............................................P......]w..............................`...L............0.......................@..........................................@...............p............................text............................... ..`.rdata...".......$..................@..@.data....-..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
                                                                Category:dropped
                                                                Size (bytes):69166
                                                                Entropy (8bit):7.329060163500274
                                                                Encrypted:false
                                                                SSDEEP:1536:dFOWzH8eklX5ALvJwBuHEXNAewSUnX4wEpNkub9mjuZ8yPKOCj9p5Zn3Ii:fm7A7GFdzkX41p+ucI7Kpn3f
                                                                MD5:F61EC1668464115772F8FA2FD562A70D
                                                                SHA1:5A8A4BE4C84B77EBEF3B2AA65A8814D04E2ADA2B
                                                                SHA-256:3A56C607D4BB495A6477D94A9E6ECD7A37BA50E0D1DDF287768633F8B274DD71
                                                                SHA-512:EE560A3CF171C2CF01395FA7D8FE0F4CB1AC2AC10C26CE47EAD7B01D54E6C04DE2FA749C7A41433AB67EDE74000450D28D32C17316E81831946119CFB92F9C91
                                                                Malicious:false
                                                                Preview:RIFF&...WAVEfmt ........D.............data..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):686080
                                                                Entropy (8bit):6.599346864475418
                                                                Encrypted:false
                                                                SSDEEP:12288:Ou/F+MoQxHSbb6lQIrvw7A87cNzqmYWmQ+uYI0qV+h2uCpmL:prxybb6l9zw79GzqjWmQdYLqYUTs
                                                                MD5:1583338F5D055CD5B4EA5677B2CCFF6E
                                                                SHA1:2335761BD200D0008CB041EB3D7D4860E9E421E9
                                                                SHA-256:C1F8E9F30A5BF7CA4A0F2F1F60FFD97A0F49F65448BF5B6B4BBDBC8A263A321F
                                                                SHA-512:8A44820050D955D1401EF7B912AC4B86FCF5839FC2A64C1AE4CC8AC1A3FE9BB1AA1FA6063DF863D3DC2A1D0804451F6FCAC4F188390D5A27A68891273BBED957
                                                                Malicious:true
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................n............... ....@..............................................................................-.......f......................|...................................................T................................text............................... ..`.itext.............................. ..`.data...@-... ......................@....bss.....D...P.......8...................idata...-...........8..............@....edata...............f..............@..@.reloc..|............j..............@..B.rsrc....f.......f..................@..@.....................x..............@..@........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):192512
                                                                Entropy (8bit):6.24460502377909
                                                                Encrypted:false
                                                                SSDEEP:3072:qHKVfLsXRDEBmJ3pmjc2wjo8PaqJSreQ6i9:1VgXyBmJ3gjc20o8yqsr96i
                                                                MD5:9CD220AF0338B8BBD8FB63205C259018
                                                                SHA1:D687A1E58781D7B5F5983D48457720AFEDC8D8DD
                                                                SHA-256:9B71083991EA70D126EB773658EEFD489E950350BFA26B9EE1E899FE4CAA5DBA
                                                                SHA-512:C1218CE655B16F2B7FFD311D7C7C14C61FA1C0E2F8C0A4AD0A4F64843EEA711BF26495B4EFCA4E25803010106FB2703E04273F26B6F6E055DE91AE07FED03776
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............................~...............................:........Rich..........................PE..L....z.J...........!......................... ......................................................................P&.......#..P....P..X............................................................................ ..P............................text...V........................... ..`.rdata....... ....... ..............@..@.data........0.......0..............@....rsrc...X....P.......@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):164366
                                                                Entropy (8bit):6.285599258858671
                                                                Encrypted:false
                                                                SSDEEP:3072:nxxxxRxRw6e3LDM1xaa6aa66oSFniTmeU9EgBMtCkKM89+PmN2DT:nxxxxRxRw6eUxaa6aa66oS8ZU9EPtCMD
                                                                MD5:AC8DEB67AA83178FF73A9DA6FC93F91C
                                                                SHA1:4EE6B2ABC8503E3B672CB2A0C7ABD0F75F79C5D5
                                                                SHA-256:02060FF03FC054028BAD0028D5401A3A82F07FAE29C9DF092EB7B84C02F3BD68
                                                                SHA-512:639A8A569573C1BC815D7A14AD9419E0EEAC7B857E72E127C0030808CFD514C506750F033F1D80417C75B39D41680AEBE04A3DF2610EBE4D84C87A7F27CA2279
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....,P...........#.....H...~......`........`.....m.......................................... ......................................................................................................................................................text...TG.......H..................`.P`.data........`.......L..............@.0..rdata.......p.......N..............@.`@/4......P............b..............@.0@.bss..................................`..edata...............p..............@.0@.idata...............r..............@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc...............|..............@.0B................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):189966
                                                                Entropy (8bit):6.281703857040552
                                                                Encrypted:false
                                                                SSDEEP:3072:exxxxRxRw6vxxxxRxRw6RsP4aa6aa663cQexwaa6aa663s2Wm548/+lr74angtFa:exxxxRxRw6vxxxxRxRw604aa6aa663cq
                                                                MD5:06EE1D0F5A60783DE0846466B95CF758
                                                                SHA1:0A82AAADD658B8EB4807F61447CAEECF1050CB1C
                                                                SHA-256:C0E8BEC9F8178F73C20A76B26D206FB79AD3112C3A78D3380CC8A661493B28C1
                                                                SHA-512:0E15D7A6833A8C2D77583ACB0CC28332D27371169F4E3E03B1CBB1D9C0F290B78D9CD3F5014522764758EDCF9B9392E50885E4C341A3832F49CBB9E3CB658D6E
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...7.2[...........#................`..............j.........................p.......,....@... .........................K.... .......P..`....................`..L............................@......................$!...............................text...............................`.P`.data...............................@.0..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata..K...........................@.0@.idata....... ......................@.0..CRT....,....0......................@.0..tls.... ....@......................@.0..rsrc...`....P......................@.0..reloc..L....`......................@.0B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):70598
                                                                Entropy (8bit):5.27556266441527
                                                                Encrypted:false
                                                                SSDEEP:1536:C+Sg9oMF5bqgRePiHyYelXevOzWAPehIt2uhZD:C49oI5bqliHyYcudAPehIt2Q5
                                                                MD5:6F346D712C867CF942D6B599ADB61081
                                                                SHA1:24D942DFC2D0C7256C50B80204BB30F0D98B887A
                                                                SHA-256:72E6C8DD77FA7E10A7B05EF6C3E21D3F7E4147301B0BF6E416B2D33D4E19A9C3
                                                                SHA-512:1F95A211D5DD3E58D4E2682F6BF2C5380B230E9907E2882097B77B99520CD2C788F43AD2ABCCE617DD8DED0043E4EF1C8B6E083C44688B23109868E6CDD2364C
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ZWH....X......!...8.d...&......`.............Hb.........................p......H+........ .........................................d............................................................................................................text....b.......d.................. ..`.data...D............h..............@....rdata...............j..............@..@.bss....`................................edata...............l..............@..@.idata...............|..............@....rsrc...d...........................@....reloc..............................@..B/4...... .............................../19.....U.............................../35...................................../47.....!.... ........................../61..........0........................../73.....4....@........................../86..........P........................../97.....h....`..........
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):45056
                                                                Entropy (8bit):4.21823111580972
                                                                Encrypted:false
                                                                SSDEEP:384:W6E5etE/YrPfUMH+R/6NNzRUOI0havjIAGRdqMKHWjFYeOphngA9iHy2J0+:WpI+/QfU3N6NNR/atUfid9iHyY0+
                                                                MD5:54AEDDC619EED2FAEEE9533D58F778B9
                                                                SHA1:CA9D723B87E0C688450B34F2A606C957391FBBF4
                                                                SHA-256:EE15E6E3F82C48461EB638C1EA11019AE9E3E303E067E879115C6272139026E7
                                                                SHA-512:7CEC39F32804109B3D502027D1EC42A594C1E4A2D93512195C60BD41AAD7E32A8B0EB21A0EE859FECB403EE939EEBC4608D9D27A4002B8C282DE32F696136506
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........2.].\.].\.].\..R._.\.].].k.\.?.O.X.\...V.X.\..Z.\.\...X.^.\.Rich].\.................PE..L...1..O...........!.....P...P.......T.......`.......................................................................e.......`..P.......p.......................l....................................................`...............................text...xE.......P.................. ..`.rdata..G....`... ...`..............@..@.data...............................@....rsrc...p...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):103438
                                                                Entropy (8bit):6.451459241635566
                                                                Encrypted:false
                                                                SSDEEP:3072:3xSmkPMjmRj0RqKgBUmLDkw+OCocHNMs8LJ:BSmk8mx04EtMs2
                                                                MD5:75135E7BB53A99DF134A049457637AF8
                                                                SHA1:C06D0C49457F3FFA6C077C6AD774BD264038B1D3
                                                                SHA-256:A3565FCCDF1D74ABBAF7AA5A095D8BB20567DB55B76303FDD6CE4B2143C37951
                                                                SHA-512:4E2C516CC8DF26DC541CA4DB9B0803B72CE4D84A0BF75595431BA6808413F0D64A94DE00A61B50DB5B2B8EBE5F59F09880993BA0DE8EEECFEFD75C8EDEE0AA26
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.2[...........#................`........0....|p.........................0............@... .........................$...............l.................... ......................................................X................................text...............................`.P`.data...<....0......................@.P..rdata...6...@...8..................@.`@.rodata..............T..............@.`@/4.......!......."...V..............@.0@.bss..................................`..edata..$............x..............@.0@.idata...............|..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...l...........................@.0..reloc....... ......................@.0B................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):502798
                                                                Entropy (8bit):6.518579223762868
                                                                Encrypted:false
                                                                SSDEEP:6144:ptzLXexEuVq48FRnGiRnJiyn1ipwdw1IXWAqBXkNZdNqSwA7YOl0+ajnzrEUTZkI:p0wdw1IXWAqBXkNZqSFlJaj0Q5gc3
                                                                MD5:1B236618E8F5A0BE415C5D2543057208
                                                                SHA1:5C325931FFCBA70FF799D58E0A892DCC7858E2A3
                                                                SHA-256:67E725889C8053E39A2E440A669766643AC08E1EE6900A114DB423A6206F10EE
                                                                SHA-512:33EBD8A38DE97649D74BFDB413240A2A0CAFFD62B8C41EE206AF7FB9317B646348375905D5D7A591A13B266BC66D862E459CDC4B659ED8958D96A518B9A9C636
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:.2[...........#................`..............j................................e.....@... ......................@.."....P..8.......\....................................................p......................LQ...............................text...d...........................`.P`.data...<...........................@.P..rdata...-..........................@.`@.rodata.@...........................@.P@/4......L...........................@.0@.bss..................................`..edata.."....@.......x..............@.0@.idata..8....P.......~..............@.0..CRT....,....`......................@.0..tls.... ....p......................@.0..rsrc...\...........................@.0..reloc..............................@.0B................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:modified
                                                                Size (bytes):2565120
                                                                Entropy (8bit):6.743990559862836
                                                                Encrypted:false
                                                                SSDEEP:49152:tBCeezHk9xf76j9r750ZVA09v0ybQMBEsvjlmB7fRn6:aEzcyZVZ9v0yUKvjlmT
                                                                MD5:5FBD9E9B8796E7B4A40FD070F0F43F8E
                                                                SHA1:A8F7C0ED0A95D0DE6760C6F98805B31CED75AE79
                                                                SHA-256:028A437887E0A5A12493C3EC0A5D23C6ED182CD0E88E40F0E8180904ED6A41C1
                                                                SHA-512:02A40D5DC8044B8875F8846204D4F0C76C1BEE7E81422E0CB209BDA05C46F88E61B802520F445FABFF5DD17B9DFBD0DE82B9EE8312F5863AF3C902BF9F7C1754
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....,.L..........'......."..........."......."...@...........................'......j'.....................................t.".......#..............................................................................."..............................text.....".......".................`....rdata..|<...."..>....".............@..@.data....... #..0....#.............@....rsrc.........#......8#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:InnoSetup Log SyncPlayer, version 0x30, 7845 bytes, 980108\user, "C:\Users\user\AppData\Local\SyncPlayer 1.2.8"
                                                                Category:dropped
                                                                Size (bytes):7845
                                                                Entropy (8bit):5.027137627495333
                                                                Encrypted:false
                                                                SSDEEP:96:yUgW6nlpTli4S89N+eOIhAX7ICSss/LnpCsYKMsisLsIRFdbob3oJsiWr8k:FgW6lpTl6HIhIICSsAnJ9M
                                                                MD5:F19D9C9FEFAAD79CB8032000CF3A0B9A
                                                                SHA1:2D082D8223CE560E29C443114441D21C624599BB
                                                                SHA-256:613CED948DB25348300F6704C467F0EE5972DBD1EA2196F6ECF5E6FE7F1D367E
                                                                SHA-512:6A1409891E7D46CD8FC5AD587144BA9CDC7048CA5BB9646392337C1C4F573B7BB4FECD2177635A771A50DBC080BB28BB26F1B835BDCFB5B140037D12C216DC98
                                                                Malicious:false
                                                                Preview:Inno Setup Uninstall Log (b)....................................SyncPlayer......................................................................................................................SyncPlayer......................................................................................................................0...5.......%................................................................................................................./.........h../......M....980108.user-C:\Users\user\AppData\Local\SyncPlayer 1.2.8.............5.].. ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.dl
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):710426
                                                                Entropy (8bit):6.472191768138159
                                                                Encrypted:false
                                                                SSDEEP:12288:q0QfKb+GlrPj37VzHEA6Yd2qKvJ4wyyrNQIRZCGkKLch/bcXExy4P:qfKb+GlrPj37VzHEA6B3vDaCCGkF/bcc
                                                                MD5:192C8E6CE2BE9654E76962992BFD6CF7
                                                                SHA1:455161093A42E611574A4B19994250BD664D084A
                                                                SHA-256:50014C3C9131D818BB3105B65A4FCFEF85873C966644F781481079194ACCD075
                                                                SHA-512:81B6B073A3119CA81071AE8D43A0EE9FD6C43E6EDDA2FD0B094A96CDED2E312DE1F62C343E0D6E11922101D2650A07B37C51D1618A843C1E6F5E3AA9821E2A25
                                                                Malicious:true
                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................0..........0=.......@....@..............................................@...............................%...`...@..........................................................................................................CODE....h/.......0.................. ..`DATA....@....@.......4..............@...BSS..........`.......F...................idata...%.......&...F..............@....tls.................l...................rdata...............l..............@..P.reloc.............................@..P.rsrc....@...`...@...n..............@..P.....................6..............@..P........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):221696
                                                                Entropy (8bit):6.044861431828742
                                                                Encrypted:false
                                                                SSDEEP:6144:oy6EiahKdODexmbUwTiTy8CfJMtoupgmRc:oyTYsTiTy8SJMtPF
                                                                MD5:A142AE884D8D6B0BB9FAC780087E2934
                                                                SHA1:7161A8467A6CF4AC9EF82223F44D2D1DD814F575
                                                                SHA-256:B134D81F09281112E4AD8A3FD9702A6434489D82282F8A4835E59739BCC60F7B
                                                                SHA-512:5986645BAAAE04C4FFA6E26D552A89A48513F3BDF8B02AAE3F8ECD8C175B16C77C8BC80523D9EE6C67DF8133E0B8EE86A1BEE666DD5F4710E922C226BF939349
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6.OW..OW..OW..h...GW..h...XW..OW..FU..F/..WW..F/...W..F/..5W..Q...LW..F/..JW..F/..NW..Q...NW..F/..NW..RichOW..........PE..L...@W.Q...........!.........N............... ............................................@.........................P........................................@..l#...$...............................e..@............ ......0...@....................text...;........................... ..`.rdata...... ......................@..@.data...8]......."..................@....rsrc............0..................@..@.reloc..rp...@...r..................@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):791481
                                                                Entropy (8bit):6.217228015320556
                                                                Encrypted:false
                                                                SSDEEP:24576:A0Q0PEiRC+tRj9fPFU0L2gNAtFhlHdQPdbf3lpXmxi5OKD:A0Q/DAD
                                                                MD5:4962D3BB23AAA3B389F986335E6C4EE2
                                                                SHA1:1B01A8F626A0CBAEA18622CD4DCFB3C0CC632AD8
                                                                SHA-256:C205DF696F37D6C6AA0832F2B776B2E461665FFB5588A7AB7D35BCF24BE4506D
                                                                SHA-512:38F1FBC8A35D481FC7B12D85FEA29A228E5A5918CBEE6C18B90CA8C1E43A295088E28FABE1D5ED832821CAF1E2B6FA573759819D2232455D9EE163F706B91143
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.Y...........!................`.............`b.........................`......Y......... ......................`..`....p..................................H:..................................................<q...............................text...............................`.P`.rotext............................. .P`.data...............................@.`..rdata...............l..............@.`@.rodata..2.......4..................@.P@/4......xc...P...d... ..............@.0@.bss..................................`..edata..`....`......................@.0@.idata.......p......................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..H:.......<..................@.0B/14.................................@.@B/29....._...........................@..B/41.................................@..B/55.......... ..........
                                                                Process:C:\Users\user\Desktop\OFjT8HmzFJ.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):699904
                                                                Entropy (8bit):6.464180156327239
                                                                Encrypted:false
                                                                SSDEEP:12288:S0QfKb+GlrPj37VzHEA6Yd2qKvJ4wyyrNQIRZCGkKLch/bcXExy4:ifKb+GlrPj37VzHEA6B3vDaCCGkF/bcQ
                                                                MD5:0D05E478EC0E67B3670C32F7FCD99AC2
                                                                SHA1:BBEF8AE7B0E306E6172E2A0D9D6BACEBF7F71886
                                                                SHA-256:ABF4A9FAD2C3C735450CD35F7AE7255A52C0DA48432C41682598536A9A708360
                                                                SHA-512:677790B8807661E5ED9386BFD12A892DD9FEF732D3228902A0718D0D64CBA25C9C23B7FF67827373A77307DC1B41695ECB9EA64B71AE622F69BED8BB84FF3AF7
                                                                Malicious:true
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................0..........0=.......@....@..............................................@...............................%...`...@..........................................................................................................CODE....h/.......0.................. ..`DATA....@....@.......4..............@...BSS..........`.......F...................idata...%.......&...F..............@....tls.................l...................rdata...............l..............@..P.reloc.............................@..P.rsrc....@...`...@...n..............@..P.....................6..............@..P........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):4096
                                                                Entropy (8bit):4.026670007889822
                                                                Encrypted:false
                                                                SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2560
                                                                Entropy (8bit):2.8818118453929262
                                                                Encrypted:false
                                                                SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                MD5:A69559718AB506675E907FE49DEB71E9
                                                                SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):4.058068250306624
                                                                Encrypted:false
                                                                SSDEEP:192:46MTeid8XO+N2RPnqkHM2rrRbwz6ln+rnbdaBlJBRJBBti94muL+Xh2IwoXAsLi2:ST6O+NwqAM+k6lnWnboZDXyRPtAsLiA
                                                                MD5:B6F11A0AB7715F570F45900A1FE84732
                                                                SHA1:77B1201E535445AF5EA94C1B03C0A1C34D67A77B
                                                                SHA-256:E47DD306A9854599F02BC1B07CA6DFBD5220F8A1352FAA9616D1A327DE0BBF67
                                                                SHA-512:78A757E67D21EB7CC95954DF15E3EEFF56113D6B40FB73F0C5F53304265CC52C79125D6F1B3655B64F9A411711B5B70F746080D708D7C222F4E65BAD64B1B771
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.X.5.6.5.6.5.6.5.7.7.6.W.%.6.6...<.=.6...8.4.6...2.4.6.Rich5.6.........................PE..L....g.E...........!.....@...0.......E.......P.......................................................................P.......P..(............................p.......................................................P...............................text..._5.......@.................. ..`.rdata.......P.......P..............@..@.data...@....`.......`..............@....reloc.......p.......p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):6144
                                                                Entropy (8bit):4.215994423157539
                                                                Encrypted:false
                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                Category:dropped
                                                                Size (bytes):23312
                                                                Entropy (8bit):4.596242908851566
                                                                Encrypted:false
                                                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.999247683865846
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                • Inno Setup installer (109748/4) 1.08%
                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                File name:OFjT8HmzFJ.exe
                                                                File size:6'401'622 bytes
                                                                MD5:c776a9efdaba18f15a5f554ae52c0385
                                                                SHA1:32e0de85a222239a0c5a4f8ef283739902c738bb
                                                                SHA256:5dea8691394058b4c4e88ac3fc070dd30c5ea528ad07d9fe8d1e6dde566adac7
                                                                SHA512:f5f815cba389917229a624d43cdf21ce4ca7f1c7c816de25034744ad94dd930418f45b39bd90f4d0bc79a021946fd1f119d6217a768b844ec27744f49da655ec
                                                                SSDEEP:196608:yakrzX8aK5bABGehKapJ0kEz/HVl82386d:4rzd8EJ37Q38W
                                                                TLSH:FB563346578B9E20D3A59D7D1D6638060A3ACE94BE37C028730EEB0DEB72EB3D455712
                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                Icon Hash:2d2e3797b32b2b99
                                                                Entrypoint:0x409b24
                                                                Entrypoint Section:CODE
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:1
                                                                OS Version Minor:0
                                                                File Version Major:1
                                                                File Version Minor:0
                                                                Subsystem Version Major:1
                                                                Subsystem Version Minor:0
                                                                Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                Instruction
                                                                push ebp
                                                                mov ebp, esp
                                                                add esp, FFFFFFC4h
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                xor eax, eax
                                                                mov dword ptr [ebp-10h], eax
                                                                mov dword ptr [ebp-24h], eax
                                                                call 00007F2C50B96417h
                                                                call 00007F2C50B9761Eh
                                                                call 00007F2C50B99849h
                                                                call 00007F2C50B99890h
                                                                call 00007F2C50B9C183h
                                                                call 00007F2C50B9C2EAh
                                                                xor eax, eax
                                                                push ebp
                                                                push 0040A1DBh
                                                                push dword ptr fs:[eax]
                                                                mov dword ptr fs:[eax], esp
                                                                xor edx, edx
                                                                push ebp
                                                                push 0040A1A4h
                                                                push dword ptr fs:[edx]
                                                                mov dword ptr fs:[edx], esp
                                                                mov eax, dword ptr [0040C014h]
                                                                call 00007F2C50B9CD10h
                                                                call 00007F2C50B9C877h
                                                                lea edx, dword ptr [ebp-10h]
                                                                xor eax, eax
                                                                call 00007F2C50B99E79h
                                                                mov edx, dword ptr [ebp-10h]
                                                                mov eax, 0040CDECh
                                                                call 00007F2C50B964C8h
                                                                push 00000002h
                                                                push 00000000h
                                                                push 00000001h
                                                                mov ecx, dword ptr [0040CDECh]
                                                                mov dl, 01h
                                                                mov eax, 004072ECh
                                                                call 00007F2C50B9A708h
                                                                mov dword ptr [0040CDF0h], eax
                                                                xor edx, edx
                                                                push ebp
                                                                push 0040A15Ch
                                                                push dword ptr fs:[edx]
                                                                mov dword ptr fs:[edx], esp
                                                                call 00007F2C50B9CD80h
                                                                mov dword ptr [0040CDF8h], eax
                                                                mov eax, dword ptr [0040CDF8h]
                                                                cmp dword ptr [eax+0Ch], 01h
                                                                jne 00007F2C50B9CEBAh
                                                                mov eax, dword ptr [0040CDF8h]
                                                                mov edx, 00000028h
                                                                call 00007F2C50B9AB09h
                                                                mov edx, dword ptr [0040CDF8h]
                                                                cmp eax, dword ptr [edx+00h]
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                CODE0x10000x92440x9400da5e804937248407d9036cd9588c0b6eFalse0.610034839527027data6.530816793916065IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                DATA0xb0000x24c0x400fc1836b9abb0b5690e90c671f715abf1False0.3076171875data2.7354399295454255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                BSS0xc0000xe500x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                .rsrc0x110000x2c000x2c0090081bc22e54bac7907f64c1d8037df6False0.322265625data4.45362355533689IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                RT_STRING0x125740x2f2data0.35543766578249336
                                                                RT_STRING0x128680x30cdata0.3871794871794872
                                                                RT_STRING0x12b740x2cedata0.42618384401114207
                                                                RT_STRING0x12e440x68data0.75
                                                                RT_STRING0x12eac0xb4data0.6277777777777778
                                                                RT_STRING0x12f600xaedata0.5344827586206896
                                                                RT_RCDATA0x130100x2cdata1.2045454545454546
                                                                RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.2706953642384106
                                                                RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                DLLImport
                                                                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                user32.dllMessageBoxA
                                                                oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                comctl32.dllInitCommonControls
                                                                advapi32.dllAdjustTokenPrivileges
                                                                Language of compilation systemCountry where language is spokenMap
                                                                DutchNetherlands
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-05T02:14:14.510768+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.449730TCP
                                                                2024-11-05T02:14:49.768452+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.208.158.20280TCP
                                                                2024-11-05T02:14:49.768452+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.208.158.20280TCP
                                                                2024-11-05T02:14:52.920230+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.208.158.20280TCP
                                                                2024-11-05T02:14:52.920230+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.208.158.20280TCP
                                                                2024-11-05T02:14:53.360891+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.449738TCP
                                                                2024-11-05T02:14:53.989569+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449739185.208.158.20280TCP
                                                                2024-11-05T02:14:53.989569+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449739185.208.158.20280TCP
                                                                2024-11-05T02:14:55.040656+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449742185.208.158.20280TCP
                                                                2024-11-05T02:14:55.040656+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449742185.208.158.20280TCP
                                                                2024-11-05T02:14:56.088071+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449743185.208.158.20280TCP
                                                                2024-11-05T02:14:56.088071+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449743185.208.158.20280TCP
                                                                2024-11-05T02:14:57.128908+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449744185.208.158.20280TCP
                                                                2024-11-05T02:14:57.128908+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449744185.208.158.20280TCP
                                                                2024-11-05T02:14:57.544988+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449744185.208.158.20280TCP
                                                                2024-11-05T02:14:57.544988+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449744185.208.158.20280TCP
                                                                2024-11-05T02:14:58.582047+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449755185.208.158.20280TCP
                                                                2024-11-05T02:14:58.582047+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449755185.208.158.20280TCP
                                                                2024-11-05T02:14:58.995669+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449755185.208.158.20280TCP
                                                                2024-11-05T02:14:58.995669+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449755185.208.158.20280TCP
                                                                2024-11-05T02:15:00.073078+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449766185.208.158.20280TCP
                                                                2024-11-05T02:15:00.073078+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449766185.208.158.20280TCP
                                                                2024-11-05T02:15:01.120107+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449772185.208.158.20280TCP
                                                                2024-11-05T02:15:01.120107+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449772185.208.158.20280TCP
                                                                2024-11-05T02:15:02.187639+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449778185.208.158.20280TCP
                                                                2024-11-05T02:15:02.187639+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449778185.208.158.20280TCP
                                                                2024-11-05T02:15:03.241514+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449784185.208.158.20280TCP
                                                                2024-11-05T02:15:03.241514+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449784185.208.158.20280TCP
                                                                2024-11-05T02:15:04.285665+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449795185.208.158.20280TCP
                                                                2024-11-05T02:15:04.285665+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449795185.208.158.20280TCP
                                                                2024-11-05T02:15:05.349729+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449801185.208.158.20280TCP
                                                                2024-11-05T02:15:05.349729+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449801185.208.158.20280TCP
                                                                2024-11-05T02:15:05.765708+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449801185.208.158.20280TCP
                                                                2024-11-05T02:15:05.765708+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449801185.208.158.20280TCP
                                                                2024-11-05T02:15:07.625028+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449807185.208.158.20280TCP
                                                                2024-11-05T02:15:07.625028+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449807185.208.158.20280TCP
                                                                2024-11-05T02:15:08.712802+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449813185.208.158.20280TCP
                                                                2024-11-05T02:15:08.712802+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449813185.208.158.20280TCP
                                                                2024-11-05T02:15:09.741372+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449824185.208.158.20280TCP
                                                                2024-11-05T02:15:09.741372+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449824185.208.158.20280TCP
                                                                2024-11-05T02:15:10.793641+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449830185.208.158.20280TCP
                                                                2024-11-05T02:15:10.793641+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449830185.208.158.20280TCP
                                                                2024-11-05T02:15:11.835815+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449835185.208.158.20280TCP
                                                                2024-11-05T02:15:11.835815+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449835185.208.158.20280TCP
                                                                2024-11-05T02:15:12.866653+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449841185.208.158.20280TCP
                                                                2024-11-05T02:15:12.866653+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449841185.208.158.20280TCP
                                                                2024-11-05T02:15:13.283295+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449841185.208.158.20280TCP
                                                                2024-11-05T02:15:13.283295+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449841185.208.158.20280TCP
                                                                2024-11-05T02:15:14.463695+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449850185.208.158.20280TCP
                                                                2024-11-05T02:15:14.463695+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449850185.208.158.20280TCP
                                                                2024-11-05T02:15:15.528204+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449857185.208.158.20280TCP
                                                                2024-11-05T02:15:15.528204+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449857185.208.158.20280TCP
                                                                2024-11-05T02:15:16.578267+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449863185.208.158.20280TCP
                                                                2024-11-05T02:15:16.578267+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449863185.208.158.20280TCP
                                                                2024-11-05T02:15:17.617802+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449868185.208.158.20280TCP
                                                                2024-11-05T02:15:17.617802+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449868185.208.158.20280TCP
                                                                2024-11-05T02:15:18.669238+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449875185.208.158.20280TCP
                                                                2024-11-05T02:15:18.669238+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449875185.208.158.20280TCP
                                                                2024-11-05T02:15:19.767131+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449880185.208.158.20280TCP
                                                                2024-11-05T02:15:19.767131+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449880185.208.158.20280TCP
                                                                2024-11-05T02:15:20.821477+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449888185.208.158.20280TCP
                                                                2024-11-05T02:15:20.821477+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449888185.208.158.20280TCP
                                                                2024-11-05T02:15:21.893591+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:21.893591+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:22.318772+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:22.318772+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:22.735176+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:22.735176+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:23.162892+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:23.162892+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:23.583165+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:23.583165+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:24.001625+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:24.001625+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449894185.208.158.20280TCP
                                                                2024-11-05T02:15:25.096099+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449913185.208.158.20280TCP
                                                                2024-11-05T02:15:25.096099+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449913185.208.158.20280TCP
                                                                2024-11-05T02:15:25.516612+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449913185.208.158.20280TCP
                                                                2024-11-05T02:15:25.516612+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449913185.208.158.20280TCP
                                                                2024-11-05T02:15:25.931277+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449913185.208.158.20280TCP
                                                                2024-11-05T02:15:25.931277+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449913185.208.158.20280TCP
                                                                2024-11-05T02:15:27.012320+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449926185.208.158.20280TCP
                                                                2024-11-05T02:15:27.012320+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449926185.208.158.20280TCP
                                                                2024-11-05T02:15:28.133251+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449933185.208.158.20280TCP
                                                                2024-11-05T02:15:28.133251+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449933185.208.158.20280TCP
                                                                2024-11-05T02:15:29.159381+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449941185.208.158.20280TCP
                                                                2024-11-05T02:15:29.159381+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449941185.208.158.20280TCP
                                                                2024-11-05T02:15:29.570861+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449941185.208.158.20280TCP
                                                                2024-11-05T02:15:29.570861+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449941185.208.158.20280TCP
                                                                2024-11-05T02:15:30.984896+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449949185.208.158.20280TCP
                                                                2024-11-05T02:15:30.984896+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449949185.208.158.20280TCP
                                                                2024-11-05T02:15:32.026991+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449959185.208.158.20280TCP
                                                                2024-11-05T02:15:32.026991+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449959185.208.158.20280TCP
                                                                2024-11-05T02:15:33.060397+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449966185.208.158.20280TCP
                                                                2024-11-05T02:15:33.060397+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449966185.208.158.20280TCP
                                                                2024-11-05T02:15:34.107691+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449972185.208.158.20280TCP
                                                                2024-11-05T02:15:34.107691+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449972185.208.158.20280TCP
                                                                2024-11-05T02:15:35.168076+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449978185.208.158.20280TCP
                                                                2024-11-05T02:15:35.168076+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449978185.208.158.20280TCP
                                                                2024-11-05T02:15:36.213862+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449984185.208.158.20280TCP
                                                                2024-11-05T02:15:36.213862+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449984185.208.158.20280TCP
                                                                2024-11-05T02:15:37.260423+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449993185.208.158.20280TCP
                                                                2024-11-05T02:15:37.260423+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449993185.208.158.20280TCP
                                                                2024-11-05T02:15:38.282394+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450000185.208.158.20280TCP
                                                                2024-11-05T02:15:38.282394+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450000185.208.158.20280TCP
                                                                2024-11-05T02:15:38.694908+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450000185.208.158.20280TCP
                                                                2024-11-05T02:15:38.694908+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450000185.208.158.20280TCP
                                                                2024-11-05T02:15:39.768544+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450007185.208.158.20280TCP
                                                                2024-11-05T02:15:39.768544+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450007185.208.158.20280TCP
                                                                2024-11-05T02:15:40.810716+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450016185.208.158.20280TCP
                                                                2024-11-05T02:15:40.810716+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450016185.208.158.20280TCP
                                                                2024-11-05T02:15:41.843737+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450022185.208.158.20280TCP
                                                                2024-11-05T02:15:41.843737+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450022185.208.158.20280TCP
                                                                2024-11-05T02:15:42.876658+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450030185.208.158.20280TCP
                                                                2024-11-05T02:15:42.876658+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450030185.208.158.20280TCP
                                                                2024-11-05T02:15:43.296295+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450030185.208.158.20280TCP
                                                                2024-11-05T02:15:43.296295+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450030185.208.158.20280TCP
                                                                2024-11-05T02:15:44.337863+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450039185.208.158.20280TCP
                                                                2024-11-05T02:15:44.337863+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450039185.208.158.20280TCP
                                                                2024-11-05T02:15:45.383395+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450045185.208.158.20280TCP
                                                                2024-11-05T02:15:45.383395+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450045185.208.158.20280TCP
                                                                2024-11-05T02:15:46.434284+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450050185.208.158.20280TCP
                                                                2024-11-05T02:15:46.434284+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450050185.208.158.20280TCP
                                                                2024-11-05T02:15:47.470593+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450051185.208.158.20280TCP
                                                                2024-11-05T02:15:47.470593+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450051185.208.158.20280TCP
                                                                2024-11-05T02:15:47.885636+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450051185.208.158.20280TCP
                                                                2024-11-05T02:15:47.885636+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450051185.208.158.20280TCP
                                                                2024-11-05T02:15:48.928882+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450052185.208.158.20280TCP
                                                                2024-11-05T02:15:48.928882+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450052185.208.158.20280TCP
                                                                2024-11-05T02:15:49.984342+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450053185.208.158.20280TCP
                                                                2024-11-05T02:15:49.984342+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450053185.208.158.20280TCP
                                                                2024-11-05T02:15:51.054715+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450054185.208.158.20280TCP
                                                                2024-11-05T02:15:51.054715+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450054185.208.158.20280TCP
                                                                2024-11-05T02:15:52.094748+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.20280TCP
                                                                2024-11-05T02:15:52.094748+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.20280TCP
                                                                2024-11-05T02:15:53.267725+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450056185.208.158.20280TCP
                                                                2024-11-05T02:15:53.267725+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450056185.208.158.20280TCP
                                                                2024-11-05T02:15:54.323361+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450057185.208.158.20280TCP
                                                                2024-11-05T02:15:54.323361+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450057185.208.158.20280TCP
                                                                2024-11-05T02:15:55.382684+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450058185.208.158.20280TCP
                                                                2024-11-05T02:15:55.382684+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450058185.208.158.20280TCP
                                                                2024-11-05T02:15:56.434637+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450059185.208.158.20280TCP
                                                                2024-11-05T02:15:56.434637+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450059185.208.158.20280TCP
                                                                2024-11-05T02:15:57.845030+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450060185.208.158.20280TCP
                                                                2024-11-05T02:15:57.845030+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450060185.208.158.20280TCP
                                                                2024-11-05T02:15:58.911115+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450061185.208.158.20280TCP
                                                                2024-11-05T02:15:58.911115+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450061185.208.158.20280TCP
                                                                2024-11-05T02:15:59.952574+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450062185.208.158.20280TCP
                                                                2024-11-05T02:15:59.952574+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450062185.208.158.20280TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 5, 2024 02:14:48.844408989 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:48.849268913 CET8049736185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:48.849371910 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:48.849531889 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:48.854433060 CET8049736185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:49.768349886 CET8049736185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:49.768363953 CET8049736185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:49.768451929 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:49.770623922 CET497372023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:49.775955915 CET20234973789.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:49.776032925 CET497372023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:49.776115894 CET497372023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:49.781606913 CET20234973789.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:49.781672001 CET497372023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:49.786978006 CET20234973789.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:50.592333078 CET20234973789.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:50.641618967 CET497372023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:52.597651005 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:52.602544069 CET8049736185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:52.920176029 CET8049736185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:52.920229912 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:53.035070896 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:53.035378933 CET4973980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:53.041618109 CET8049739185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:53.041786909 CET4973980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:53.041950941 CET4973980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:53.042028904 CET8049736185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:53.042078018 CET4973680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:53.046664000 CET8049739185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:53.989474058 CET8049739185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:53.989487886 CET8049739185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:53.989568949 CET4973980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:53.990741014 CET497412023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:53.996300936 CET20234974189.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:53.996388912 CET497412023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:53.996414900 CET497412023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:53.996459007 CET497412023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:54.001950979 CET20234974189.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:54.001960039 CET20234974189.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:54.112847090 CET4973980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:54.113141060 CET4974280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:54.117924929 CET8049742185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:54.118005991 CET4974280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:54.118097067 CET4974280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:54.118190050 CET8049739185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:54.118235111 CET4973980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:54.122831106 CET8049742185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:54.594192982 CET20234974189.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:14:54.596651077 CET497412023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:14:55.039716005 CET8049742185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:55.040656090 CET4974280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:55.160068989 CET4974280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:55.160403013 CET4974380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:55.165344954 CET8049743185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:55.165432930 CET4974380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:55.165520906 CET4974380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:55.165597916 CET8049742185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:55.165648937 CET4974280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:55.170237064 CET8049743185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:56.088007927 CET8049743185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:56.088071108 CET4974380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:56.207475901 CET4974380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:56.207770109 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:56.212584972 CET8049743185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:56.212641954 CET8049744185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:56.212645054 CET4974380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:56.212718010 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:56.212852001 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:56.217609882 CET8049744185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:57.128855944 CET8049744185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:57.128907919 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.238260031 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.243169069 CET8049744185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:57.544930935 CET8049744185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:57.544987917 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.660096884 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.660392046 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.665152073 CET8049755185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:57.665281057 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.665301085 CET8049744185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:57.665347099 CET4974480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.665504932 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:57.670279026 CET8049755185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:58.581949949 CET8049755185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:58.582046986 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:58.691534042 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:58.696367025 CET8049755185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:58.994968891 CET8049755185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:58.995668888 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:59.114418030 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:59.114757061 CET4976680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:59.119594097 CET8049766185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:59.119616032 CET8049755185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:14:59.119730949 CET4975580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:59.120238066 CET4976680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:59.120238066 CET4976680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:14:59.124984980 CET8049766185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:00.072999001 CET8049766185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:00.073077917 CET4976680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:00.194288015 CET4976680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:00.194681883 CET4977280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:00.199431896 CET8049772185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:00.199481964 CET8049766185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:00.199500084 CET4977280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:00.199534893 CET4976680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:00.199671984 CET4977280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:00.204389095 CET8049772185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:01.120040894 CET8049772185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:01.120106936 CET4977280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:01.238545895 CET4977280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:01.238905907 CET4977880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:01.243670940 CET8049772185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:01.243685961 CET8049778185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:01.243732929 CET4977280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:01.243782997 CET4977880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:01.243930101 CET4977880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:01.248642921 CET8049778185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:02.187577963 CET8049778185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:02.187638998 CET4977880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:02.300926924 CET4977880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:02.301405907 CET4978480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:02.306047916 CET8049778185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:02.306135893 CET4977880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:02.306188107 CET8049784185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:02.306256056 CET4978480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:02.306371927 CET4978480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:02.311099052 CET8049784185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:03.241441011 CET8049784185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:03.241513968 CET4978480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:03.363281012 CET4978480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:03.363537073 CET4979580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:03.368278980 CET8049795185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:03.368345976 CET8049784185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:03.368345976 CET4979580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:03.368387938 CET4978480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:03.368532896 CET4979580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:03.373245955 CET8049795185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:04.281600952 CET8049795185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:04.285665035 CET4979580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:04.410060883 CET4979580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:04.410331011 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:04.415299892 CET8049801185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:04.415702105 CET8049795185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:04.415780067 CET4979580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:04.415783882 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:04.415895939 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:04.420623064 CET8049801185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:05.349641085 CET8049801185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:05.349729061 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.457112074 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.462363958 CET8049801185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:05.765630007 CET8049801185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:05.765707970 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.879193068 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.879504919 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.884305000 CET8049807185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:05.884341955 CET8049801185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:05.884423971 CET4980180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.884589911 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.884589911 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:05.889359951 CET8049807185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:07.624946117 CET8049807185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:07.625027895 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.625124931 CET8049807185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:07.625169039 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.625180960 CET8049807185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:07.625216007 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.787895918 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.788219929 CET4981380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.792913914 CET8049807185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:07.792948961 CET8049813185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:07.792973995 CET4980780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.793016911 CET4981380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.796719074 CET4981380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:07.801482916 CET8049813185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:08.712713003 CET8049813185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:08.712801933 CET4981380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:08.832097054 CET4981380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:08.832400084 CET4982480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:08.837467909 CET8049824185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:08.837549925 CET4982480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:08.837619066 CET8049813185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:08.837676048 CET4981380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:08.837677956 CET4982480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:08.843363047 CET8049824185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:09.741288900 CET8049824185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:09.741372108 CET4982480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:09.863720894 CET4982480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:09.864151955 CET4983080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:09.868834972 CET8049824185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:09.868913889 CET4982480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:09.868926048 CET8049830185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:09.868992090 CET4983080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:09.869139910 CET4983080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:09.873904943 CET8049830185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:10.792814016 CET8049830185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:10.793641090 CET4983080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:10.910166025 CET4983080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:10.910589933 CET4983580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:10.915441036 CET8049835185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:10.915766001 CET8049830185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:10.915847063 CET4983080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:10.915853977 CET4983580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:10.916002989 CET4983580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:10.920708895 CET8049835185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:11.835649014 CET8049835185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:11.835814953 CET4983580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:11.957160950 CET4983580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:11.957577944 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:11.962419033 CET8049841185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:11.962454081 CET8049835185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:11.962511063 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:11.962538004 CET4983580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:11.962661028 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:11.967381001 CET8049841185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:12.866600990 CET8049841185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:12.866652966 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:12.973925114 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:12.978780985 CET8049841185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:13.283210993 CET8049841185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:13.283294916 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:13.541013956 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:13.541299105 CET4985080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:13.547549009 CET8049841185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:13.547612906 CET4984180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:13.547782898 CET8049850185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:13.547842026 CET4985080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:13.551901102 CET4985080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:13.556597948 CET8049850185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:14.463622093 CET8049850185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:14.463695049 CET4985080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:14.583192110 CET4985080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:14.583513975 CET4985780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:14.588359118 CET8049857185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:14.588424921 CET4985780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:14.588634014 CET4985780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:14.588931084 CET8049850185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:14.588983059 CET4985080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:14.593420029 CET8049857185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:15.528147936 CET8049857185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:15.528203964 CET4985780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:15.645194054 CET4985780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:15.645766973 CET4986380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:15.650548935 CET8049863185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:15.650657892 CET4986380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:15.650852919 CET4986380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:15.651506901 CET8049857185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:15.651565075 CET4985780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:15.655630112 CET8049863185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:16.578191042 CET8049863185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:16.578267097 CET4986380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:16.691839933 CET4986380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:16.692217112 CET4986880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:16.697053909 CET8049863185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:16.697069883 CET8049868185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:16.697110891 CET4986380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:16.697148085 CET4986880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:16.697303057 CET4986880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:16.702069044 CET8049868185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:17.617749929 CET8049868185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:17.617801905 CET4986880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:17.738059044 CET4986880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:17.738346100 CET4987580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:17.743338108 CET8049875185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:17.743411064 CET4987580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:17.743477106 CET8049868185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:17.743524075 CET4986880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:17.743571997 CET4987580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:17.749022007 CET8049875185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:18.668437958 CET8049875185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:18.669238091 CET4987580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:18.838895082 CET4987580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:18.842653990 CET4988080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:18.844357967 CET8049875185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:18.844645023 CET4987580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:18.847493887 CET8049880185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:18.847580910 CET4988080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:18.850919008 CET4988080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:18.855705023 CET8049880185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:19.767070055 CET8049880185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:19.767131090 CET4988080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:19.899640083 CET4988080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:19.899992943 CET4988880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:19.904880047 CET8049888185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:19.904891968 CET8049880185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:19.904962063 CET4988080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:19.904973030 CET4988880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:19.905107975 CET4988880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:19.909816027 CET8049888185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:20.821425915 CET8049888185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:20.821476936 CET4988880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:20.941276073 CET4988880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:20.941525936 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:20.946321964 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:20.946515083 CET8049888185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:20.946597099 CET4988880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:20.946604967 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:20.946719885 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:20.951421976 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:21.893534899 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:21.893590927 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:22.003844023 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:22.009223938 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:22.318644047 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:22.318772078 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:22.425765991 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:22.430561066 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:22.735111952 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:22.735176086 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:22.847554922 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:22.853856087 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:23.162820101 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:23.162892103 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:23.274218082 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:23.279032946 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:23.583112001 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:23.583164930 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:23.691534996 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:23.698257923 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:24.001549006 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:24.001625061 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:24.175105095 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:24.175474882 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:24.180304050 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:24.180315971 CET8049894185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:24.180377960 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:24.180408955 CET4989480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:24.196854115 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:24.201649904 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:24.264396906 CET20234973789.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:15:24.314117908 CET497372023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:24.398529053 CET4991480192.168.2.4199.101.131.210
                                                                Nov 5, 2024 02:15:24.403347015 CET8049914199.101.131.210192.168.2.4
                                                                Nov 5, 2024 02:15:24.403408051 CET4991480192.168.2.4199.101.131.210
                                                                Nov 5, 2024 02:15:24.403666019 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:24.408452034 CET20234991589.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:15:24.408503056 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:24.408572912 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:24.413332939 CET20234991589.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:15:24.413393974 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:24.418189049 CET20234991589.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:15:25.095529079 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:25.096098900 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:25.206969023 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:25.211839914 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:25.242810011 CET20234991589.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:15:25.242985964 CET4991480192.168.2.4199.101.131.210
                                                                Nov 5, 2024 02:15:25.247956991 CET8049914199.101.131.210192.168.2.4
                                                                Nov 5, 2024 02:15:25.297895908 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:25.516474009 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:25.516612053 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:25.628530025 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:25.633362055 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:25.931149960 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:25.931277037 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:26.050735950 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:26.051059008 CET4992680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:26.056051970 CET8049913185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:26.056066990 CET8049926185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:26.056124926 CET4991380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:26.056165934 CET4992680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:26.056333065 CET4992680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:26.061084986 CET8049926185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:26.643105984 CET8049914199.101.131.210192.168.2.4
                                                                Nov 5, 2024 02:15:26.643835068 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:26.648628950 CET20234991589.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:15:26.688550949 CET4991480192.168.2.4199.101.131.210
                                                                Nov 5, 2024 02:15:27.010674953 CET8049926185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:27.012320042 CET4992680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:27.211504936 CET4992680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:27.211853981 CET4993380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:27.216620922 CET8049926185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:27.216640949 CET8049933185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:27.216690063 CET4992680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:27.216711998 CET4993380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:27.234129906 CET4993380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:27.238857985 CET8049933185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:28.133186102 CET8049933185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:28.133250952 CET4993380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:28.253622055 CET4993380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:28.253894091 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:28.258699894 CET8049941185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:28.258755922 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:28.258824110 CET8049933185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:28.258872986 CET4993380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:28.258877993 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:28.263716936 CET8049941185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:29.159308910 CET8049941185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:29.159380913 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:29.269623041 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:29.274511099 CET8049941185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:29.570806980 CET8049941185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:29.570861101 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:30.066306114 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:30.066682100 CET4994980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:30.071366072 CET8049941185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:30.071419001 CET4994180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:30.071453094 CET8049949185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:30.071507931 CET4994980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:30.071664095 CET4994980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:30.077089071 CET8049949185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:30.984838963 CET8049949185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:30.984895945 CET4994980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:31.098081112 CET4994980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:31.098361015 CET4995980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:31.103207111 CET8049959185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:31.103265047 CET8049949185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:31.103282928 CET4995980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:31.103311062 CET4994980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:31.103532076 CET4995980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:31.108349085 CET8049959185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:31.689709902 CET8049914199.101.131.210192.168.2.4
                                                                Nov 5, 2024 02:15:31.689773083 CET4991480192.168.2.4199.101.131.210
                                                                Nov 5, 2024 02:15:31.689832926 CET4991480192.168.2.4199.101.131.210
                                                                Nov 5, 2024 02:15:31.689861059 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:31.694622040 CET8049914199.101.131.210192.168.2.4
                                                                Nov 5, 2024 02:15:31.694889069 CET20234991589.105.201.183192.168.2.4
                                                                Nov 5, 2024 02:15:31.694938898 CET499152023192.168.2.489.105.201.183
                                                                Nov 5, 2024 02:15:32.026905060 CET8049959185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:32.026990891 CET4995980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:32.144897938 CET4995980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:32.145092964 CET4996680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:32.149884939 CET8049966185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:32.149955988 CET4996680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:32.150043011 CET4996680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:32.150098085 CET8049959185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:32.150157928 CET4995980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:32.154799938 CET8049966185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:33.060305119 CET8049966185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:33.060396910 CET4996680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:33.175705910 CET4996680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:33.176028967 CET4997280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:33.180953026 CET8049972185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:33.180999041 CET8049966185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:33.181056976 CET4997280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:33.181088924 CET4996680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:33.181283951 CET4997280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:33.186054945 CET8049972185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:34.107084990 CET8049972185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:34.107691050 CET4997280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:34.222650051 CET4997280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:34.222964048 CET4997880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:34.227760077 CET8049978185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:34.227837086 CET8049972185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:34.227935076 CET4997280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:34.228122950 CET4997880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:34.228122950 CET4997880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:34.232867002 CET8049978185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:35.167972088 CET8049978185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:35.168076038 CET4997880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:35.285276890 CET4997880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:35.285584927 CET4998480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:35.291249990 CET8049984185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:35.291316986 CET4998480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:35.291455030 CET4998480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:35.291623116 CET8049978185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:35.291677952 CET4997880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:35.298326969 CET8049984185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:36.213778019 CET8049984185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:36.213861942 CET4998480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:36.331962109 CET4998480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:36.332238913 CET4999380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:36.337052107 CET8049993185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:36.337065935 CET8049984185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:36.337152004 CET4998480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:36.337162018 CET4999380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:36.337260962 CET4999380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:36.341978073 CET8049993185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:37.260365963 CET8049993185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:37.260422945 CET4999380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:37.378793955 CET4999380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:37.379035950 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:37.383795977 CET8050000185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:37.383858919 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:37.383944035 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:37.383985043 CET8049993185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:37.384032965 CET4999380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:37.388659000 CET8050000185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:38.282339096 CET8050000185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:38.282393932 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.394481897 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.399321079 CET8050000185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:38.694845915 CET8050000185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:38.694907904 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.821578979 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.821917057 CET5000780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.826746941 CET8050000185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:38.826761007 CET8050007185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:38.826813936 CET5000080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.826848984 CET5000780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.826977968 CET5000780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:38.831677914 CET8050007185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:39.768481970 CET8050007185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:39.768543959 CET5000780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:39.879595995 CET5000780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:39.880018950 CET5001680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:39.884767056 CET8050007185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:39.884810925 CET8050016185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:39.884818077 CET5000780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:39.884881020 CET5001680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:39.884989977 CET5001680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:39.889713049 CET8050016185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:40.808901072 CET8050016185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:40.810715914 CET5001680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:40.926182032 CET5001680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:40.926500082 CET5002280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:40.931305885 CET8050022185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:40.931385994 CET5002280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:40.931406975 CET8050016185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:40.931478977 CET5001680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:40.931548119 CET5002280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:40.936276913 CET8050022185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:41.841882944 CET8050022185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:41.843736887 CET5002280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:41.957221985 CET5002280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:41.957477093 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:41.963793993 CET8050030185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:41.963850021 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:41.963979006 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:41.969541073 CET8050022185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:41.969609976 CET5002280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:41.969706059 CET8050030185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:42.876575947 CET8050030185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:42.876657963 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:42.988270044 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:42.992999077 CET8050030185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:43.296240091 CET8050030185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:43.296294928 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:43.410058022 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:43.410316944 CET5003980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:43.415091038 CET8050039185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:43.415174007 CET5003980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:43.415334940 CET5003980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:43.415369987 CET8050030185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:43.415426016 CET5003080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:43.420063019 CET8050039185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:44.337795973 CET8050039185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:44.337862968 CET5003980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:44.457026005 CET5003980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:44.457313061 CET5004580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:44.462100029 CET8050045185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:44.462112904 CET8050039185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:44.462165117 CET5003980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:44.462177992 CET5004580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:44.462308884 CET5004580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:44.467065096 CET8050045185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:45.383307934 CET8050045185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:45.383394957 CET5004580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:45.503597975 CET5004580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:45.503865957 CET5005080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:45.508645058 CET8050045185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:45.508661985 CET8050050185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:45.508709908 CET5004580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:45.508757114 CET5005080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:45.508907080 CET5005080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:45.513632059 CET8050050185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:46.434077024 CET8050050185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:46.434283972 CET5005080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:46.552369118 CET5005080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:46.552647114 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:46.557426929 CET8050051185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:46.557482004 CET8050050185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:46.557492018 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:46.557526112 CET5005080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:46.557611942 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:46.562359095 CET8050051185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:47.470503092 CET8050051185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:47.470592976 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:47.581784964 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:47.586602926 CET8050051185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:47.884053946 CET8050051185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:47.885636091 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:48.003529072 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:48.003817081 CET5005280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:48.008703947 CET8050052185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:48.008716106 CET8050051185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:48.008795023 CET5005180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:48.008806944 CET5005280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:48.008928061 CET5005280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:48.013670921 CET8050052185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:48.928807974 CET8050052185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:48.928881884 CET5005280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:49.034708023 CET5005280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:49.035011053 CET5005380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:49.039786100 CET8050053185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:49.039804935 CET8050052185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:49.039863110 CET5005380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:49.039885998 CET5005280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:49.040009975 CET5005380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:49.044761896 CET8050053185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:49.984164953 CET8050053185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:49.984342098 CET5005380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:50.097439051 CET5005380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:50.097732067 CET5005480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:50.102500916 CET8050054185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:50.102524042 CET8050053185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:50.102585077 CET5005480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:50.102612972 CET5005380192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:50.102724075 CET5005480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:50.107429981 CET8050054185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:51.054639101 CET8050054185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:51.054714918 CET5005480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:51.175731897 CET5005480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:51.176043034 CET5005580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:51.180802107 CET8050055185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:51.180892944 CET5005580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:51.180946112 CET8050054185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:51.180996895 CET5005480192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:51.181107998 CET5005580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:51.185895920 CET8050055185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:52.094575882 CET8050055185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:52.094748020 CET5005580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:52.207037926 CET5005580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:52.207355022 CET5005680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:52.212163925 CET8050055185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:52.212228060 CET5005580192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:52.212460041 CET8050056185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:52.212527990 CET5005680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:52.212630987 CET5005680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:52.217344046 CET8050056185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:53.267668962 CET8050056185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:53.267724991 CET5005680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:53.396187067 CET5005680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:53.396503925 CET5005780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:53.401304007 CET8050057185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:53.401380062 CET5005780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:53.401473999 CET5005780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:53.401500940 CET8050056185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:53.401700974 CET5005680192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:53.406460047 CET8050057185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:54.323297024 CET8050057185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:54.323360920 CET5005780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:54.443837881 CET5005780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:54.444236994 CET5005880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:54.449042082 CET8050058185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:54.449055910 CET8050057185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:54.449134111 CET5005780192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:54.449188948 CET5005880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:54.449378014 CET5005880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:54.454097986 CET8050058185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:55.382477999 CET8050058185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:55.382683992 CET5005880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:55.505443096 CET5005880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:55.505795956 CET5005980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:55.510605097 CET8050059185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:55.510627031 CET8050058185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:55.510704041 CET5005880192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:55.510715008 CET5005980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:55.510847092 CET5005980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:55.515607119 CET8050059185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:56.434573889 CET8050059185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:56.434637070 CET5005980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:56.805146933 CET5005980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:56.805650949 CET5006080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:56.906111002 CET8050060185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:56.906194925 CET5006080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:56.906683922 CET8050059185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:56.906712055 CET5006080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:56.906758070 CET5005980192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:56.914617062 CET8050060185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:57.844975948 CET8050060185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:57.845030069 CET5006080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:57.959120989 CET5006080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:57.959526062 CET5006180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:57.964304924 CET8050060185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:57.964353085 CET8050061185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:57.964375019 CET5006080192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:57.964426041 CET5006180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:57.964548111 CET5006180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:57.969265938 CET8050061185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:58.911030054 CET8050061185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:58.911114931 CET5006180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:59.021250963 CET5006180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:59.021627903 CET5006280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:59.026479959 CET8050062185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:59.026540995 CET8050061185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:59.029655933 CET5006180192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:59.029656887 CET5006280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:59.033468962 CET5006280192.168.2.4185.208.158.202
                                                                Nov 5, 2024 02:15:59.038392067 CET8050062185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:59.952490091 CET8050062185.208.158.202192.168.2.4
                                                                Nov 5, 2024 02:15:59.952574015 CET5006280192.168.2.4185.208.158.202
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 5, 2024 02:14:48.743976116 CET5012853192.168.2.491.211.247.248
                                                                Nov 5, 2024 02:14:48.786595106 CET535012891.211.247.248192.168.2.4
                                                                Nov 5, 2024 02:15:24.288938046 CET6334953192.168.2.41.1.1.1
                                                                Nov 5, 2024 02:15:24.315840960 CET53633491.1.1.1192.168.2.4
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 5, 2024 02:14:48.743976116 CET192.168.2.491.211.247.2480x9ee9Standard query (0)bbdxzzh.comA (IP address)IN (0x0001)false
                                                                Nov 5, 2024 02:15:24.288938046 CET192.168.2.41.1.1.10xf213Standard query (0)endpoints5-scl.5060sip.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 5, 2024 02:14:48.786595106 CET91.211.247.248192.168.2.40x9ee9No error (0)bbdxzzh.com185.208.158.202A (IP address)IN (0x0001)false
                                                                Nov 5, 2024 02:15:24.315840960 CET1.1.1.1192.168.2.40xf213No error (0)endpoints5-scl.5060sip.com199.101.131.210A (IP address)IN (0x0001)false
                                                                • bbdxzzh.com
                                                                • endpoints5-scl.5060sip.com
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.449736185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:14:48.849531889 CET314OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386789f918c2e690 HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:49.768349886 CET1236INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:49 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 34 66 30 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 62 37 36 35 62 62 33 37 34 66 30 36 37 62 37 33 32 35 36 63 30 65 30 64 35 30 65 63 61 34 32 63 64 37 64 62 30 31 62 66 64 33 32 38 38 33 38 65 33 31 36 62 38 36 37 63 37 35 61 61 35 65 61 34 65 65 37 35 62 37 66 34 33 65 63 32 66 36 36 39 34 33 64 37 39 38 63 66 66 31 32 64 65 65 64 39 30 39 39 32 35 63 39 36 61 39 63 31 33 64 38 35 30 38 66 32 31 62 37 35 30 62 36 66 37 35 65 32 39 65 34 36 35 64 62 66 34 36 37 62 30 38 39 65 35 64 30 34 61 65 36 33 35 63 38 31 65 33 30 34 33 35 38 32 35 65 30 33 62 37 31 30 62 37 38 62 65 65 63 38 37 66 64 38 36 32 64 35 31 65 64 35 64 37 32 32 35 65 30 32 39 35 62 65 39 66 64 65 30 38 62 65 34 33 66 37 32 61 33 65 37 34 33 39 32 38 34 66 62 37 31 32 36 31 [TRUNCATED]
                                                                Data Ascii: 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 [TRUNCATED]
                                                                Nov 5, 2024 02:14:49.768363953 CET236INData Raw: 33 66 36 62 35 31 64 63 38 66 35 37 32 62 34 65 35 66 63 66 35 31 64 32 61 37 31 64 65 30 31 63 37 63 36 31 63 61 32 34 34 66 66 34 65 32 62 36 63 62 30 64 66 34 32 62 61 38 64 31 37 30 39 33 33 66 37 63 63 33 30 63 66 63 30 39 65 63 33 64 61 62
                                                                Data Ascii: 3f6b51dc8f572b4e5fcf51d2a71de01c7c61ca244ff4e2b6cb0df42ba8d170933f7cc30cfc09ec3dab16794dc302f2d0b38a47f2af0bff4a7b53d18cda2cb9d48f5f3a1463309bd4744e1eb5940edf41a61a9f78ec9f394eafd983becc486ea5adb234b15962ffee422f0fc3da9b4cc05eb650
                                                                Nov 5, 2024 02:14:52.597651005 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:52.920176029 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:52 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.449739185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:14:53.041950941 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:53.989474058 CET1236INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:53 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 34 36 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 63 38 66 63 66 66 35 31 65 31 39 65 62 62 64 35 35 65 39 30 33 63 61 66 66 38 64 65 37 39 35 38 37 34 64 38 30 34 37 64 31 65 34 64 63 32 61 33 30 61 31 35 32 66 66 64 36 63 64 30 37 32 39 65 39 37 64 35 39 61 64 37 35 66 36 36 63 61 38 33 32 35 33 64 65 66 63 64 33 30 62 64 65 34 31 63 38 37 65 61 65 31 34 66 61 33 39 38 66 32 36 65 34 31 30 61 64 36 37 63 63 35 36 61 35 65 32 34 36 65 34 34 34 37 36 34 61 66 32 32 64 36 31 39 66 33 65 36 37 38 65 66 34 31 30 63 38 65 61 38 62 39 38 33 65 63 65 37 31 39 35 31 35 63 36 35 37 38 66 32 30 62 35 35 39 62 33 65 39 35 34 32 30 65 34 37 66 63 63 66 65 37 66 61 37 38 65 65 38 64 32 35 34 65 37 33 37 63 65 31 63 33 31 35 64 35 61 32 30 65 38 32 34 37 62 30 61 37 38 62 38 65 63 38 34 65 30 38 37 32 38 35 38 66 38 35 64 37 33 32 35 66 34 32 65 35 64 66 37 66 63 65 63 38 64 66 33 33 63 36 35 61 35 65 64 34 65 38 63 38 35 66 65 37 33 33 39 31 [TRUNCATED]
                                                                Data Ascii: 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 [TRUNCATED]
                                                                Nov 5, 2024 02:14:53.989487886 CET92INData Raw: 30 66 37 61 62 31 66 63 30 65 38 37 32 61 66 65 33 65 33 66 30 30 32 32 31 37 35 64 39 31 66 63 35 63 66 31 33 61 63 35 39 66 65 34 62 32 33 37 39 62 33 64 33 34 31 62 61 38 64 31 34 30 30 32 37 66 34 63 66 32 65 63 64 63 39 39 63 64 64 64 38 62
                                                                Data Ascii: 0f7ab1fc0e872afe3e3f0022175d91fc5cf13ac59fe4b2379b3d341ba8d140027f4cf2ecdc99cddd8b0530


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.449742185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:14:54.118097067 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:55.039716005 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:54 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.449743185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:14:55.165520906 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:56.088007927 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:55 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.449744185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:14:56.212852001 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:57.128855944 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:56 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:14:57.238260031 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:57.544930935 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:57 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.449755185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:14:57.665504932 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:58.581949949 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:58 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:14:58.691534042 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:14:58.994968891 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:58 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.449766185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:14:59.120238066 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:00.072999001 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:14:59 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.449772185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:00.199671984 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:01.120040894 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:00 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                8192.168.2.449778185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:01.243930101 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:02.187577963 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:02 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                9192.168.2.449784185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:02.306371927 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:03.241441011 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:03 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                10192.168.2.449795185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:03.368532896 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:04.281600952 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:04 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                11192.168.2.449801185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:04.415895939 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:05.349641085 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:05 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:05.457112074 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:05.765630007 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:05 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                12192.168.2.449807185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:05.884589911 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:07.624946117 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:06 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:07.625124931 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:06 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:07.625180960 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:06 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                13192.168.2.449813185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:07.796719074 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:08.712713003 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:08 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                14192.168.2.449824185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:08.837677956 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:09.741288900 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:09 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                15192.168.2.449830185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:09.869139910 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:10.792814016 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:10 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                16192.168.2.449835185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:10.916002989 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:11.835649014 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:11 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                17192.168.2.449841185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:11.962661028 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:12.866600990 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:12 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:12.973925114 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:13.283210993 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:13 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                18192.168.2.449850185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:13.551901102 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:14.463622093 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:14 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                19192.168.2.449857185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:14.588634014 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:15.528147936 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:15 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                20192.168.2.449863185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:15.650852919 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:16.578191042 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:16 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                21192.168.2.449868185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:16.697303057 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:17.617749929 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:17 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                22192.168.2.449875185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:17.743571997 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:18.668437958 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:18 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                23192.168.2.449880185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:18.850919008 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:19.767070055 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:19 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                24192.168.2.449888185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:19.905107975 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:20.821425915 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:20 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                25192.168.2.449894185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:20.946719885 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:21.893534899 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:21 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:22.003844023 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:22.318644047 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:22 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:22.425765991 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:22.735111952 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:22 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:22.847554922 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:23.162820101 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:23 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:23.274218082 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:23.583112001 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:23 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:23.691534996 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:24.001549006 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:23 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                26192.168.2.449913185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:24.196854115 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:25.095529079 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:24 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:25.206969023 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:25.516474009 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:25 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:25.628530025 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:25.931149960 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:25 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                27192.168.2.44991589.105.201.18320237112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:25.242810011 CET154INGET /cfg/poly-0004f2bd743f.cfg HTTP/1.1
                                                                User-Agent: PolycomVVX-VVX_410-UA/5.4.1.18405
                                                                Host: endpoints5-scl.5060sip.com
                                                                Proxy-Connection: Keep-Alive
                                                                Nov 5, 2024 02:15:26.643835068 CET913OUTHTTP/1.1 404 404
                                                                Date: Tue, 05 Nov 2024 01:15:25 GMT
                                                                Server: Apache/2.4.52 (Ubuntu)
                                                                Access-Control-Allow-Origin: *
                                                                Content-Type: text/html;charset=utf-8
                                                                Content-Language: en
                                                                Transfer-Encoding: chunked
                                                                Data Raw: 32 62 33 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 48 54 54 50 20 53 74 61 74 75 73 20 34 30 34 20 e2 80 93 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 62 6f 64 79 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 7d 20 68 31 2c 20 68 32 2c 20 68 33 2c 20 62 20 7b 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 32 35 44 37 36 3b 7d 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 32 32 70 78 3b 7d 20 68 32 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 36 70 78 3b 7d 20 68 33 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 7d 20 70 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 7d 20 61 20 7b 63 6f 6c 6f 72 3a 62 6c 61 63 6b 3b 7d 20 2e 6c 69 6e 65 20 7b 68 65 69 67 68 74 3a 31 70 78 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f [TRUNCATED]
                                                                Data Ascii: 2b3<!doctype html><html lang="en"><head><title>HTTP Status 404 Not Found</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 404 Not Found</h1><hr class="line" /><p><b>Type</b> Status Report</p><p><b>Description</b> The origin server did not find a current representation for the target resource or is not willing to disclose that one exists.</p><hr class="line" /><h3>Apache Tomcat/9.0.58 (Ubuntu)</h3></body></html>0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                28192.168.2.449914199.101.131.210807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:25.242985964 CET154OUTGET /cfg/poly-0004f2bd743f.cfg HTTP/1.1
                                                                User-Agent: PolycomVVX-VVX_410-UA/5.4.1.18405
                                                                Host: endpoints5-scl.5060sip.com
                                                                Proxy-Connection: Keep-Alive
                                                                Nov 5, 2024 02:15:26.643105984 CET913INHTTP/1.1 404 404
                                                                Date: Tue, 05 Nov 2024 01:15:25 GMT
                                                                Server: Apache/2.4.52 (Ubuntu)
                                                                Access-Control-Allow-Origin: *
                                                                Content-Type: text/html;charset=utf-8
                                                                Content-Language: en
                                                                Transfer-Encoding: chunked
                                                                Data Raw: 32 62 33 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 48 54 54 50 20 53 74 61 74 75 73 20 34 30 34 20 e2 80 93 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 62 6f 64 79 20 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 54 61 68 6f 6d 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 7d 20 68 31 2c 20 68 32 2c 20 68 33 2c 20 62 20 7b 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 32 35 44 37 36 3b 7d 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 32 32 70 78 3b 7d 20 68 32 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 36 70 78 3b 7d 20 68 33 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 7d 20 70 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 7d 20 61 20 7b 63 6f 6c 6f 72 3a 62 6c 61 63 6b 3b 7d 20 2e 6c 69 6e 65 20 7b 68 65 69 67 68 74 3a 31 70 78 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f [TRUNCATED]
                                                                Data Ascii: 2b3<!doctype html><html lang="en"><head><title>HTTP Status 404 Not Found</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 404 Not Found</h1><hr class="line" /><p><b>Type</b> Status Report</p><p><b>Description</b> The origin server did not find a current representation for the target resource or is not willing to disclose that one exists.</p><hr class="line" /><h3>Apache Tomcat/9.0.58 (Ubuntu)</h3></body></html>0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                29192.168.2.449926185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:26.056333065 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:27.010674953 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:26 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                30192.168.2.449933185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:27.234129906 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:28.133186102 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:28 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                31192.168.2.449941185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:28.258877993 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:29.159308910 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:29 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:29.269623041 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:29.570806980 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:29 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                32192.168.2.449949185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:30.071664095 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:30.984838963 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:30 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                33192.168.2.449959185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:31.103532076 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:32.026905060 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:31 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                34192.168.2.449966185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:32.150043011 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:33.060305119 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:32 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                35192.168.2.449972185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:33.181283951 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:34.107084990 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:33 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                36192.168.2.449978185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:34.228122950 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:35.167972088 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:35 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                37192.168.2.449984185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:35.291455030 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:36.213778019 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:36 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                38192.168.2.449993185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:36.337260962 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:37.260365963 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:37 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                39192.168.2.450000185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:37.383944035 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:38.282339096 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:38 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:38.394481897 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:38.694845915 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:38 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                40192.168.2.450007185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:38.826977968 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:39.768481970 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:39 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                41192.168.2.450016185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:39.884989977 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:40.808901072 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:40 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                42192.168.2.450022185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:40.931548119 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:41.841882944 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:41 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                43192.168.2.450030185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:41.963979006 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:42.876575947 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:42 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:42.988270044 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:43.296240091 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:43 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                44192.168.2.450039185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:43.415334940 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:44.337795973 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:44 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                45192.168.2.450045185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:44.462308884 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:45.383307934 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:45 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                46192.168.2.450050185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:45.508907080 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:46.434077024 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:46 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                47192.168.2.450051185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:46.557611942 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:47.470503092 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:47 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20
                                                                Nov 5, 2024 02:15:47.581784964 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:47.884053946 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:47 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                48192.168.2.450052185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:48.008928061 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:48.928807974 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:48 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                49192.168.2.450053185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:49.040009975 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:49.984164953 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:49 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                50192.168.2.450054185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:50.102724075 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:51.054639101 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:50 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                51192.168.2.450055185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:51.181107998 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:52.094575882 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:51 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                52192.168.2.450056185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:52.212630987 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:53.267668962 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:53 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                53192.168.2.450057185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:53.401473999 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:54.323297024 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:54 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                54192.168.2.450058185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:54.449378014 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:55.382477999 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:55 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                55192.168.2.450059185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:55.510847092 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:56.434573889 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:56 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                56192.168.2.450060185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:56.906712055 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:57.844975948 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:57 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                57192.168.2.450061185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:57.964548111 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:58.911030054 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:58 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                58192.168.2.450062185.208.158.202807112C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 5, 2024 02:15:59.033468962 CET322OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e89d874f845a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff812c0e8939339c46a HTTP/1.1
                                                                Host: bbdxzzh.com
                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                Nov 5, 2024 02:15:59.952490091 CET220INHTTP/1.1 200 OK
                                                                Server: nginx/1.20.1
                                                                Date: Tue, 05 Nov 2024 01:15:59 GMT
                                                                Content-Type: text/html; charset=UTF-8
                                                                Transfer-Encoding: chunked
                                                                Connection: keep-alive
                                                                X-Powered-By: PHP/7.4.33
                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                Data Ascii: e67b680813008c20


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:20:13:53
                                                                Start date:04/11/2024
                                                                Path:C:\Users\user\Desktop\OFjT8HmzFJ.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\OFjT8HmzFJ.exe"
                                                                Imagebase:0x400000
                                                                File size:6'401'622 bytes
                                                                MD5 hash:C776A9EFDABA18F15A5F554AE52C0385
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:1
                                                                Start time:20:13:53
                                                                Start date:04/11/2024
                                                                Path:C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-DB66J.tmp\OFjT8HmzFJ.tmp" /SL5="$2041C,6149981,54272,C:\Users\user\Desktop\OFjT8HmzFJ.exe"
                                                                Imagebase:0x400000
                                                                File size:699'904 bytes
                                                                MD5 hash:0D05E478EC0E67B3670C32F7FCD99AC2
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:2
                                                                Start time:20:13:55
                                                                Start date:04/11/2024
                                                                Path:C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\SyncPlayer 1.2.8\syncplayer32_64.exe" -i
                                                                Imagebase:0x400000
                                                                File size:2'565'120 bytes
                                                                MD5 hash:5FBD9E9B8796E7B4A40FD070F0F43F8E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2901818594.0000000002A93000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:21.2%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:2.3%
                                                                  Total number of Nodes:1513
                                                                  Total number of Limit Nodes:21
                                                                  execution_graph 5095 409d41 5132 409984 5095->5132 5097 409d46 5139 402f24 5097->5139 5099 409d4b 5100 4096e8 15 API calls 5099->5100 5104 409d50 5100->5104 5101 409da3 5102 4026c4 GetSystemTime 5101->5102 5103 409da8 5102->5103 5105 409254 32 API calls 5103->5105 5104->5101 5107 408cfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5104->5107 5106 409db0 5105->5106 5108 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5106->5108 5109 409d7f 5107->5109 5110 409dbd 5108->5110 5112 409d87 MessageBoxA 5109->5112 5111 406888 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 5110->5111 5114 409dca 5111->5114 5112->5101 5113 409d94 5112->5113 5115 4057b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5113->5115 5116 406620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 5114->5116 5115->5101 5117 409dda 5116->5117 5118 406598 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 5117->5118 5119 409deb 5118->5119 5120 403340 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5119->5120 5121 409df9 5120->5121 5122 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5121->5122 5123 409e09 5122->5123 5124 407440 23 API calls 5123->5124 5125 409e48 5124->5125 5126 402594 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5125->5126 5127 409e68 5126->5127 5128 40794c LocalAlloc TlsSetValue TlsGetValue TlsGetValue InterlockedExchange 5127->5128 5129 409eaa 5128->5129 5130 407bdc 23 API calls 5129->5130 5131 409ed1 5130->5131 5133 4099a5 5132->5133 5134 40998d 5132->5134 5136 4057e0 4 API calls 5133->5136 5144 4057e0 5134->5144 5137 4099b6 5136->5137 5137->5097 5138 40999f 5138->5097 5140 403154 4 API calls 5139->5140 5141 402f29 5140->5141 5180 402bcc 5141->5180 5143 402f51 5143->5143 5145 4057e7 5144->5145 5148 4031e8 5145->5148 5149 4031ec 5148->5149 5151 4031fc 5148->5151 5149->5151 5154 403254 5149->5154 5150 403228 5150->5138 5151->5150 5159 4025ac 5151->5159 5155 403274 5154->5155 5156 403258 5154->5156 5155->5151 5163 402594 5156->5163 5160 4025b0 5159->5160 5161 4025ba 5159->5161 5160->5161 5162 403154 4 API calls 5160->5162 5161->5150 5161->5161 5162->5161 5164 402598 5163->5164 5166 4025a2 5163->5166 5164->5166 5167 403154 5164->5167 5166->5151 5168 403164 5167->5168 5169 40318c TlsGetValue 5167->5169 5168->5166 5170 403196 5169->5170 5171 40316f 5169->5171 5170->5166 5175 40310c 5171->5175 5173 403174 TlsGetValue 5174 403184 5173->5174 5174->5166 5176 403120 LocalAlloc 5175->5176 5177 403116 5175->5177 5178 403132 5176->5178 5179 40313e TlsSetValue 5176->5179 5177->5176 5178->5173 5179->5178 5181 402bd5 RaiseException 5180->5181 5182 402be6 5180->5182 5181->5182 5182->5143 6181 408f42 6182 408f34 6181->6182 6183 408ed0 Wow64RevertWow64FsRedirection 6182->6183 6184 408f3c 6183->6184 6185 408f44 SetLastError 6186 408f4d 6185->6186 6187 402b48 RaiseException 6194 40294a 6197 402952 6194->6197 6195 403554 4 API calls 6195->6197 6196 402967 6197->6195 6197->6196 6198 403f4a 6199 403f53 6198->6199 6200 403f5c 6198->6200 6202 403f07 6199->6202 6205 403f09 6202->6205 6204 403f3c 6204->6200 6207 403e9c 6205->6207 6208 403154 4 API calls 6205->6208 6212 403f3d 6205->6212 6225 403e9c 6205->6225 6206 403ef2 6210 402674 4 API calls 6206->6210 6207->6204 6207->6206 6214 403ea9 6207->6214 6216 403e8e 6207->6216 6208->6205 6213 403ecf 6210->6213 6212->6200 6213->6200 6214->6213 6215 402674 4 API calls 6214->6215 6215->6213 6218 403e4c 6216->6218 6217 403e67 6223 403e78 6217->6223 6224 402674 4 API calls 6217->6224 6218->6217 6219 403e62 6218->6219 6220 403e7b 6218->6220 6221 403cc8 4 API calls 6219->6221 6222 402674 4 API calls 6220->6222 6221->6217 6222->6223 6223->6206 6223->6214 6224->6223 6226 403ed7 6225->6226 6230 403ea9 6225->6230 6227 403ef2 6226->6227 6228 403e8e 4 API calls 6226->6228 6229 402674 4 API calls 6227->6229 6231 403ee6 6228->6231 6232 403ecf 6229->6232 6230->6232 6233 402674 4 API calls 6230->6233 6231->6227 6231->6230 6232->6205 6233->6232 5883 403a52 5884 403a5a WriteFile 5883->5884 5886 403a74 5883->5886 5885 403a78 GetLastError 5884->5885 5884->5886 5885->5886 5887 402654 5888 403154 4 API calls 5887->5888 5889 402614 5888->5889 5890 402632 5889->5890 5891 403154 4 API calls 5889->5891 5891->5890 5892 408e54 5895 408d20 5892->5895 5896 408d29 5895->5896 5897 403198 4 API calls 5896->5897 5898 408d37 5896->5898 5897->5896 6238 40755a GetFileSize 6239 407586 6238->6239 6240 407576 GetLastError 6238->6240 6240->6239 6241 40757f 6240->6241 6242 4073ec 21 API calls 6241->6242 6242->6239 6243 406f5b 6244 406f68 SetErrorMode 6243->6244 6249 40a161 6250 40a0d3 6249->6250 6251 40a0ff 6250->6251 6252 4093fc 9 API calls 6250->6252 6253 40a118 6251->6253 6256 40a112 RemoveDirectoryA 6251->6256 6252->6251 6254 40a121 73A25CF0 6253->6254 6255 40a12c 6253->6255 6254->6255 6257 40a154 6255->6257 6258 40357c 4 API calls 6255->6258 6256->6253 6259 40a14a 6258->6259 6260 4025ac 4 API calls 6259->6260 6260->6257 5903 402e64 5904 402e69 5903->5904 5905 402e7a RtlUnwind 5904->5905 5906 402e5e 5904->5906 5907 402e9d 5905->5907 6265 40a168 6266 40a16f 6265->6266 6268 40a19a 6265->6268 6275 40936c 6266->6275 6270 403198 4 API calls 6268->6270 6269 40a174 6269->6268 6273 40a192 MessageBoxA 6269->6273 6271 40a1d2 6270->6271 6272 403198 4 API calls 6271->6272 6274 40a1da 6272->6274 6273->6268 6276 4093d3 ExitWindowsEx 6275->6276 6277 409378 GetCurrentProcess OpenProcessToken 6275->6277 6279 40938a 6276->6279 6278 40938e LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6277->6278 6277->6279 6278->6276 6278->6279 6279->6269 5675 406f77 5676 406f68 SetErrorMode 5675->5676 6292 403f7d 6293 403fa2 6292->6293 6296 403f84 6292->6296 6295 403e8e 4 API calls 6293->6295 6293->6296 6294 403f8c 6295->6296 6296->6294 6297 402674 4 API calls 6296->6297 6298 403fca 6297->6298 6299 403d02 6306 403d12 6299->6306 6300 403ddf ExitProcess 6301 403db8 6303 403cc8 4 API calls 6301->6303 6302 403dea 6304 403dc2 6303->6304 6305 403cc8 4 API calls 6304->6305 6307 403dcc 6305->6307 6306->6300 6306->6301 6306->6302 6308 403da4 6306->6308 6309 403d8f MessageBoxA 6306->6309 6319 4019dc 6307->6319 6315 403fe4 6308->6315 6309->6301 6312 403dd1 6312->6300 6312->6302 6316 403fe8 6315->6316 6317 403f07 4 API calls 6316->6317 6318 404006 6317->6318 6320 401abb 6319->6320 6321 4019ed 6319->6321 6320->6312 6322 401a04 RtlEnterCriticalSection 6321->6322 6323 401a0e LocalFree 6321->6323 6322->6323 6324 401a41 6323->6324 6325 401a2f VirtualFree 6324->6325 6326 401a49 6324->6326 6325->6324 6327 401a70 LocalFree 6326->6327 6328 401a87 6326->6328 6327->6327 6327->6328 6329 401aa9 RtlDeleteCriticalSection 6328->6329 6330 401a9f RtlLeaveCriticalSection 6328->6330 6329->6312 6330->6329 5916 404206 5917 40420a 5916->5917 5918 4041cc 5916->5918 5919 403154 4 API calls 5917->5919 5920 404282 5917->5920 5921 404323 5919->5921 5922 402c08 5923 402c82 5922->5923 5926 402c19 5922->5926 5924 402c56 RtlUnwind 5925 403154 4 API calls 5924->5925 5925->5923 5926->5923 5926->5924 5929 402b28 5926->5929 5930 402b31 RaiseException 5929->5930 5931 402b47 5929->5931 5930->5931 5931->5924 6341 409f0b 6342 409984 4 API calls 6341->6342 6343 409f10 6342->6343 6344 409f15 6343->6344 6345 402f24 5 API calls 6343->6345 6346 407878 InterlockedExchange 6344->6346 6345->6344 6347 409f3f 6346->6347 6348 409f4f 6347->6348 6349 409984 4 API calls 6347->6349 6350 40760c 22 API calls 6348->6350 6349->6348 6351 409f6b 6350->6351 6352 4025ac 4 API calls 6351->6352 6353 409fa2 6352->6353 5863 40760c SetEndOfFile 5864 407623 5863->5864 5865 40761c 5863->5865 5866 4073ec 21 API calls 5865->5866 5866->5864 5932 403018 5933 403025 5932->5933 5937 403070 5932->5937 5934 40302a RtlUnwind 5933->5934 5935 40304e 5934->5935 5938 402f78 5935->5938 5939 402be8 5935->5939 5940 402bf1 RaiseException 5939->5940 5941 402c04 5939->5941 5940->5941 5941->5937 5946 407c23 5949 407c29 5946->5949 5947 40322c 4 API calls 5948 407cc1 5947->5948 5950 4032fc 4 API calls 5948->5950 5949->5947 5951 407ccb 5950->5951 5952 4057e0 4 API calls 5951->5952 5953 407cda 5952->5953 5954 403198 4 API calls 5953->5954 5955 407cf4 5954->5955 5183 407524 SetFilePointer 5184 407557 5183->5184 5185 407547 GetLastError 5183->5185 5185->5184 5186 407550 5185->5186 5188 4073ec GetLastError 5186->5188 5191 40734c 5188->5191 5200 4071e4 FormatMessageA 5191->5200 5194 407394 5196 4057e0 4 API calls 5194->5196 5197 4073a3 5196->5197 5207 403198 5197->5207 5201 40720a 5200->5201 5211 403278 5201->5211 5204 4050e4 5216 4050f8 5204->5216 5208 4031b7 5207->5208 5209 40319e 5207->5209 5208->5184 5209->5208 5210 4025ac 4 API calls 5209->5210 5210->5208 5212 403254 4 API calls 5211->5212 5213 403288 5212->5213 5214 403198 4 API calls 5213->5214 5215 4032a0 5214->5215 5215->5194 5215->5204 5217 405115 5216->5217 5224 404da8 5217->5224 5220 405141 5222 403278 4 API calls 5220->5222 5223 4050f3 5222->5223 5223->5194 5227 404dc3 5224->5227 5225 404dd5 5225->5220 5229 404b34 5225->5229 5227->5225 5232 404eca 5227->5232 5239 404d9c 5227->5239 5330 405890 5229->5330 5231 404b45 5231->5220 5233 404edb 5232->5233 5237 404f29 5232->5237 5235 404faf 5233->5235 5233->5237 5238 404f47 5235->5238 5246 404d88 5235->5246 5237->5238 5242 404d44 5237->5242 5238->5227 5240 403198 4 API calls 5239->5240 5241 404da6 5240->5241 5241->5227 5243 404d52 5242->5243 5249 404b4c 5243->5249 5245 404d80 5245->5237 5269 4039a4 5246->5269 5252 405900 5249->5252 5251 404b65 5251->5245 5253 40590e 5252->5253 5262 404c2c LoadStringA 5253->5262 5256 4050e4 19 API calls 5257 405946 5256->5257 5258 4031e8 4 API calls 5257->5258 5259 405951 5258->5259 5265 4031b8 5259->5265 5263 403278 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5262->5263 5264 404c59 5263->5264 5264->5256 5267 4031be 5265->5267 5266 4031e3 5266->5251 5267->5266 5268 4025ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5267->5268 5268->5267 5270 4039ab 5269->5270 5275 4038b4 5270->5275 5272 4039cb 5273 403198 4 API calls 5272->5273 5274 4039d2 5273->5274 5274->5238 5276 4038d5 5275->5276 5277 4038c8 5275->5277 5279 403934 5276->5279 5280 4038db 5276->5280 5303 403780 5277->5303 5281 403993 5279->5281 5282 40393b 5279->5282 5284 4038e1 5280->5284 5285 4038ee 5280->5285 5286 4037f4 3 API calls 5281->5286 5287 403941 5282->5287 5288 40394b 5282->5288 5283 4038d0 5283->5272 5310 403894 5284->5310 5290 403894 6 API calls 5285->5290 5286->5283 5325 403864 5287->5325 5292 4037f4 3 API calls 5288->5292 5293 4038fc 5290->5293 5294 40395d 5292->5294 5315 4037f4 5293->5315 5297 403864 9 API calls 5294->5297 5296 403917 5321 40374c 5296->5321 5298 403976 5297->5298 5301 40374c VariantClear 5298->5301 5300 40392c 5300->5272 5302 40398b 5301->5302 5302->5272 5304 4037f0 5303->5304 5305 403744 5303->5305 5304->5283 5305->5303 5306 403793 VariantClear 5305->5306 5307 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5305->5307 5308 4037dc VariantCopyInd 5305->5308 5309 4037ab 5305->5309 5306->5305 5307->5305 5308->5304 5308->5305 5309->5283 5311 4036b8 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5310->5311 5312 4038a0 5311->5312 5313 40374c VariantClear 5312->5313 5314 4038a9 5313->5314 5314->5283 5316 403845 VariantChangeTypeEx 5315->5316 5317 40380a VariantChangeTypeEx 5315->5317 5320 403832 5316->5320 5318 403826 5317->5318 5319 40374c VariantClear 5318->5319 5319->5320 5320->5296 5322 403766 5321->5322 5323 403759 5321->5323 5322->5300 5323->5322 5324 403779 VariantClear 5323->5324 5324->5300 5326 40369c 8 API calls 5325->5326 5327 40387b 5326->5327 5328 40374c VariantClear 5327->5328 5329 403882 5328->5329 5329->5283 5331 40589c 5330->5331 5332 404c2c 5 API calls 5331->5332 5333 4058c2 5332->5333 5334 4031e8 4 API calls 5333->5334 5335 4058cd 5334->5335 5336 403198 4 API calls 5335->5336 5337 4058e2 5336->5337 5337->5231 5338 409b24 5377 4030dc 5338->5377 5340 409b3a 5380 4042e8 5340->5380 5342 409b3f 5383 406518 5342->5383 5346 409b49 5393 408fc8 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5346->5393 5355 4031e8 4 API calls 5356 409b95 5355->5356 5429 407440 5356->5429 5361 409984 4 API calls 5363 409c22 5361->5363 5449 407400 5363->5449 5365 409be4 5365->5361 5365->5363 5366 409c63 5453 40794c 5366->5453 5367 409c48 5367->5366 5368 409984 4 API calls 5367->5368 5368->5366 5370 409c88 5463 408a2c 5370->5463 5374 409d07 5375 408a2c 23 API calls 5376 409cce 5375->5376 5376->5374 5376->5375 5485 403094 5377->5485 5379 4030e1 GetModuleHandleA GetCommandLineA 5379->5340 5381 403154 4 API calls 5380->5381 5382 404323 5380->5382 5381->5382 5382->5342 5486 405bf8 5383->5486 5392 406564 6F551CD0 5392->5346 5394 40901b 5393->5394 5576 406f00 SetErrorMode 5394->5576 5397 4071e4 5 API calls 5398 40904b 5397->5398 5399 403198 4 API calls 5398->5399 5400 409060 5399->5400 5401 409a14 GetSystemInfo VirtualQuery 5400->5401 5402 409ac8 5401->5402 5405 409a3e 5401->5405 5407 409580 5402->5407 5403 409aa9 VirtualQuery 5403->5402 5403->5405 5404 409a68 VirtualProtect 5404->5405 5405->5402 5405->5403 5405->5404 5406 409a97 VirtualProtect 5405->5406 5406->5403 5582 406b30 GetCommandLineA 5407->5582 5409 40963d 5411 4031b8 4 API calls 5409->5411 5410 406b8c 6 API calls 5414 40959d 5410->5414 5412 409657 5411->5412 5415 406b8c 5412->5415 5413 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5413->5414 5414->5409 5414->5410 5414->5413 5416 406bb3 GetModuleFileNameA 5415->5416 5417 406bd7 GetCommandLineA 5415->5417 5418 403278 4 API calls 5416->5418 5421 406bdc 5417->5421 5419 406bd5 5418->5419 5423 406c04 5419->5423 5420 406be1 5424 403198 4 API calls 5420->5424 5421->5420 5422 406a50 4 API calls 5421->5422 5425 406be9 5421->5425 5422->5421 5426 403198 4 API calls 5423->5426 5424->5425 5427 40322c 4 API calls 5425->5427 5428 406c19 5426->5428 5427->5423 5428->5355 5430 40744a 5429->5430 5603 4074d6 5430->5603 5606 4074d8 5430->5606 5431 407476 5432 40748a 5431->5432 5433 4073ec 21 API calls 5431->5433 5436 409ad0 FindResourceA 5432->5436 5433->5432 5437 409ae5 5436->5437 5438 409aea SizeofResource 5436->5438 5439 409984 4 API calls 5437->5439 5440 409af7 5438->5440 5441 409afc LoadResource 5438->5441 5439->5438 5442 409984 4 API calls 5440->5442 5443 409b0a 5441->5443 5444 409b0f LockResource 5441->5444 5442->5441 5445 409984 4 API calls 5443->5445 5446 409b20 5444->5446 5447 409b1b 5444->5447 5445->5444 5446->5365 5479 407878 5446->5479 5448 409984 4 API calls 5447->5448 5448->5446 5450 407414 5449->5450 5451 407424 5450->5451 5452 40734c 20 API calls 5450->5452 5451->5367 5452->5451 5454 407959 5453->5454 5455 4057e0 4 API calls 5454->5455 5456 4079ad 5454->5456 5455->5456 5457 407878 InterlockedExchange 5456->5457 5458 4079bf 5457->5458 5459 4057e0 4 API calls 5458->5459 5460 4079d5 5458->5460 5459->5460 5461 407a18 5460->5461 5462 4057e0 4 API calls 5460->5462 5461->5370 5462->5461 5467 408a5d 5463->5467 5469 408aa6 5463->5469 5464 408af1 5618 407bdc 5464->5618 5465 407bdc 23 API calls 5465->5467 5466 407bdc 23 API calls 5466->5469 5467->5465 5467->5469 5475 403420 4 API calls 5467->5475 5476 4031e8 4 API calls 5467->5476 5609 4034f0 5467->5609 5469->5464 5469->5466 5472 4034f0 4 API calls 5469->5472 5477 403420 4 API calls 5469->5477 5478 4031e8 4 API calls 5469->5478 5471 408b08 5473 4031b8 4 API calls 5471->5473 5472->5469 5474 408b22 5473->5474 5482 404b70 5474->5482 5475->5467 5476->5467 5477->5469 5478->5469 5671 407824 5479->5671 5483 402594 4 API calls 5482->5483 5484 404b7b 5483->5484 5484->5376 5485->5379 5487 405890 5 API calls 5486->5487 5488 405c09 5487->5488 5489 4051d0 GetSystemDefaultLCID 5488->5489 5493 405206 5489->5493 5490 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5490->5493 5491 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5491->5493 5492 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5492->5493 5493->5490 5493->5491 5493->5492 5497 405268 5493->5497 5494 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5494->5497 5495 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5495->5497 5496 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5496->5497 5497->5494 5497->5495 5497->5496 5498 4052eb 5497->5498 5499 4031b8 4 API calls 5498->5499 5500 405305 5499->5500 5501 405314 GetSystemDefaultLCID 5500->5501 5558 40515c GetLocaleInfoA 5501->5558 5504 4031e8 4 API calls 5505 405354 5504->5505 5506 40515c 5 API calls 5505->5506 5507 405369 5506->5507 5508 40515c 5 API calls 5507->5508 5509 40538d 5508->5509 5564 4051a8 GetLocaleInfoA 5509->5564 5512 4051a8 GetLocaleInfoA 5513 4053bd 5512->5513 5514 40515c 5 API calls 5513->5514 5515 4053d7 5514->5515 5516 4051a8 GetLocaleInfoA 5515->5516 5517 4053f4 5516->5517 5518 40515c 5 API calls 5517->5518 5519 40540e 5518->5519 5520 4031e8 4 API calls 5519->5520 5521 40541b 5520->5521 5522 40515c 5 API calls 5521->5522 5523 405430 5522->5523 5524 4031e8 4 API calls 5523->5524 5525 40543d 5524->5525 5526 4051a8 GetLocaleInfoA 5525->5526 5527 40544b 5526->5527 5528 40515c 5 API calls 5527->5528 5529 405465 5528->5529 5530 4031e8 4 API calls 5529->5530 5531 405472 5530->5531 5532 40515c 5 API calls 5531->5532 5533 405487 5532->5533 5534 4031e8 4 API calls 5533->5534 5535 405494 5534->5535 5536 40515c 5 API calls 5535->5536 5537 4054a9 5536->5537 5538 4054c6 5537->5538 5539 4054b7 5537->5539 5541 40322c 4 API calls 5538->5541 5572 40322c 5539->5572 5542 4054c4 5541->5542 5543 40515c 5 API calls 5542->5543 5544 4054e8 5543->5544 5545 405505 5544->5545 5546 4054f6 5544->5546 5548 403198 4 API calls 5545->5548 5547 40322c 4 API calls 5546->5547 5549 405503 5547->5549 5548->5549 5566 4033b4 5549->5566 5551 405527 5552 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5551->5552 5553 405541 5552->5553 5554 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5553->5554 5555 40555b 5554->5555 5556 405c44 GetVersionExA 5555->5556 5557 405c5b 5556->5557 5557->5392 5559 405183 5558->5559 5560 405195 5558->5560 5561 403278 4 API calls 5559->5561 5562 40322c 4 API calls 5560->5562 5563 405193 5561->5563 5562->5563 5563->5504 5565 4051c4 5564->5565 5565->5512 5567 4033bc 5566->5567 5568 403254 4 API calls 5567->5568 5569 4033cf 5568->5569 5570 4031e8 4 API calls 5569->5570 5571 4033f7 5570->5571 5574 403230 5572->5574 5573 403252 5573->5542 5574->5573 5575 4025ac 4 API calls 5574->5575 5575->5573 5580 403414 5576->5580 5579 406f4e 5579->5397 5581 403418 LoadLibraryA 5580->5581 5581->5579 5589 406a50 5582->5589 5584 406b53 5585 406b65 5584->5585 5586 406a50 4 API calls 5584->5586 5587 403198 4 API calls 5585->5587 5586->5584 5588 406b7a 5587->5588 5588->5414 5590 406a7c 5589->5590 5591 403278 4 API calls 5590->5591 5592 406a89 5591->5592 5599 403420 5592->5599 5594 406a91 5595 4031e8 4 API calls 5594->5595 5596 406aa9 5595->5596 5597 403198 4 API calls 5596->5597 5598 406acb 5597->5598 5598->5584 5600 403426 5599->5600 5602 403437 5599->5602 5601 403254 4 API calls 5600->5601 5600->5602 5601->5602 5602->5594 5604 4074d8 5603->5604 5605 407517 CreateFileA 5604->5605 5605->5431 5607 403414 5606->5607 5608 407517 CreateFileA 5607->5608 5608->5431 5610 4034fd 5609->5610 5617 40352d 5609->5617 5612 403526 5610->5612 5614 403509 5610->5614 5611 403198 4 API calls 5613 403517 5611->5613 5615 403254 4 API calls 5612->5615 5613->5467 5626 4025c4 5614->5626 5615->5617 5617->5611 5619 407bf7 5618->5619 5620 407bec 5618->5620 5641 407b80 5619->5641 5630 407dfc 5620->5630 5623 4057e0 4 API calls 5624 407bf5 5623->5624 5624->5471 5627 4025ca 5626->5627 5628 4025dc 5627->5628 5629 403154 4 API calls 5627->5629 5628->5613 5628->5628 5629->5628 5631 407e11 5630->5631 5633 407e20 5631->5633 5648 407d14 5631->5648 5634 407e5a 5633->5634 5635 407d14 19 API calls 5633->5635 5636 407e6e 5634->5636 5637 407d14 19 API calls 5634->5637 5635->5634 5640 407e9a 5636->5640 5645 407da4 5636->5645 5637->5636 5640->5624 5642 407bd3 5641->5642 5643 407b94 5641->5643 5642->5623 5642->5624 5643->5642 5659 407ad0 5643->5659 5646 407db3 VirtualFree 5645->5646 5647 407dc5 VirtualAlloc 5645->5647 5646->5647 5647->5640 5651 405814 5648->5651 5650 407d36 5650->5633 5652 405820 5651->5652 5653 4050e4 19 API calls 5652->5653 5654 40584d 5653->5654 5655 4031e8 4 API calls 5654->5655 5656 405858 5655->5656 5657 403198 4 API calls 5656->5657 5658 40586d 5657->5658 5658->5650 5660 407adb 5659->5660 5663 407aec 5659->5663 5661 4057e0 4 API calls 5660->5661 5661->5663 5662 407400 20 API calls 5664 407b00 5662->5664 5663->5662 5665 407400 20 API calls 5664->5665 5666 407b21 5665->5666 5667 407878 InterlockedExchange 5666->5667 5668 407b36 5667->5668 5669 407b4c 5668->5669 5670 4057e0 4 API calls 5668->5670 5669->5643 5670->5669 5672 407836 5671->5672 5673 407847 5671->5673 5674 40783b InterlockedExchange 5672->5674 5673->5365 5674->5673 5956 405a24 5957 405a2c 5956->5957 5960 405a34 5956->5960 5958 405a32 5957->5958 5959 405a3b 5957->5959 5963 40599c 5958->5963 5961 405890 5 API calls 5959->5961 5961->5960 5964 4059a4 5963->5964 5965 4059be 5964->5965 5966 403154 4 API calls 5964->5966 5967 4059c3 5965->5967 5968 4059da 5965->5968 5966->5964 5969 405890 5 API calls 5967->5969 5970 403154 4 API calls 5968->5970 5971 4059d6 5969->5971 5972 4059df 5970->5972 5974 403154 4 API calls 5971->5974 5973 405900 19 API calls 5972->5973 5973->5971 5975 405a08 5974->5975 5976 403154 4 API calls 5975->5976 5977 405a16 5976->5977 5977->5960 6362 409d26 6363 409d4b 6362->6363 6414 4096e8 6363->6414 6365 409da3 6442 4026c4 GetSystemTime 6365->6442 6367 409da8 6396 409254 6367->6396 6368 409d50 6368->6365 6435 408cfc 6368->6435 6372 4031e8 4 API calls 6374 409dbd 6372->6374 6373 409d7f 6376 409d87 MessageBoxA 6373->6376 6443 406888 6374->6443 6376->6365 6377 409d94 6376->6377 6438 4057b4 6377->6438 6383 409deb 6470 403340 6383->6470 6385 409df9 6386 4031e8 4 API calls 6385->6386 6387 409e09 6386->6387 6388 407440 23 API calls 6387->6388 6389 409e48 6388->6389 6390 402594 4 API calls 6389->6390 6391 409e68 6390->6391 6392 40794c 5 API calls 6391->6392 6393 409eaa 6392->6393 6394 407bdc 23 API calls 6393->6394 6395 409ed1 6394->6395 6405 409274 6396->6405 6399 409299 CreateDirectoryA 6400 409311 6399->6400 6401 4092a3 GetLastError 6399->6401 6402 40322c 4 API calls 6400->6402 6401->6405 6403 40931b 6402->6403 6407 4031b8 4 API calls 6403->6407 6404 408cfc 4 API calls 6404->6405 6405->6399 6405->6404 6406 404be4 19 API calls 6405->6406 6410 4071e4 5 API calls 6405->6410 6412 408ccc 4 API calls 6405->6412 6413 4057e0 4 API calls 6405->6413 6485 406c54 6405->6485 6508 409148 6405->6508 6406->6405 6408 409335 6407->6408 6409 4031b8 4 API calls 6408->6409 6411 409342 6409->6411 6410->6405 6411->6372 6412->6405 6413->6405 6415 409731 6414->6415 6421 4096f5 6414->6421 6416 40973a 6415->6416 6417 40973e 6415->6417 6418 409747 GetUserDefaultLangID 6416->6418 6427 40973c 6416->6427 6614 406f84 GetModuleHandleA GetProcAddress 6417->6614 6418->6427 6421->6415 6424 409721 6421->6424 6422 4097ef 6423 40969c 5 API calls 6422->6423 6425 409728 6423->6425 6426 40969c 5 API calls 6424->6426 6425->6368 6426->6425 6427->6422 6428 409791 6427->6428 6429 409787 GetACP 6427->6429 6430 40979e 6427->6430 6431 40969c 5 API calls 6428->6431 6429->6427 6429->6428 6430->6422 6432 4097e2 6430->6432 6433 4097d8 GetACP 6430->6433 6431->6425 6434 40969c 5 API calls 6432->6434 6433->6430 6433->6432 6434->6425 6436 408ccc 4 API calls 6435->6436 6437 408d18 6436->6437 6437->6373 6439 4057b9 6438->6439 6440 405890 5 API calls 6439->6440 6441 4057cb 6440->6441 6441->6441 6442->6367 6658 406780 6443->6658 6446 403454 4 API calls 6447 4068aa 6446->6447 6448 406620 6447->6448 6663 406844 6448->6663 6451 406650 6453 403340 4 API calls 6451->6453 6452 40665e 6454 403454 4 API calls 6452->6454 6455 40665c 6453->6455 6456 406671 6454->6456 6458 403198 4 API calls 6455->6458 6457 403340 4 API calls 6456->6457 6457->6455 6459 406693 6458->6459 6460 406598 6459->6460 6461 4065a2 6460->6461 6462 4065c5 6460->6462 6669 4068b0 6461->6669 6464 40322c 4 API calls 6462->6464 6466 4065ce 6464->6466 6465 4065a9 6465->6462 6467 4065b4 6465->6467 6466->6383 6468 403340 4 API calls 6467->6468 6469 4065c2 6468->6469 6469->6383 6471 403344 6470->6471 6472 4033a5 6470->6472 6473 4031e8 6471->6473 6474 40334c 6471->6474 6479 403254 4 API calls 6473->6479 6480 4031fc 6473->6480 6474->6472 6476 40335b 6474->6476 6477 4031e8 4 API calls 6474->6477 6475 403228 6475->6385 6478 403254 4 API calls 6476->6478 6477->6476 6482 403375 6478->6482 6479->6480 6480->6475 6481 4025ac 4 API calls 6480->6481 6481->6475 6483 4031e8 4 API calls 6482->6483 6484 4033a1 6483->6484 6484->6385 6527 4069b8 6485->6527 6488 406c86 6490 4069b8 5 API calls 6488->6490 6492 406cd2 6488->6492 6491 406c96 6490->6491 6493 406ca2 6491->6493 6495 406994 7 API calls 6491->6495 6535 4067e8 6492->6535 6493->6492 6496 406cc7 6493->6496 6499 4069b8 5 API calls 6493->6499 6495->6493 6496->6492 6547 406c28 GetWindowsDirectoryA 6496->6547 6501 406cbb 6499->6501 6500 406598 5 API calls 6502 406ce7 6500->6502 6501->6496 6503 406994 7 API calls 6501->6503 6504 40322c 4 API calls 6502->6504 6503->6496 6505 406cf1 6504->6505 6506 4031b8 4 API calls 6505->6506 6507 406d0b 6506->6507 6507->6405 6509 409168 6508->6509 6510 406598 5 API calls 6509->6510 6511 409181 6510->6511 6512 40322c 4 API calls 6511->6512 6517 40918c 6512->6517 6514 4068d8 6 API calls 6514->6517 6515 4033b4 4 API calls 6515->6517 6516 408cfc 4 API calls 6516->6517 6517->6514 6517->6515 6517->6516 6518 4057e0 4 API calls 6517->6518 6520 409208 6517->6520 6587 4090d4 6517->6587 6595 408f58 6517->6595 6518->6517 6521 40322c 4 API calls 6520->6521 6522 409213 6521->6522 6523 4031b8 4 API calls 6522->6523 6524 40922d 6523->6524 6525 403198 4 API calls 6524->6525 6526 409235 6525->6526 6526->6405 6528 4034f0 4 API calls 6527->6528 6529 4069cb 6528->6529 6530 4069e2 GetEnvironmentVariableA 6529->6530 6534 4069f5 6529->6534 6549 406d4c 6529->6549 6530->6529 6531 4069ee 6530->6531 6533 403198 4 API calls 6531->6533 6533->6534 6534->6488 6544 406994 6534->6544 6536 403414 6535->6536 6537 40680b GetFullPathNameA 6536->6537 6538 406817 6537->6538 6539 40682e 6537->6539 6538->6539 6540 40681f 6538->6540 6541 40322c 4 API calls 6539->6541 6542 403278 4 API calls 6540->6542 6543 40682c 6541->6543 6542->6543 6543->6500 6553 40693c 6544->6553 6548 406c49 6547->6548 6548->6492 6550 406d5a 6549->6550 6551 4034f0 4 API calls 6550->6551 6552 406d68 6551->6552 6552->6529 6560 4068d8 6553->6560 6555 40695e 6556 406966 GetFileAttributesA 6555->6556 6557 40697b 6556->6557 6558 403198 4 API calls 6557->6558 6559 406983 6558->6559 6559->6488 6570 4066a4 6560->6570 6562 4068e9 6564 406910 6562->6564 6577 4068d0 CharPrevA 6562->6577 6565 406926 6564->6565 6566 40691b 6564->6566 6578 403454 6565->6578 6567 40322c 4 API calls 6566->6567 6569 406924 6567->6569 6569->6555 6573 4066b5 6570->6573 6571 406719 6572 4065e0 IsDBCSLeadByte 6571->6572 6574 406714 6571->6574 6572->6574 6573->6571 6576 4066d3 6573->6576 6574->6562 6576->6574 6585 4065e0 IsDBCSLeadByte 6576->6585 6577->6562 6579 403486 6578->6579 6580 403459 6578->6580 6581 403198 4 API calls 6579->6581 6580->6579 6583 40346d 6580->6583 6582 40347c 6581->6582 6582->6569 6584 403278 4 API calls 6583->6584 6584->6582 6586 4065f4 6585->6586 6586->6576 6588 403198 4 API calls 6587->6588 6590 4090f5 6588->6590 6592 409122 6590->6592 6604 4032a8 6590->6604 6607 403494 6590->6607 6593 403198 4 API calls 6592->6593 6594 409137 6593->6594 6594->6517 6596 408e94 2 API calls 6595->6596 6597 408f6e 6596->6597 6598 408f72 6597->6598 6611 4069a8 6597->6611 6598->6517 6601 408fa5 6602 408ed0 Wow64RevertWow64FsRedirection 6601->6602 6603 408fad 6602->6603 6603->6517 6605 403278 4 API calls 6604->6605 6606 4032b5 6605->6606 6606->6590 6608 403498 6607->6608 6610 4034c3 6607->6610 6609 4034f0 4 API calls 6608->6609 6609->6610 6610->6590 6612 40693c 7 API calls 6611->6612 6613 4069b2 GetLastError 6612->6613 6613->6601 6615 406fc7 6614->6615 6633 406fbe 6614->6633 6616 406fd0 6615->6616 6617 407008 6615->6617 6635 406ec8 6616->6635 6618 406ec8 RegOpenKeyExA 6617->6618 6620 407021 6618->6620 6622 40703e 6620->6622 6624 406ebc 6 API calls 6620->6624 6621 406fe9 6621->6622 6638 406ebc 6621->6638 6625 40322c 4 API calls 6622->6625 6628 407035 RegCloseKey 6624->6628 6629 40704b 6625->6629 6626 403198 4 API calls 6630 407080 6626->6630 6628->6622 6631 4032fc 4 API calls 6629->6631 6632 403198 4 API calls 6630->6632 6631->6633 6634 407088 6632->6634 6633->6626 6634->6427 6636 406ed3 6635->6636 6637 406ed9 RegOpenKeyExA 6635->6637 6636->6637 6637->6621 6641 406d70 6638->6641 6642 406d96 RegQueryValueExA 6641->6642 6646 406db9 6642->6646 6657 406ddb 6642->6657 6643 406dd3 6647 403198 4 API calls 6643->6647 6644 403198 4 API calls 6645 406ea7 RegCloseKey 6644->6645 6645->6622 6646->6643 6648 403278 4 API calls 6646->6648 6649 403420 4 API calls 6646->6649 6646->6657 6647->6657 6648->6646 6650 406e10 RegQueryValueExA 6649->6650 6650->6642 6651 406e2c 6650->6651 6652 4034f0 4 API calls 6651->6652 6651->6657 6653 406e6e 6652->6653 6654 406e80 6653->6654 6656 403420 4 API calls 6653->6656 6655 4031e8 4 API calls 6654->6655 6655->6657 6656->6654 6657->6644 6659 4066a4 IsDBCSLeadByte 6658->6659 6661 406795 6659->6661 6660 4067df 6660->6446 6661->6660 6662 4065e0 IsDBCSLeadByte 6661->6662 6662->6661 6664 406853 6663->6664 6665 406780 IsDBCSLeadByte 6664->6665 6668 40685e 6665->6668 6666 40664a 6666->6451 6666->6452 6667 4065e0 IsDBCSLeadByte 6667->6668 6668->6666 6668->6667 6670 4068b7 6669->6670 6671 4068bb 6669->6671 6670->6465 6674 4068d0 CharPrevA 6671->6674 6673 4068cc 6673->6465 6674->6673 5677 407628 WriteFile 5678 407648 5677->5678 5681 40764f 5677->5681 5679 4073ec 21 API calls 5678->5679 5679->5681 5680 407660 5681->5680 5682 40734c 20 API calls 5681->5682 5682->5680 5978 403a28 ReadFile 5979 403a46 5978->5979 5980 403a49 GetLastError 5978->5980 6679 403932 6680 403924 6679->6680 6681 40374c VariantClear 6680->6681 6682 40392c 6681->6682 6683 408b34 6684 408b3b 6683->6684 6685 403198 4 API calls 6684->6685 6691 408bd5 6685->6691 6686 408c00 6687 4031b8 4 API calls 6686->6687 6689 408c8d 6687->6689 6688 408bec 6692 4032fc 4 API calls 6688->6692 6690 403278 4 API calls 6690->6691 6691->6686 6691->6688 6691->6690 6693 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6691->6693 6692->6686 6693->6691 5987 407ec0 5988 407ee8 5987->5988 5990 407eef 5987->5990 5989 407dfc 21 API calls 5988->5989 5989->5990 5991 407f18 5990->5991 5995 407f16 5990->5995 5996 407f22 5990->5996 5992 407d14 19 API calls 5991->5992 5992->5996 5993 407d14 19 API calls 5994 407f57 5993->5994 5998 403198 4 API calls 5994->5998 5997 4050e4 19 API calls 5995->5997 5996->5993 5996->5994 5999 407f3e 5997->5999 6000 407f6c 5998->6000 6002 407c9c 5999->6002 6003 407c9f 6002->6003 6004 40322c 4 API calls 6003->6004 6005 407cc1 6004->6005 6006 4032fc 4 API calls 6005->6006 6007 407ccb 6006->6007 6008 4057e0 4 API calls 6007->6008 6009 407cda 6008->6009 6010 403198 4 API calls 6009->6010 6011 407cf4 6010->6011 6011->5996 5867 4075cc SetFilePointer 5868 407603 5867->5868 5869 4075f3 GetLastError 5867->5869 5869->5868 5870 4075fc 5869->5870 5871 4073ec 21 API calls 5870->5871 5871->5868 6016 402ccc 6019 402cfe 6016->6019 6020 402cdd 6016->6020 6017 402d88 RtlUnwind 6018 403154 4 API calls 6017->6018 6018->6019 6020->6017 6020->6019 6021 402b28 RaiseException 6020->6021 6022 402d7f 6021->6022 6022->6017 6702 403fcd 6703 403f07 4 API calls 6702->6703 6704 403fd6 6703->6704 6705 403e9c 4 API calls 6704->6705 6706 403fe2 6705->6706 4913 4024d0 4914 4024e4 4913->4914 4915 4024f7 4913->4915 4952 401918 RtlInitializeCriticalSection 4914->4952 4916 402518 4915->4916 4917 40250e RtlEnterCriticalSection 4915->4917 4929 402300 4916->4929 4917->4916 4921 4024ed 4923 402525 4925 402581 4923->4925 4926 402577 RtlLeaveCriticalSection 4923->4926 4926->4925 4927 402531 4927->4923 4959 40215c 4927->4959 4930 402314 4929->4930 4932 4023b8 4930->4932 4933 402335 4930->4933 4931 402344 4931->4923 4939 401fd4 4931->4939 4932->4931 4937 402455 4932->4937 4976 401d80 4932->4976 4984 401e84 4932->4984 4933->4931 4973 401b74 4933->4973 4937->4931 4980 401d00 4937->4980 4940 401fe8 4939->4940 4941 401ffb 4939->4941 4943 401918 4 API calls 4940->4943 4942 402012 RtlEnterCriticalSection 4941->4942 4946 40201c 4941->4946 4942->4946 4944 401fed 4943->4944 4944->4941 4945 401ff1 4944->4945 4951 402052 4945->4951 4946->4951 5066 401ee0 4946->5066 4949 402147 4949->4927 4950 40213d RtlLeaveCriticalSection 4950->4949 4951->4927 4953 40193c RtlEnterCriticalSection 4952->4953 4954 401946 4952->4954 4953->4954 4955 401964 LocalAlloc 4954->4955 4956 40197e 4955->4956 4957 4019c3 RtlLeaveCriticalSection 4956->4957 4958 4019cd 4956->4958 4957->4958 4958->4915 4958->4921 4960 40217a 4959->4960 4961 402175 4959->4961 4963 4021b5 4960->4963 4964 4021ab RtlEnterCriticalSection 4960->4964 4970 40217e 4960->4970 4962 401918 4 API calls 4961->4962 4962->4960 4965 402244 4963->4965 4969 4021c1 4963->4969 4971 402270 4963->4971 4964->4963 4968 401d80 7 API calls 4965->4968 4965->4970 4966 4022e3 RtlLeaveCriticalSection 4967 4022ed 4966->4967 4967->4923 4968->4970 4969->4966 4969->4967 4970->4923 4971->4969 4972 401d00 7 API calls 4971->4972 4972->4969 4974 40215c 9 API calls 4973->4974 4975 401b95 4974->4975 4975->4931 4977 401d92 4976->4977 4978 401d89 4976->4978 4977->4932 4978->4977 4979 401b74 9 API calls 4978->4979 4979->4977 4981 401d1e 4980->4981 4982 401d4e 4980->4982 4981->4931 4982->4981 4989 401c68 4982->4989 5044 401768 4984->5044 4986 401e99 4988 401ea6 4986->4988 5055 401dcc 4986->5055 4988->4932 4990 401c7a 4989->4990 4991 401c9d 4990->4991 4992 401caf 4990->4992 5002 40188c 4991->5002 4994 40188c 3 API calls 4992->4994 4995 401cad 4994->4995 4996 401cc5 4995->4996 5012 401b44 4995->5012 4996->4981 4998 401cd4 4999 401cee 4998->4999 5017 401b98 4998->5017 5022 4013a0 4999->5022 5003 4018b2 5002->5003 5004 40190b 5002->5004 5026 401658 5003->5026 5004->4995 5009 4018e6 5009->5004 5011 4013a0 LocalAlloc 5009->5011 5011->5004 5013 401b61 5012->5013 5014 401b52 5012->5014 5013->4998 5015 401d00 9 API calls 5014->5015 5016 401b5f 5015->5016 5016->4998 5018 401bab 5017->5018 5019 401b9d 5017->5019 5018->4999 5020 401b74 9 API calls 5019->5020 5021 401baa 5020->5021 5021->4999 5023 4013ab 5022->5023 5024 4013c6 5023->5024 5025 4012e4 LocalAlloc 5023->5025 5024->4996 5025->5024 5028 40168f 5026->5028 5027 4016cf 5030 40132c 5027->5030 5028->5027 5029 4016a9 VirtualFree 5028->5029 5029->5028 5031 401348 5030->5031 5038 4012e4 5031->5038 5034 40150c 5035 40153b 5034->5035 5036 401594 5035->5036 5037 401568 VirtualFree 5035->5037 5036->5009 5037->5035 5041 40128c 5038->5041 5042 401298 LocalAlloc 5041->5042 5043 4012aa 5041->5043 5042->5043 5043->5009 5043->5034 5045 401787 5044->5045 5046 40183b 5045->5046 5047 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5045->5047 5049 40132c LocalAlloc 5045->5049 5050 401821 5045->5050 5052 4017d6 5045->5052 5053 4017e7 5046->5053 5062 4015c4 5046->5062 5047->5045 5049->5045 5051 40150c VirtualFree 5050->5051 5051->5053 5054 40150c VirtualFree 5052->5054 5053->4986 5054->5053 5056 401d80 9 API calls 5055->5056 5057 401de0 5056->5057 5058 40132c LocalAlloc 5057->5058 5059 401df0 5058->5059 5060 401b44 9 API calls 5059->5060 5061 401df8 5059->5061 5060->5061 5061->4988 5063 40160a 5062->5063 5064 401626 VirtualAlloc 5063->5064 5065 40163a 5063->5065 5064->5063 5064->5065 5065->5053 5069 401ef0 5066->5069 5067 401f1c 5068 401d00 9 API calls 5067->5068 5071 401f40 5067->5071 5068->5071 5069->5067 5069->5071 5072 401e58 5069->5072 5071->4949 5071->4950 5077 4016d8 5072->5077 5075 401e75 5075->5069 5076 401dcc 9 API calls 5076->5075 5081 4016f4 5077->5081 5078 4016fe 5080 4015c4 VirtualAlloc 5078->5080 5085 40170a 5080->5085 5081->5078 5082 40132c LocalAlloc 5081->5082 5083 40174f 5081->5083 5086 40175b 5081->5086 5087 401430 5081->5087 5082->5081 5084 40150c VirtualFree 5083->5084 5084->5086 5085->5086 5086->5075 5086->5076 5088 40143f VirtualAlloc 5087->5088 5090 40146c 5088->5090 5091 40148f 5088->5091 5092 4012e4 LocalAlloc 5090->5092 5091->5081 5093 401478 5092->5093 5093->5091 5094 40147c VirtualFree 5093->5094 5094->5091 6027 4028d2 6028 4028da 6027->6028 6029 403554 4 API calls 6028->6029 6030 4028ef 6028->6030 6029->6028 6031 4025ac 4 API calls 6030->6031 6032 4028f4 6031->6032 6707 4019d3 6708 4019ba 6707->6708 6709 4019c3 RtlLeaveCriticalSection 6708->6709 6710 4019cd 6708->6710 6709->6710 5686 409fd8 5717 409460 GetLastError 5686->5717 5689 402f24 5 API calls 5690 409fe4 5689->5690 5691 409fee CreateWindowExA SetWindowLongA 5690->5691 5692 4050e4 19 API calls 5691->5692 5693 40a071 5692->5693 5730 4032fc 5693->5730 5695 40a07f 5696 4032fc 4 API calls 5695->5696 5697 40a08c 5696->5697 5744 406adc GetCommandLineA 5697->5744 5700 4032fc 4 API calls 5701 40a0a1 5700->5701 5749 409888 5701->5749 5705 40a0c6 5706 40a0e6 5705->5706 5707 40a0ff 5705->5707 5771 4093fc 5706->5771 5709 40a118 5707->5709 5712 40a112 RemoveDirectoryA 5707->5712 5710 40a121 73A25CF0 5709->5710 5711 40a12c 5709->5711 5710->5711 5713 40a154 5711->5713 5779 40357c 5711->5779 5712->5709 5715 40a14a 5716 4025ac 4 API calls 5715->5716 5716->5713 5792 404be4 5717->5792 5720 4071e4 5 API calls 5721 4094b7 5720->5721 5795 408ccc 5721->5795 5724 4057e0 4 API calls 5725 4094db 5724->5725 5726 4031b8 4 API calls 5725->5726 5727 4094fa 5726->5727 5728 403198 4 API calls 5727->5728 5729 409502 5728->5729 5729->5689 5731 403300 5730->5731 5732 40333f 5730->5732 5733 4031e8 5731->5733 5734 40330a 5731->5734 5732->5695 5737 4031fc 5733->5737 5741 403254 4 API calls 5733->5741 5735 403334 5734->5735 5736 40331d 5734->5736 5740 4034f0 4 API calls 5735->5740 5739 4034f0 4 API calls 5736->5739 5738 403228 5737->5738 5742 4025ac 4 API calls 5737->5742 5738->5695 5743 403322 5739->5743 5740->5743 5741->5737 5742->5738 5743->5695 5745 406a50 4 API calls 5744->5745 5746 406b01 5745->5746 5747 403198 4 API calls 5746->5747 5748 406b1f 5747->5748 5748->5700 5750 4033b4 4 API calls 5749->5750 5751 4098c3 5750->5751 5752 4098f5 CreateProcessA 5751->5752 5753 409901 5752->5753 5754 409908 CloseHandle 5752->5754 5755 409460 21 API calls 5753->5755 5756 409911 5754->5756 5755->5754 5809 40985c 5756->5809 5759 40992d 5760 40985c 3 API calls 5759->5760 5761 409932 GetExitCodeProcess CloseHandle 5760->5761 5762 409952 5761->5762 5763 403198 4 API calls 5762->5763 5764 40995a 5763->5764 5764->5705 5765 40969c 5764->5765 5766 4096a4 5765->5766 5770 4096de 5765->5770 5767 403420 4 API calls 5766->5767 5766->5770 5768 4096d8 5767->5768 5813 408da4 5768->5813 5770->5705 5772 409456 5771->5772 5776 40940f 5771->5776 5772->5707 5773 409417 Sleep 5773->5776 5774 409427 Sleep 5774->5776 5776->5772 5776->5773 5776->5774 5777 40943e GetLastError 5776->5777 5829 408ee0 5776->5829 5777->5772 5778 409448 GetLastError 5777->5778 5778->5772 5778->5776 5780 403591 5779->5780 5781 4035a0 5779->5781 5784 4035d0 5780->5784 5785 40359b 5780->5785 5789 4035b6 5780->5789 5782 4035b1 5781->5782 5783 4035b8 5781->5783 5786 403198 4 API calls 5782->5786 5787 4031b8 4 API calls 5783->5787 5784->5789 5790 40357c 4 API calls 5784->5790 5785->5781 5788 4035ec 5785->5788 5786->5789 5787->5789 5788->5789 5846 403554 5788->5846 5789->5715 5790->5784 5793 4050f8 19 API calls 5792->5793 5794 404c02 5793->5794 5794->5720 5796 408cec 5795->5796 5799 408ba4 5796->5799 5800 403198 4 API calls 5799->5800 5806 408bd5 5799->5806 5800->5806 5801 408c00 5802 4031b8 4 API calls 5801->5802 5804 408c8d 5802->5804 5803 408bec 5807 4032fc 4 API calls 5803->5807 5804->5724 5805 403278 4 API calls 5805->5806 5806->5801 5806->5803 5806->5805 5808 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5806->5808 5807->5801 5808->5806 5810 409870 PeekMessageA 5809->5810 5811 409882 MsgWaitForMultipleObjects 5810->5811 5812 409864 TranslateMessage DispatchMessageA 5810->5812 5811->5756 5811->5759 5812->5810 5814 408db2 5813->5814 5816 408dca 5814->5816 5826 408d3c 5814->5826 5817 408d3c 4 API calls 5816->5817 5818 408dee 5816->5818 5817->5818 5819 407878 InterlockedExchange 5818->5819 5820 408e09 5819->5820 5821 408d3c 4 API calls 5820->5821 5822 408e1c 5820->5822 5821->5822 5823 408d3c 4 API calls 5822->5823 5824 403278 4 API calls 5822->5824 5825 408e4b 5822->5825 5823->5822 5824->5822 5825->5770 5827 4057e0 4 API calls 5826->5827 5828 408d4d 5827->5828 5828->5816 5837 408e94 5829->5837 5831 408ef6 5832 408efa 5831->5832 5833 408f16 DeleteFileA GetLastError 5831->5833 5832->5776 5834 408f34 5833->5834 5843 408ed0 5834->5843 5838 408ea2 5837->5838 5839 408e9e 5837->5839 5840 408ec4 SetLastError 5838->5840 5841 408eab Wow64DisableWow64FsRedirection 5838->5841 5839->5831 5842 408ebf 5840->5842 5841->5842 5842->5831 5844 408ed5 Wow64RevertWow64FsRedirection 5843->5844 5845 408edf 5843->5845 5844->5845 5845->5776 5847 403566 5846->5847 5849 403578 5847->5849 5850 403604 5847->5850 5849->5788 5851 40357c 5850->5851 5852 4035a0 5851->5852 5855 4035d0 5851->5855 5856 40359b 5851->5856 5860 4035b6 5851->5860 5853 4035b1 5852->5853 5854 4035b8 5852->5854 5857 403198 4 API calls 5853->5857 5858 4031b8 4 API calls 5854->5858 5855->5860 5861 40357c 4 API calls 5855->5861 5856->5852 5859 4035ec 5856->5859 5857->5860 5858->5860 5859->5860 5862 403554 4 API calls 5859->5862 5860->5847 5861->5855 5862->5859 6714 4065dc IsDBCSLeadByte 6715 4065f4 6714->6715 6726 402be9 RaiseException 6727 402c04 6726->6727 6037 409ef0 6038 409f15 6037->6038 6039 407878 InterlockedExchange 6038->6039 6040 409f3f 6039->6040 6041 409f4f 6040->6041 6042 409984 4 API calls 6040->6042 6047 40760c SetEndOfFile 6041->6047 6042->6041 6044 409f6b 6045 4025ac 4 API calls 6044->6045 6046 409fa2 6045->6046 6048 407623 6047->6048 6049 40761c 6047->6049 6048->6044 6050 4073ec 21 API calls 6049->6050 6050->6048 6051 402af2 6052 402afe 6051->6052 6055 402ed0 6052->6055 6056 403154 4 API calls 6055->6056 6058 402ee0 6056->6058 6057 402b03 6058->6057 6060 402b0c 6058->6060 6061 402b25 6060->6061 6062 402b15 RaiseException 6060->6062 6061->6057 6062->6061 6063 405af2 6065 405af4 6063->6065 6064 405b30 6067 405890 5 API calls 6064->6067 6065->6064 6066 405b2a 6065->6066 6068 405b47 6065->6068 6066->6064 6069 405b9c 6066->6069 6070 405b43 6067->6070 6072 404c2c 5 API calls 6068->6072 6071 405900 19 API calls 6069->6071 6073 403198 4 API calls 6070->6073 6071->6070 6074 405b70 6072->6074 6075 405bd6 6073->6075 6076 405900 19 API calls 6074->6076 6076->6070 6728 402dfa 6729 402e26 6728->6729 6730 402e0d 6728->6730 6732 402ba4 6730->6732 6733 402bc9 6732->6733 6734 402bad 6732->6734 6733->6729 6735 402bb5 RaiseException 6734->6735 6735->6733 6736 4097fc 6737 40980b 6736->6737 6739 409815 6736->6739 6738 40983a CallWindowProcA 6737->6738 6737->6739 6738->6739 6099 403a80 CloseHandle 6100 403a90 6099->6100 6101 403a91 GetLastError 6099->6101 6102 404283 6103 4042c3 6102->6103 6104 403154 4 API calls 6103->6104 6105 404323 6104->6105 6744 404185 6745 4041ff 6744->6745 6746 403154 4 API calls 6745->6746 6747 4041cc 6745->6747 6748 404323 6746->6748 6106 403e87 6107 403e4c 6106->6107 6108 403e62 6107->6108 6109 403e7b 6107->6109 6112 403e67 6107->6112 6115 403cc8 6108->6115 6111 402674 4 API calls 6109->6111 6113 403e78 6111->6113 6112->6113 6119 402674 6112->6119 6116 403cd6 6115->6116 6117 403ceb 6116->6117 6118 402674 4 API calls 6116->6118 6117->6112 6118->6117 6120 403154 4 API calls 6119->6120 6121 40267a 6120->6121 6121->6113 5872 40758c ReadFile 5873 4075c3 5872->5873 5874 4075ac 5872->5874 5875 4075b2 GetLastError 5874->5875 5876 4075bc 5874->5876 5875->5873 5875->5876 5877 4073ec 21 API calls 5876->5877 5877->5873 6122 40708e 6123 407078 6122->6123 6124 403198 4 API calls 6123->6124 6125 407080 6124->6125 6126 403198 4 API calls 6125->6126 6127 407088 6126->6127 6132 403e95 6133 403e4c 6132->6133 6134 403e67 6133->6134 6135 403e62 6133->6135 6136 403e7b 6133->6136 6139 403e78 6134->6139 6140 402674 4 API calls 6134->6140 6137 403cc8 4 API calls 6135->6137 6138 402674 4 API calls 6136->6138 6137->6134 6138->6139 6140->6139 6141 403a97 6142 403aac 6141->6142 6143 403bbc GetStdHandle 6142->6143 6144 403b0e CreateFileA 6142->6144 6154 403ab2 6142->6154 6145 403c17 GetLastError 6143->6145 6149 403bba 6143->6149 6144->6145 6146 403b2c 6144->6146 6145->6154 6148 403b3b GetFileSize 6146->6148 6146->6149 6148->6145 6150 403b4e SetFilePointer 6148->6150 6151 403be7 GetFileType 6149->6151 6149->6154 6150->6145 6155 403b6a ReadFile 6150->6155 6153 403c02 CloseHandle 6151->6153 6151->6154 6153->6154 6155->6145 6156 403b8c 6155->6156 6156->6149 6157 403b9f SetFilePointer 6156->6157 6157->6145 6158 403bb0 SetEndOfFile 6157->6158 6158->6145 6158->6149 5683 4074a8 5684 4074b4 CloseHandle 5683->5684 5685 4074bd 5683->5685 5684->5685 6761 40a1a9 6770 409514 6761->6770 6764 402f24 5 API calls 6765 40a1b3 6764->6765 6766 403198 4 API calls 6765->6766 6767 40a1d2 6766->6767 6768 403198 4 API calls 6767->6768 6769 40a1da 6768->6769 6779 4055fc 6770->6779 6772 40955d 6776 403198 4 API calls 6772->6776 6773 40952f 6773->6772 6785 40716c 6773->6785 6775 40954d 6778 409555 MessageBoxA 6775->6778 6777 409572 6776->6777 6777->6764 6777->6765 6778->6772 6780 403154 4 API calls 6779->6780 6781 405601 6780->6781 6782 405619 6781->6782 6783 403154 4 API calls 6781->6783 6782->6773 6784 40560f 6783->6784 6784->6773 6786 4055fc 4 API calls 6785->6786 6787 40717b 6786->6787 6788 407181 6787->6788 6790 40718f 6787->6790 6789 40322c 4 API calls 6788->6789 6791 40718d 6789->6791 6792 4071ab 6790->6792 6793 40719f 6790->6793 6791->6775 6803 4032b8 6792->6803 6796 407130 6793->6796 6797 40322c 4 API calls 6796->6797 6798 40713f 6797->6798 6799 40715c 6798->6799 6800 4068b0 CharPrevA 6798->6800 6799->6791 6801 40714b 6800->6801 6801->6799 6802 4032fc 4 API calls 6801->6802 6802->6799 6804 403278 4 API calls 6803->6804 6805 4032c2 6804->6805 6805->6791 6806 4011aa 6807 4011ac GetStdHandle 6806->6807 6166 4028ac 6167 402594 4 API calls 6166->6167 6168 4028b6 6167->6168 6173 4050b0 6174 4050c3 6173->6174 6175 404da8 19 API calls 6174->6175 6176 4050d7 6175->6176 6816 409fb4 6817 409fe4 6816->6817 6818 409fee CreateWindowExA SetWindowLongA 6817->6818 6819 4050e4 19 API calls 6818->6819 6820 40a071 6819->6820 6821 4032fc 4 API calls 6820->6821 6822 40a07f 6821->6822 6823 4032fc 4 API calls 6822->6823 6824 40a08c 6823->6824 6825 406adc 5 API calls 6824->6825 6826 40a098 6825->6826 6827 4032fc 4 API calls 6826->6827 6828 40a0a1 6827->6828 6829 409888 29 API calls 6828->6829 6830 40a0b3 6829->6830 6831 40969c 5 API calls 6830->6831 6832 40a0c6 6830->6832 6831->6832 6833 40a0ff 6832->6833 6834 4093fc 9 API calls 6832->6834 6835 40a118 6833->6835 6838 40a112 RemoveDirectoryA 6833->6838 6834->6833 6836 40a121 73A25CF0 6835->6836 6837 40a12c 6835->6837 6836->6837 6839 40a154 6837->6839 6840 40357c 4 API calls 6837->6840 6838->6835 6841 40a14a 6840->6841 6842 4025ac 4 API calls 6841->6842 6842->6839 6177 401ab9 6178 401a96 6177->6178 6179 401aa9 RtlDeleteCriticalSection 6178->6179 6180 401a9f RtlLeaveCriticalSection 6178->6180 6180->6179

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 108 409a14-409a38 GetSystemInfo VirtualQuery 109 409ac8-409acf 108->109 110 409a3e 108->110 111 409abd-409ac2 110->111 111->109 112 409a40-409a47 111->112 113 409aa9-409abb VirtualQuery 112->113 114 409a49-409a4d 112->114 113->109 113->111 114->113 115 409a4f-409a57 114->115 116 409a68-409a79 VirtualProtect 115->116 117 409a59-409a5c 115->117 119 409a7b 116->119 120 409a7d-409a7f 116->120 117->116 118 409a5e-409a61 117->118 118->116 121 409a63-409a66 118->121 119->120 122 409a8e-409a91 120->122 121->116 121->120 123 409a81-409a8a call 409a0c 122->123 124 409a93-409a95 122->124 123->122 124->113 126 409a97-409aa4 VirtualProtect 124->126 126->113
                                                                  APIs
                                                                  • GetSystemInfo.KERNEL32(?), ref: 00409A26
                                                                  • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409A31
                                                                  • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409A72
                                                                  • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409AA4
                                                                  • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409AB4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$ProtectQuery$InfoSystem
                                                                  • String ID:
                                                                  • API String ID: 2441996862-0
                                                                  • Opcode ID: c2769086b94dacb7810d1409196c7497058a42c32b70979fc979e51038c0ff67
                                                                  • Instruction ID: 05782b2e5a8588c9c74d05110837466633af9a4b7a19298b20ab433fd050a55e
                                                                  • Opcode Fuzzy Hash: c2769086b94dacb7810d1409196c7497058a42c32b70979fc979e51038c0ff67
                                                                  • Instruction Fuzzy Hash: D0216FB13003846BD6309A698C85E67B7DC9F85360F18492AFA85E62C3D73DED40CB59
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                                                  • Instruction ID: b78bf48cff894a3999656c5243e329942f020ab22272e2e872fdbeeaebf0035e
                                                                  • Opcode Fuzzy Hash: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                                                  • Instruction Fuzzy Hash: EDE09271B0021426D711A9699C86AEB735DDB58310F0006BFB904EB3C6EDB49E8046ED

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00409061,?,?,?,?,00000000,?,00409B53), ref: 00408FE8
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00408FEE
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00409061,?,?,?,?,00000000,?,00409B53), ref: 00409002
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00409008
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                  • API String ID: 1646373207-2130885113
                                                                  • Opcode ID: 17e7db4c528402608d9f53e260f8b79ce616995abb8d95c1af2dd02ed3ed6c5c
                                                                  • Instruction ID: 9fcc65c531327f2d7efb14c601a25e4e420c6304718e48176e9e04a6a3b299d5
                                                                  • Opcode Fuzzy Hash: 17e7db4c528402608d9f53e260f8b79ce616995abb8d95c1af2dd02ed3ed6c5c
                                                                  • Instruction Fuzzy Hash: 6701DF70208300AEEB10AB76DC47B563AA8E782714F60843BF504B22C3CA7C5C44CA2E

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A010
                                                                  • SetWindowLongA.USER32(0002041C,000000FC,004097FC), ref: 0040A027
                                                                    • Part of subcall function 00406ADC: GetCommandLineA.KERNEL32(00000000,00406B20,?,?,?,?,00000000,?,0040A098,?), ref: 00406AF4
                                                                    • Part of subcall function 00409888: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974,00000000,0040995B), ref: 004098F8
                                                                    • Part of subcall function 00409888: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974,00000000), ref: 0040990C
                                                                    • Part of subcall function 00409888: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                                    • Part of subcall function 00409888: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                                    • Part of subcall function 00409888: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974), ref: 00409940
                                                                  • RemoveDirectoryA.KERNEL32(00000000,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A113
                                                                  • 73A25CF0.USER32(0002041C,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A127
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                  • API String ID: 978128352-3001827809
                                                                  • Opcode ID: 159c453b7ac3cd923b7a2f23f1fd40c5aec2652b1d6ac864f49eba6627e6851e
                                                                  • Instruction ID: f906e54bc8182d827ce8d62f854c32cc5c8bb24d70b1b576c1f0bc2141975a36
                                                                  • Opcode Fuzzy Hash: 159c453b7ac3cd923b7a2f23f1fd40c5aec2652b1d6ac864f49eba6627e6851e
                                                                  • Instruction Fuzzy Hash: C7411B70600205DFD714EBA9EE85B9937A4EB44304F10427BF510B73E2DB78A801DB9D

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00409460: GetLastError.KERNEL32(00000000,00409503,?,0040B240,?,02127D74), ref: 00409484
                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A010
                                                                  • SetWindowLongA.USER32(0002041C,000000FC,004097FC), ref: 0040A027
                                                                    • Part of subcall function 00406ADC: GetCommandLineA.KERNEL32(00000000,00406B20,?,?,?,?,00000000,?,0040A098,?), ref: 00406AF4
                                                                    • Part of subcall function 00409888: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974,00000000,0040995B), ref: 004098F8
                                                                    • Part of subcall function 00409888: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974,00000000), ref: 0040990C
                                                                    • Part of subcall function 00409888: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                                    • Part of subcall function 00409888: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                                    • Part of subcall function 00409888: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974), ref: 00409940
                                                                  • RemoveDirectoryA.KERNEL32(00000000,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A113
                                                                  • 73A25CF0.USER32(0002041C,0040A166,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A127
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryErrorExitLastLineLongMultipleObjectsRemoveWait
                                                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                  • API String ID: 240127915-3001827809
                                                                  • Opcode ID: c2b54a2e70e4e5979150f676c7489133cbfe643d3bc517ae900c22a15f9bb05a
                                                                  • Instruction ID: 15d659ec7f9b1ac1cd7d53c9453979b8ee166439bedab6e573f6bea77050c238
                                                                  • Opcode Fuzzy Hash: c2b54a2e70e4e5979150f676c7489133cbfe643d3bc517ae900c22a15f9bb05a
                                                                  • Instruction Fuzzy Hash: F441F970600205DBD714EBA9EE86B9E3BA4EB44304F10467BF510B73E2DB78A845DB9D

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974,00000000,0040995B), ref: 004098F8
                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974,00000000), ref: 0040990C
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409925
                                                                  • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409937
                                                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409980,02127D74,00409974), ref: 00409940
                                                                    • Part of subcall function 00409460: GetLastError.KERNEL32(00000000,00409503,?,0040B240,?,02127D74), ref: 00409484
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                  • String ID: D
                                                                  • API String ID: 3356880605-2746444292
                                                                  • Opcode ID: 3e364823df46f41b243604843b678d585e88c5cad38ef85377b023b87dae9783
                                                                  • Instruction ID: 0c6d97fba1df7b16fba7b9ed0c132cba9133a3324ac8f072eb64155fee6ae1b7
                                                                  • Opcode Fuzzy Hash: 3e364823df46f41b243604843b678d585e88c5cad38ef85377b023b87dae9783
                                                                  • Instruction Fuzzy Hash: AC1130B16142086EDB10FBE68C52F9EBBACEF49718F50013EB614F62C7DA785D048669

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409D8A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Message
                                                                  • String ID: $u@$.tmp
                                                                  • API String ID: 2030045667-236237750
                                                                  • Opcode ID: be0edfdeb97945c6840b00cd29824e2c1b2e5348348f3cee86e118d80b02f044
                                                                  • Instruction ID: bdcd01d8ec24e2f84f87ea4e3f099a34ec29b2714f21813400b30a6ac1c0eceb
                                                                  • Opcode Fuzzy Hash: be0edfdeb97945c6840b00cd29824e2c1b2e5348348f3cee86e118d80b02f044
                                                                  • Instruction Fuzzy Hash: 5841B270604201DFD311EF19DED1A5A7BA6FB89304B21453AF401B77E2CA79AC41DBAD

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409D8A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Message
                                                                  • String ID: $u@$.tmp
                                                                  • API String ID: 2030045667-236237750
                                                                  • Opcode ID: a17348e3376948e7ba9e1c21084d2daeb235724ecd4b5b67bd692c07bc486c3a
                                                                  • Instruction ID: 3959a2e8feef50a60495e892b4acbb3c3acfae64f8a0edc45a3a0a8c5e65a2fa
                                                                  • Opcode Fuzzy Hash: a17348e3376948e7ba9e1c21084d2daeb235724ecd4b5b67bd692c07bc486c3a
                                                                  • Instruction Fuzzy Hash: 1E41A170600201DFC711EF69DED1A5A7BA6FB49304B11453AF801B77E2CA79AC41DBAD

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00409343,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040929A
                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,00409343,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004092A3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID: .tmp
                                                                  • API String ID: 1375471231-2986845003
                                                                  • Opcode ID: 7647810fba1c1a7df54c129ecd6d2966c744d5805a6f131b99297333171aebfe
                                                                  • Instruction ID: 381de743b5e558d6c5ac88c9815bc56a2e764fefa580558ac3af8d983805238d
                                                                  • Opcode Fuzzy Hash: 7647810fba1c1a7df54c129ecd6d2966c744d5805a6f131b99297333171aebfe
                                                                  • Instruction Fuzzy Hash: 3C214975A002089BDB01EFE1C9429DEB7B9EB48304F10457BE901B73C2DA7CAF058AA5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 311 406f00-406f53 SetErrorMode call 403414 LoadLibraryA
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00008000), ref: 00406F0A
                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,00406F54,?,00000000,00406F72,?,00008000), ref: 00406F39
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLibraryLoadMode
                                                                  • String ID:
                                                                  • API String ID: 2987862817-0
                                                                  • Opcode ID: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                                                  • Instruction ID: 61c75ae37e4b7eabf140846b9e9d3e90831ba1beb5fed57b889ca027c52d2016
                                                                  • Opcode Fuzzy Hash: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                                                  • Instruction Fuzzy Hash: 49F08270614704BEDB029FB69C6282BBBFCE749B0475348B6F904A26D2E53C5D208568

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 321 4075cc-4075f1 SetFilePointer 322 407603-407608 321->322 323 4075f3-4075fa GetLastError 321->323 323->322 324 4075fc-4075fe call 4073ec 323->324 324->322
                                                                  APIs
                                                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 004075EB
                                                                  • GetLastError.KERNEL32(?,?,?,00000000), ref: 004075F3
                                                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021103AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$FilePointer
                                                                  • String ID:
                                                                  • API String ID: 1156039329-0
                                                                  • Opcode ID: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                                                  • Instruction ID: cda5b13584bb414d1d7c0d7cef5a43535e1b929ad68122291bf656bee98e9d77
                                                                  • Opcode Fuzzy Hash: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                                                  • Instruction Fuzzy Hash: A0E092766081016FD601D55EC881B9B33DCDFC5365F00453ABA54EB2D1D675AC0087B6

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 315 40758c-4075aa ReadFile 316 4075c3-4075ca 315->316 317 4075ac-4075b0 315->317 318 4075b2-4075ba GetLastError 317->318 319 4075bc-4075be call 4073ec 317->319 318->316 318->319 319->316
                                                                  APIs
                                                                  • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 004075A3
                                                                  • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 004075B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastRead
                                                                  • String ID:
                                                                  • API String ID: 1948546556-0
                                                                  • Opcode ID: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                                                  • Instruction ID: 6d0e635579d8ef6deec62af0acb898b5effba2491802df9b0589d4017bc118ea
                                                                  • Opcode Fuzzy Hash: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                                                  • Instruction Fuzzy Hash: 4FE012B1A181147AEB24965A9CC5FAB6BDCCBC5314F14847BF904DB282D678DC04877B

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 326 407524-407545 SetFilePointer 327 407557-407559 326->327 328 407547-40754e GetLastError 326->328 328->327 329 407550-407552 call 4073ec 328->329 329->327
                                                                  APIs
                                                                  • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 0040753B
                                                                  • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00407547
                                                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021103AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$FilePointer
                                                                  • String ID:
                                                                  • API String ID: 1156039329-0
                                                                  • Opcode ID: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                                                  • Instruction ID: cd7afd6369a15af5fc7b0f7528e30ca6696358c0ea2e6c45e94f6e0b4d50a73a
                                                                  • Opcode Fuzzy Hash: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                                                  • Instruction Fuzzy Hash: 0EE04FB1600210AFEB10EEB98C81B9672DC9F48364F048576EA14DF2C6D274DC00C766

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 331 401430-40143d 332 401446-40144c 331->332 333 40143f-401444 331->333 334 401452-40146a VirtualAlloc 332->334 333->334 335 40146c-40147a call 4012e4 334->335 336 40148f-401492 334->336 335->336 339 40147c-40148d VirtualFree 335->339 339->336
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFree
                                                                  • String ID:
                                                                  • API String ID: 2087232378-0
                                                                  • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                  • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                  • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                  • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,00405306), ref: 004051EF
                                                                    • Part of subcall function 00404C2C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404C49
                                                                    • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                  • String ID:
                                                                  • API String ID: 1658689577-0
                                                                  • Opcode ID: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                                                  • Instruction ID: c760dbbb10683706500036a577470844d35ac6ab0c013c9c95042e4326961867
                                                                  • Opcode Fuzzy Hash: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                                                  • Instruction Fuzzy Hash: 3B313D75E00119ABCB00EF95C8C19EEB779FF84304F158977E815BB285E739AE058B98
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                                                  • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                  • Opcode Fuzzy Hash: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                                                  • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                                                  • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                  • Opcode Fuzzy Hash: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                                                  • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00406984,?,?,?,?,00000000,?,00406999,00406CC7,00000000,00406D0C,?,?,?), ref: 00406967
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                                                  • Instruction ID: a5d31a369ac9c1460ce21b6bb4ed2cb839aeaeb50f5f76e03c39097c5263300d
                                                                  • Opcode Fuzzy Hash: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                                                  • Instruction Fuzzy Hash: A9E065712043047FD701EA629C52959B7ACDB89708B924476B501A6682D5785E108568
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0040763F
                                                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021103AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastWrite
                                                                  • String ID:
                                                                  • API String ID: 442123175-0
                                                                  • Opcode ID: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                                                  • Instruction ID: 68b513bd5595dc6b38f1d245c0222f257f742b1e6f06676187839ef0e6677733
                                                                  • Opcode Fuzzy Hash: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                                                  • Instruction Fuzzy Hash: 93E01A727081106BEB10E65EDCC0EABA7DCDFC5764F04547BBA08EB291D674AC049676
                                                                  APIs
                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0040904B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,Wow64DisableWow64FsRedirection,00000000,00409061), ref: 00407203
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FormatMessage
                                                                  • String ID:
                                                                  • API String ID: 1306739567-0
                                                                  • Opcode ID: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                                                  • Instruction ID: 095b59eb22c1ada42cfe979e419102ec0d22498c88dfceb067fba30b4837873c
                                                                  • Opcode Fuzzy Hash: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                                                  • Instruction Fuzzy Hash: 8DE0D8A0B8830125F22514544C87B77110E53C0700F50847EB710ED3D3D6BEA90641AF
                                                                  APIs
                                                                  • SetEndOfFile.KERNEL32(?,02127DC8,00409F6B,00000000), ref: 00407613
                                                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,021103AC,?,00409BAD,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 004073EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 734332943-0
                                                                  • Opcode ID: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                                                  • Instruction ID: 5d9383f6f08d3e81a9fa52c4aba0b6319cc61be016c813106cdb36ce464f185a
                                                                  • Opcode Fuzzy Hash: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                                                  • Instruction Fuzzy Hash: 39C04CB1A0450047DB40A6BE99C1A0662DC5A483157045576BA08DB297D679E8009665
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                                                  • Instruction ID: 754ecbd0d3eeca534395493226652c0236480d823d7569c9efe771d01927bad3
                                                                  • Opcode Fuzzy Hash: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                                                  • Instruction Fuzzy Hash: 97B09B7661C2015DE705D6D5745193863F4D7C47103A1457BF104D25C0D57CD4144518
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                                                  • Instruction ID: 7c61e226393e4972c06343dd54fa3db727d2c771c967085a02b7622724de7152
                                                                  • Opcode Fuzzy Hash: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                                                  • Instruction Fuzzy Hash: BAA022A8C00002B2CE00E2F08080A3C23282A8C3003C00AAA322EB20C0C03CC000822A
                                                                  APIs
                                                                  • CharPrevA.USER32(?,?,004068CC,?,004065A9,?,?,00406CE7,00000000,00406D0C,?,?,?,?,00000000,00000000), ref: 004068D2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrev
                                                                  • String ID:
                                                                  • API String ID: 122130370-0
                                                                  • Opcode ID: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                                                  • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                  • Opcode Fuzzy Hash: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407E8C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 173b8e8880a2d8bc8916495ece18949fbab6e5abf9cd9f38168eb99c200b7a3e
                                                                  • Instruction ID: 2791b199587b26d82634b85145401aad68464bde91e43c5b6ac1b5c6de7462a2
                                                                  • Opcode Fuzzy Hash: 173b8e8880a2d8bc8916495ece18949fbab6e5abf9cd9f38168eb99c200b7a3e
                                                                  • Instruction Fuzzy Hash: 7A1172716042449BDB00EE19C881B5B3794AF84359F1484BAF958AB2C6DB38EC04CBAA
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                  • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                  • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                  • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                                                  • Instruction ID: 0172511661962fd54a17c381567595eb1d39a1afdb2a9088c563811225ee2893
                                                                  • Opcode Fuzzy Hash: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                                                  • Instruction Fuzzy Hash: FDD05E81B00A6017D215E2BE498864696C85F88745B08847AFA84E73D1D67CAC008399
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E82), ref: 00407DBB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: 5b9bfc86dfec920811477731d59a81a0154f8da7388717baf7e2e0d063c75e3e
                                                                  • Instruction ID: 99ab645fda39969175de1cb99313e8e2edaeef7f3c7532f72142fb74a6686f70
                                                                  • Opcode Fuzzy Hash: 5b9bfc86dfec920811477731d59a81a0154f8da7388717baf7e2e0d063c75e3e
                                                                  • Instruction Fuzzy Hash: 0AD0E9B17553055BDB90EEB95CC5B123BD87B48601F5044B66904EB29AE674E8109614
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 0040937B
                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00409381
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0040939A
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004093C1
                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004093C6
                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 004093D7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                  • String ID: SeShutdownPrivilege
                                                                  • API String ID: 107509674-3733053543
                                                                  • Opcode ID: 2b7c2d1c4f590a8974f253569f8503172d2d606641626e35aa9b2bf4c08caf06
                                                                  • Instruction ID: 611fb1cec5075bd7f6e538fe0f9c98e62950726bb4ce6d0bef13c3fa82a74cfd
                                                                  • Opcode Fuzzy Hash: 2b7c2d1c4f590a8974f253569f8503172d2d606641626e35aa9b2bf4c08caf06
                                                                  • Instruction Fuzzy Hash: 95F0627068430276E610A6718C47F67228C5B88B08F50483ABE51FA1C3D7BCCC044A6F
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409ADA
                                                                  • SizeofResource.KERNEL32(00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4,?,00000000,0040A1DB), ref: 00409AED
                                                                  • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4,?,00000000), ref: 00409AFF
                                                                  • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409BC5,00000000,0040A15C,?,00000001,00000000,00000002,00000000,0040A1A4), ref: 00409B10
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                  • String ID:
                                                                  • API String ID: 3473537107-0
                                                                  • Opcode ID: 400a5822642c04a340576dade1617737d9942a0be047b9803f81a1d9eeffe18d
                                                                  • Instruction ID: bd400d834a0aeaf6767d0a45abc69bca8fb82328816d2df24890c915d48f9c17
                                                                  • Opcode Fuzzy Hash: 400a5822642c04a340576dade1617737d9942a0be047b9803f81a1d9eeffe18d
                                                                  • Instruction Fuzzy Hash: 87E05AD035434625EA6036E718D2B2B62085FA471DF00013FBB00792D3DDBC8C04452E
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                                  • Instruction ID: dec8dcb9893e8432c944e1b70884c8cc40709e939aac0c2d0d2241257bb7fc31
                                                                  • Opcode Fuzzy Hash: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                                                  • Instruction Fuzzy Hash: D3D05EB631E6502AE210519B2D85EBB4EACCAC57A4F14443BF648DB242D2248C069776
                                                                  APIs
                                                                  • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: SystemTime
                                                                  • String ID:
                                                                  • API String ID: 2656138-0
                                                                  • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                  • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                  • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                  • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                  APIs
                                                                  • GetVersionExA.KERNEL32(?,00406540,00000000,0040654E,?,?,?,?,?,00409B44), ref: 00405C52
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                                                  • Instruction ID: 6a84e84a5bdb2c7c5b206d002f2a3fc227ad50a79849cf1aa773f1ea3c1cbc6a
                                                                  • Opcode Fuzzy Hash: b3c8fce3f516c1eeee7654ac00498b0e6f5204205adccd6d1250d5bfc2945711
                                                                  • Instruction Fuzzy Hash: 5AC0126040470186E7109B319C42B1672D4A744310F4805396DA4953C2E73C81018A5A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                  • Instruction ID: 956cfbd081f07b2254a6d3089f19d76ceb57970edf417c817245e325156cd300
                                                                  • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                                  • Instruction Fuzzy Hash: 4432E875E04219DFCB14CF99CA80AADB7B2BF88314F24816AD845B7385DB34AE42CF55
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00406FAD
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00406FB3
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00407001
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCloseHandleModuleProc
                                                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                  • API String ID: 4190037839-2401316094
                                                                  • Opcode ID: 60a9e4a616bde9d3650d5374f7b0e792bef98a6345d6610fa7bc99ac1ec5f133
                                                                  • Instruction ID: 4848c3cc747176469ce0ef08a48ea257d9f62360c4c8e5a9f2e1a14c28c6fa3b
                                                                  • Opcode Fuzzy Hash: 60a9e4a616bde9d3650d5374f7b0e792bef98a6345d6610fa7bc99ac1ec5f133
                                                                  • Instruction Fuzzy Hash: C3217370E04209ABDB10EBB5CD51B9F77A8EB44304F60857BA500F72C1DB7CAA05879E
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                  • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                  • String ID:
                                                                  • API String ID: 1694776339-0
                                                                  • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                  • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                  • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                  • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,0040555C,?,?,?,?,00000000,00000000,00000000,?,0040653B,00000000,0040654E), ref: 0040532E
                                                                    • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                                                    • Part of subcall function 004051A8: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale$DefaultSystem
                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                  • API String ID: 1044490935-665933166
                                                                  • Opcode ID: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                                                  • Instruction ID: f22f4b18e1885e1925b87b286fa486de3d96a381b4aec2b7527aff107c54c5fa
                                                                  • Opcode Fuzzy Hash: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                                                  • Instruction Fuzzy Hash: 8E514234B00648ABDB00EBA59C91B9F776ADB89304F50957BB514BB3C6CA3DCA058B5C
                                                                  APIs
                                                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                  • LocalFree.KERNEL32(0048FC60,00000000,00401AB4), ref: 00401A1B
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,0048FC60,00000000,00401AB4), ref: 00401A3A
                                                                  • LocalFree.KERNEL32(0048ED10,?,00000000,00008000,0048FC60,00000000,00401AB4), ref: 00401A79
                                                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                  • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                  • String ID:
                                                                  • API String ID: 3782394904-0
                                                                  • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                  • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                  • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                  • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                  • ExitProcess.KERNEL32 ref: 00403DE5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ExitMessageProcess
                                                                  • String ID: Error$Runtime error at 00000000$9@
                                                                  • API String ID: 1220098344-1503883590
                                                                  • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                  • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                  • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                  • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                  • String ID:
                                                                  • API String ID: 262959230-0
                                                                  • Opcode ID: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                                                  • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                  • Opcode Fuzzy Hash: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                                                  • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(00000000,00409B3A), ref: 004030E3
                                                                  • GetCommandLineA.KERNEL32(00000000,00409B3A), ref: 004030EE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CommandHandleLineModule
                                                                  • String ID: U1hd.@$%G
                                                                  • API String ID: 2123368496-2461373109
                                                                  • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                  • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                  • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                  • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                  APIs
                                                                  • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                  • String ID:
                                                                  • API String ID: 730355536-0
                                                                  • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                  • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                  • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                                  • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                                  APIs
                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040941B
                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040942B
                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 0040943E
                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A0FF,000000FA,00000032,0040A166), ref: 00409448
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2900947022.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.2900914901.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2900977696.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2901011188.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastSleep
                                                                  • String ID:
                                                                  • API String ID: 1458359878-0
                                                                  • Opcode ID: fb2155ff6e4859bec8591c3fde2b363a3ebb44483e144ae34e4cc697df15f474
                                                                  • Instruction ID: 2c3041558bff2c9731999a3fdaa5bf7f611e1c5313eca5e15d372d414c244bd5
                                                                  • Opcode Fuzzy Hash: fb2155ff6e4859bec8591c3fde2b363a3ebb44483e144ae34e4cc697df15f474
                                                                  • Instruction Fuzzy Hash: 32F0B472A0811457CB34B5EF9981A6F638DEAD1368751813BF904F3383D578CD0392AD

                                                                  Execution Graph

                                                                  Execution Coverage:16.2%
                                                                  Dynamic/Decrypted Code Coverage:0.7%
                                                                  Signature Coverage:5.7%
                                                                  Total number of Nodes:2000
                                                                  Total number of Limit Nodes:106
                                                                  execution_graph 49562 42f000 49563 42f00b 49562->49563 49564 42f00f NtdllDefWindowProc_A 49562->49564 49564->49563 49565 402584 49566 402598 49565->49566 49567 4025ab 49565->49567 49595 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49566->49595 49568 4025c2 RtlEnterCriticalSection 49567->49568 49569 4025cc 49567->49569 49568->49569 49581 4023b4 13 API calls 49569->49581 49572 40259d 49572->49567 49574 4025a1 49572->49574 49573 4025d5 49575 4025d9 49573->49575 49582 402088 49573->49582 49577 402635 49575->49577 49578 40262b RtlLeaveCriticalSection 49575->49578 49578->49577 49579 4025e5 49579->49575 49596 402210 9 API calls 49579->49596 49581->49573 49583 40209c 49582->49583 49584 4020af 49582->49584 49603 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49583->49603 49586 4020c6 RtlEnterCriticalSection 49584->49586 49589 4020d0 49584->49589 49586->49589 49587 4020a1 49587->49584 49588 4020a5 49587->49588 49592 402106 49588->49592 49589->49592 49597 401f94 49589->49597 49592->49579 49593 4021f1 RtlLeaveCriticalSection 49594 4021fb 49593->49594 49594->49579 49595->49572 49596->49575 49601 401fa4 49597->49601 49598 401fd0 49602 401ff4 49598->49602 49609 401db4 49598->49609 49601->49598 49601->49602 49604 401f0c 49601->49604 49602->49593 49602->49594 49603->49587 49613 40178c 49604->49613 49607 401f29 49607->49601 49610 401e02 49609->49610 49611 401dd2 49609->49611 49610->49611 49636 401d1c 49610->49636 49611->49602 49614 4017a8 49613->49614 49616 4017b2 49614->49616 49618 40180f 49614->49618 49621 401803 49614->49621 49624 4014e4 49614->49624 49633 4013e0 LocalAlloc 49614->49633 49632 401678 VirtualAlloc 49616->49632 49618->49607 49623 401e80 9 API calls 49618->49623 49620 4017be 49620->49618 49634 4015c0 VirtualFree 49621->49634 49623->49607 49625 4014f3 VirtualAlloc 49624->49625 49627 401520 49625->49627 49628 401543 49625->49628 49635 401398 LocalAlloc 49627->49635 49628->49614 49630 40152c 49630->49628 49631 401530 VirtualFree 49630->49631 49631->49628 49632->49620 49633->49614 49634->49618 49635->49630 49637 401d2e 49636->49637 49638 401d51 49637->49638 49639 401d63 49637->49639 49649 401940 49638->49649 49641 401940 3 API calls 49639->49641 49642 401d61 49641->49642 49643 401d79 49642->49643 49659 401bf8 9 API calls 49642->49659 49643->49611 49645 401d88 49646 401da2 49645->49646 49660 401c4c 9 API calls 49645->49660 49661 401454 LocalAlloc 49646->49661 49650 401966 49649->49650 49652 4019bf 49649->49652 49662 40170c 49650->49662 49652->49642 49655 401983 49656 40199a 49655->49656 49667 4015c0 VirtualFree 49655->49667 49656->49652 49668 401454 LocalAlloc 49656->49668 49659->49645 49660->49646 49661->49643 49664 401743 49662->49664 49663 401783 49666 4013e0 LocalAlloc 49663->49666 49664->49663 49665 40175d VirtualFree 49664->49665 49665->49664 49666->49655 49667->49656 49668->49652 49669 41edc4 49670 41edd3 IsWindowVisible 49669->49670 49671 41ee09 49669->49671 49670->49671 49672 41eddd IsWindowEnabled 49670->49672 49672->49671 49673 41ede7 49672->49673 49676 402648 49673->49676 49675 41edf1 EnableWindow 49675->49671 49677 40264c 49676->49677 49678 402656 49676->49678 49677->49678 49680 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49677->49680 49678->49675 49678->49678 49680->49678 49681 41fac8 49682 41fad1 49681->49682 49685 41fd6c 49682->49685 49684 41fade 49686 41fe5e 49685->49686 49687 41fd83 49685->49687 49686->49684 49687->49686 49706 41f92c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49687->49706 49689 41fdb9 49690 41fde3 49689->49690 49691 41fdbd 49689->49691 49716 41f92c GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 49690->49716 49707 41fb0c 49691->49707 49694 41fdf1 49696 41fdf5 49694->49696 49697 41fe1b 49694->49697 49699 41fb0c 10 API calls 49696->49699 49700 41fb0c 10 API calls 49697->49700 49698 41fb0c 10 API calls 49701 41fde1 49698->49701 49702 41fe07 49699->49702 49703 41fe2d 49700->49703 49701->49684 49704 41fb0c 10 API calls 49702->49704 49705 41fb0c 10 API calls 49703->49705 49704->49701 49705->49701 49706->49689 49708 41fb27 49707->49708 49709 41f8ac 4 API calls 49708->49709 49710 41fb3d 49708->49710 49709->49710 49717 41f8ac 49710->49717 49712 41fb85 49713 41fba8 SetScrollInfo 49712->49713 49725 41fa0c 49713->49725 49716->49694 49736 418150 49717->49736 49719 41f8c9 GetWindowLongA 49720 41f906 49719->49720 49721 41f8e6 49719->49721 49739 41f838 GetWindowLongA GetSystemMetrics GetSystemMetrics 49720->49739 49738 41f838 GetWindowLongA GetSystemMetrics GetSystemMetrics 49721->49738 49724 41f8f2 49724->49712 49726 41fa1a 49725->49726 49727 41fa22 49725->49727 49726->49698 49728 41fa5f 49727->49728 49729 41fa61 49727->49729 49730 41fa51 49727->49730 49731 41faa1 GetScrollPos 49728->49731 49741 417db8 IsWindowVisible ScrollWindow SetWindowPos 49729->49741 49740 417db8 IsWindowVisible ScrollWindow SetWindowPos 49730->49740 49731->49726 49734 41faac 49731->49734 49735 41fabb SetScrollPos 49734->49735 49735->49726 49737 41815a 49736->49737 49737->49719 49738->49724 49739->49724 49740->49728 49741->49728 49742 420508 49743 42051b 49742->49743 49763 415aa0 49743->49763 49745 420662 49746 420679 49745->49746 49770 414644 KiUserCallbackDispatcher 49745->49770 49747 420690 49746->49747 49771 414688 KiUserCallbackDispatcher 49746->49771 49756 4206b2 49747->49756 49772 41ffd0 12 API calls 49747->49772 49748 4205c1 49768 4207b8 20 API calls 49748->49768 49753 420556 49753->49745 49753->49748 49754 4205b2 MulDiv 49753->49754 49767 41a274 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 49754->49767 49755 4205da 49755->49745 49769 41ffd0 12 API calls 49755->49769 49759 4205f7 49760 420613 MulDiv 49759->49760 49761 420636 49759->49761 49760->49761 49761->49745 49762 42063f MulDiv 49761->49762 49762->49745 49764 415ab2 49763->49764 49773 4143e0 49764->49773 49766 415aca 49766->49753 49767->49748 49768->49755 49769->49759 49770->49746 49771->49747 49772->49756 49774 4143fa 49773->49774 49777 4105b8 49774->49777 49776 414410 49776->49766 49780 40de04 49777->49780 49779 4105be 49779->49776 49781 40de66 49780->49781 49782 40de17 49780->49782 49787 40de74 49781->49787 49785 40de74 19 API calls 49782->49785 49786 40de41 49785->49786 49786->49779 49788 40de84 49787->49788 49790 40de9a 49788->49790 49799 40d740 49788->49799 49819 40e1fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49788->49819 49802 40e0ac 49790->49802 49793 40dea2 49794 40d740 5 API calls 49793->49794 49795 40df0e 49793->49795 49805 40dcc0 49793->49805 49794->49793 49797 40e0ac 5 API calls 49795->49797 49798 40de70 49797->49798 49798->49779 49820 40eb68 49799->49820 49828 40d61c 49802->49828 49837 40e0b4 49805->49837 49819->49788 49823 40d8e0 49820->49823 49826 40d8eb 49823->49826 49824 40d74a 49824->49788 49826->49824 49827 40d92c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49826->49827 49827->49826 49829 40eb68 5 API calls 49828->49829 49830 40d629 49829->49830 49831 40d63c 49830->49831 49835 40ec6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49830->49835 49831->49793 49833 40d637 49836 40d5b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49833->49836 49835->49833 49836->49831 49861 40d8c4 49837->49861 49840 40dcf3 49844 40eacc 49840->49844 49841 40eb68 5 API calls 49842 40e0d8 49841->49842 49842->49840 49864 40e038 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49842->49864 49845 40d8e0 5 API calls 49844->49845 49846 40eae1 49845->49846 49865 4034e0 49846->49865 49850 40eaf6 49851 40d8e0 5 API calls 49850->49851 49852 40dcfe 49851->49852 49862 40eb68 5 API calls 49861->49862 49863 40d8ce 49862->49863 49863->49840 49863->49841 49864->49840 49874 4034bc 49865->49874 49867 4034f0 49879 403400 49867->49879 49870 403744 49871 40374a 49870->49871 49873 40375b 49870->49873 49872 4034bc 4 API calls 49871->49872 49871->49873 49872->49873 49873->49850 49875 4034c0 49874->49875 49876 4034dc 49874->49876 49877 402648 4 API calls 49875->49877 49876->49867 49878 4034c9 49877->49878 49878->49867 49880 403406 49879->49880 49881 40341f 49879->49881 49880->49881 49883 402660 49880->49883 49881->49870 49884 402664 49883->49884 49885 40266e 49883->49885 49884->49885 49886 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49884->49886 49885->49881 49886->49885 49888 42e20f SetErrorMode 49889 440ed4 49890 440edd 49889->49890 49891 440eeb WriteFile 49889->49891 49890->49891 49892 440ef6 49891->49892 49893 40cd94 49896 406e78 WriteFile 49893->49896 49897 406e95 49896->49897 49898 48cb5c 49899 48cb96 49898->49899 49900 48cb98 49899->49900 49901 48cba2 49899->49901 50097 409000 MessageBeep 49900->50097 49903 48cbda 49901->49903 49904 48cbb1 49901->49904 49910 48cbe9 49903->49910 49911 48cc12 49903->49911 49906 446b38 18 API calls 49904->49906 49905 403420 4 API calls 49907 48d1ee 49905->49907 49908 48cbbe 49906->49908 49912 403400 4 API calls 49907->49912 50098 406b18 49908->50098 49914 446b38 18 API calls 49910->49914 49918 48cc4a 49911->49918 49919 48cc21 49911->49919 49915 48d1f6 49912->49915 49917 48cbf6 49914->49917 50106 406b68 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49917->50106 49927 48cc59 49918->49927 49928 48cc72 49918->49928 49922 446b38 18 API calls 49919->49922 49920 48cb9d 49920->49905 49924 48cc2e 49922->49924 49923 48cc01 50107 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49923->50107 50108 406b9c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49924->50108 50110 4071e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 49927->50110 49933 48cc81 49928->49933 49934 48cca6 49928->49934 49929 48cc39 50109 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49929->50109 49932 48cc61 50111 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49932->50111 49936 446b38 18 API calls 49933->49936 49939 48ccde 49934->49939 49940 48ccb5 49934->49940 49937 48cc8e 49936->49937 50112 407210 49937->50112 49946 48cced 49939->49946 49947 48cd16 49939->49947 49942 446b38 18 API calls 49940->49942 49941 48cc96 50115 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49941->50115 49944 48ccc2 49942->49944 50116 42c6e0 49944->50116 49949 446b38 18 API calls 49946->49949 49952 48cd62 49947->49952 49953 48cd25 49947->49953 49951 48ccfa 49949->49951 50126 407160 8 API calls 49951->50126 49960 48cd9a 49952->49960 49961 48cd71 49952->49961 49955 446b38 18 API calls 49953->49955 49957 48cd34 49955->49957 49956 48cd05 50127 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49956->50127 49959 446b38 18 API calls 49957->49959 49962 48cd45 49959->49962 49968 48cda9 49960->49968 49969 48cdd2 49960->49969 49963 446b38 18 API calls 49961->49963 50128 48c860 8 API calls 49962->50128 49965 48cd7e 49963->49965 50130 42c780 49965->50130 49967 48cd51 50129 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49967->50129 49972 446b38 18 API calls 49968->49972 49975 48ce0a 49969->49975 49976 48cde1 49969->49976 49974 48cdb6 49972->49974 50136 42c7a8 49974->50136 49983 48ce19 49975->49983 49984 48ce42 49975->49984 49978 446b38 18 API calls 49976->49978 49980 48cdee 49978->49980 50145 42c7d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 49980->50145 49986 446b38 18 API calls 49983->49986 49989 48ce7a 49984->49989 49990 48ce51 49984->49990 49985 48cdf9 50146 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49985->50146 49988 48ce26 49986->49988 50147 42c808 49988->50147 49997 48ce89 49989->49997 49998 48cec6 49989->49998 49992 446b38 18 API calls 49990->49992 49995 48ce5e 49992->49995 50153 42c830 49995->50153 49999 446b38 18 API calls 49997->49999 50004 48cf18 49998->50004 50005 48ced5 49998->50005 50001 48ce98 49999->50001 50003 446b38 18 API calls 50001->50003 50006 48cea9 50003->50006 50011 48cf8b 50004->50011 50012 48cf27 50004->50012 50007 446b38 18 API calls 50005->50007 50159 42c424 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50006->50159 50009 48cee8 50007->50009 50013 446b38 18 API calls 50009->50013 50010 48ceb5 50160 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50010->50160 50020 48cfca 50011->50020 50021 48cf9a 50011->50021 50085 446b38 50012->50085 50016 48cef9 50013->50016 50161 48ca58 12 API calls 50016->50161 50019 48cf07 50162 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50019->50162 50029 48d009 50020->50029 50030 48cfd9 50020->50030 50024 446b38 18 API calls 50021->50024 50026 48cfa7 50024->50026 50025 48cf42 50027 48cf7b 50025->50027 50028 48cf46 50025->50028 50165 451630 50026->50165 50164 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50027->50164 50033 446b38 18 API calls 50028->50033 50042 48d048 50029->50042 50043 48d018 50029->50043 50034 446b38 18 API calls 50030->50034 50036 48cf55 50033->50036 50037 48cfe6 50034->50037 50035 48cfb4 50172 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50035->50172 50090 4519a8 50036->50090 50173 451498 50037->50173 50040 48cf65 50163 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50040->50163 50050 48d090 50042->50050 50051 48d057 50042->50051 50046 446b38 18 API calls 50043->50046 50045 48cff3 50180 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50045->50180 50048 48d025 50046->50048 50181 451b38 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 50048->50181 50056 48d0d8 50050->50056 50057 48d09f 50050->50057 50053 446b38 18 API calls 50051->50053 50052 48d032 50182 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50052->50182 50055 48d066 50053->50055 50058 446b38 18 API calls 50055->50058 50063 48d0eb 50056->50063 50069 48d1a1 50056->50069 50059 446b38 18 API calls 50057->50059 50060 48d077 50058->50060 50061 48d0ae 50059->50061 50183 446db8 50060->50183 50062 446b38 18 API calls 50061->50062 50065 48d0bf 50062->50065 50064 446b38 18 API calls 50063->50064 50067 48d118 50064->50067 50072 446db8 5 API calls 50065->50072 50068 446b38 18 API calls 50067->50068 50070 48d12f 50068->50070 50069->49920 50192 446adc 18 API calls 50069->50192 50189 407d44 7 API calls 50070->50189 50072->49920 50073 48d1ba 50193 42e634 FormatMessageA 50073->50193 50078 48d151 50079 446b38 18 API calls 50078->50079 50080 48d165 50079->50080 50190 408470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50080->50190 50082 48d170 50191 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50082->50191 50084 48d17c 50086 446b40 50085->50086 50198 435bb8 50086->50198 50088 446b5f 50089 42c528 7 API calls 50088->50089 50089->50025 50228 45144c 50090->50228 50092 4519c5 50092->50040 50093 4519c1 50093->50092 50094 4519e9 MoveFileA GetLastError 50093->50094 50234 451488 50094->50234 50097->49920 50099 406b27 50098->50099 50100 406b40 50099->50100 50101 406b49 50099->50101 50102 403400 4 API calls 50100->50102 50237 403778 50101->50237 50103 406b47 50102->50103 50105 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50103->50105 50105->49920 50106->49923 50107->49920 50108->49929 50109->49920 50110->49932 50111->49920 50244 403738 50112->50244 50115->49920 50117 403738 50116->50117 50118 42c703 GetFullPathNameA 50117->50118 50119 42c726 50118->50119 50120 42c70f 50118->50120 50121 403494 4 API calls 50119->50121 50120->50119 50122 42c717 50120->50122 50123 42c724 50121->50123 50124 4034e0 4 API calls 50122->50124 50125 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50123->50125 50124->50123 50125->49920 50126->49956 50127->49920 50128->49967 50129->49920 50246 42c678 50130->50246 50133 403778 4 API calls 50134 42c7a1 50133->50134 50135 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50134->50135 50135->49920 50261 42c594 50136->50261 50139 42c7c5 50142 403778 4 API calls 50139->50142 50140 42c7bc 50141 403400 4 API calls 50140->50141 50143 42c7c3 50141->50143 50142->50143 50144 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50143->50144 50144->49920 50145->49985 50146->49920 50148 42c678 IsDBCSLeadByte 50147->50148 50149 42c818 50148->50149 50150 403778 4 API calls 50149->50150 50151 42c82a 50150->50151 50152 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50151->50152 50152->49920 50154 42c678 IsDBCSLeadByte 50153->50154 50155 42c840 50154->50155 50156 403778 4 API calls 50155->50156 50157 42c851 50156->50157 50158 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50157->50158 50158->49920 50159->50010 50160->49920 50161->50019 50162->49920 50163->49920 50164->49920 50166 45144c 2 API calls 50165->50166 50168 451646 50166->50168 50167 45164a 50167->50035 50168->50167 50169 451666 DeleteFileA GetLastError 50168->50169 50170 451488 Wow64RevertWow64FsRedirection 50169->50170 50171 45168c 50170->50171 50171->50035 50172->49920 50174 45144c 2 API calls 50173->50174 50175 4514ae 50174->50175 50176 4514b2 50175->50176 50177 4514d0 CreateDirectoryA GetLastError 50175->50177 50176->50045 50178 451488 Wow64RevertWow64FsRedirection 50177->50178 50179 4514f6 50178->50179 50179->50045 50180->49920 50181->50052 50182->49920 50184 446dc0 50183->50184 50264 435f20 VariantClear 50184->50264 50186 446de3 50188 446dfa 50186->50188 50265 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50186->50265 50188->49920 50189->50078 50190->50082 50191->50084 50192->50073 50194 42e65a 50193->50194 50195 4034e0 4 API calls 50194->50195 50196 42e677 50195->50196 50197 446e8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50196->50197 50197->49920 50199 435bc4 50198->50199 50213 435be6 50198->50213 50199->50213 50218 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50199->50218 50200 435c69 50227 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50200->50227 50201 435c51 50222 403494 50201->50222 50202 435c39 50210 403510 4 API calls 50202->50210 50203 435c2d 50219 403510 50203->50219 50204 435c5d 50226 4040e8 18 API calls 50204->50226 50209 435c7a 50209->50088 50216 435c42 50210->50216 50211 435c45 50211->50088 50213->50200 50213->50201 50213->50202 50213->50203 50213->50204 50213->50211 50214 435c66 50214->50088 50216->50088 50218->50213 50220 4034e0 4 API calls 50219->50220 50221 40351d 50220->50221 50221->50088 50224 403498 50222->50224 50223 4034ba 50223->50088 50224->50223 50225 402660 4 API calls 50224->50225 50225->50223 50226->50214 50227->50209 50229 451456 50228->50229 50230 45145a 50228->50230 50229->50093 50231 451463 Wow64DisableWow64FsRedirection 50230->50231 50232 45147c SetLastError 50230->50232 50233 451477 50231->50233 50232->50233 50233->50093 50235 451497 50234->50235 50236 45148d Wow64RevertWow64FsRedirection 50234->50236 50235->50040 50236->50235 50238 4037aa 50237->50238 50240 40377d 50237->50240 50239 403400 4 API calls 50238->50239 50243 4037a0 50239->50243 50240->50238 50241 403791 50240->50241 50242 4034e0 4 API calls 50241->50242 50242->50243 50243->50103 50245 40373c SetCurrentDirectoryA 50244->50245 50245->49941 50251 42c59c 50246->50251 50248 42c6d7 50248->50133 50249 42c68d 50249->50248 50258 42c3b4 IsDBCSLeadByte 50249->50258 50254 42c5ad 50251->50254 50252 42c611 50255 42c60c 50252->50255 50260 42c3b4 IsDBCSLeadByte 50252->50260 50254->50252 50257 42c5cb 50254->50257 50255->50249 50257->50255 50259 42c3b4 IsDBCSLeadByte 50257->50259 50258->50249 50259->50257 50260->50255 50262 42c59c IsDBCSLeadByte 50261->50262 50263 42c59b 50262->50263 50263->50139 50263->50140 50264->50186 50265->50188 50266 422254 50267 422263 50266->50267 50272 4211e4 50267->50272 50270 422283 50273 421253 50272->50273 50286 4211f3 50272->50286 50276 421264 50273->50276 50297 412440 GetMenuItemCount GetMenuStringA GetMenuState 50273->50297 50275 421292 50279 421305 50275->50279 50284 4212ad 50275->50284 50276->50275 50278 42132a 50276->50278 50277 421303 50280 421356 50277->50280 50299 421d9c 11 API calls 50277->50299 50278->50277 50281 42133e SetMenu 50278->50281 50279->50277 50287 421319 50279->50287 50300 42112c 10 API calls 50280->50300 50281->50277 50284->50277 50290 4212d0 GetMenu 50284->50290 50285 42135d 50285->50270 50295 422158 10 API calls 50285->50295 50286->50273 50296 408c94 19 API calls 50286->50296 50289 421322 SetMenu 50287->50289 50289->50277 50291 4212f3 50290->50291 50292 4212da 50290->50292 50298 412440 GetMenuItemCount GetMenuStringA GetMenuState 50291->50298 50294 4212ed SetMenu 50292->50294 50294->50291 50295->50270 50296->50286 50297->50276 50298->50277 50299->50280 50300->50285 50301 41655c 73A25CF0 50302 40ce60 50303 40ce72 50302->50303 50304 40ce6d 50302->50304 50306 406eb0 CloseHandle 50304->50306 50306->50303 50307 47bd25 50312 450830 50307->50312 50309 47bd39 50322 47ae54 50309->50322 50311 47bd5d 50313 45083d 50312->50313 50315 450891 50313->50315 50331 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50313->50331 50328 4506f0 50315->50328 50319 4508b9 50320 4508fc 50319->50320 50333 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50319->50333 50320->50309 50338 40b528 50322->50338 50324 47ae76 50325 47aec1 50324->50325 50342 406944 50324->50342 50345 4726b8 50324->50345 50325->50311 50334 45069c 50328->50334 50331->50315 50332 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50332->50319 50333->50320 50335 4506bf 50334->50335 50336 4506ae 50334->50336 50335->50319 50335->50332 50337 4506b3 InterlockedExchange 50336->50337 50337->50335 50339 40b533 50338->50339 50340 40b553 50339->50340 50361 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50339->50361 50340->50324 50343 402648 4 API calls 50342->50343 50344 40694f 50343->50344 50344->50324 50353 472732 50345->50353 50358 4726e9 50345->50358 50346 47277d 50362 450ac0 50346->50362 50348 472794 50350 403420 4 API calls 50348->50350 50352 4727ae 50350->50352 50351 4038a4 4 API calls 50351->50353 50352->50324 50353->50346 50353->50351 50356 403744 4 API calls 50353->50356 50357 403450 4 API calls 50353->50357 50360 450ac0 23 API calls 50353->50360 50354 403744 4 API calls 50354->50358 50356->50353 50357->50353 50358->50353 50358->50354 50359 450ac0 23 API calls 50358->50359 50370 4038a4 50358->50370 50379 403450 50358->50379 50359->50358 50360->50353 50361->50340 50363 450ad0 50362->50363 50364 450adb 50362->50364 50385 45c4a0 50363->50385 50396 450a64 21 API calls 50364->50396 50366 450ae6 50368 450ad9 50366->50368 50397 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50366->50397 50368->50348 50371 4038b1 50370->50371 50378 4038e1 50370->50378 50373 4038da 50371->50373 50375 4038bd 50371->50375 50372 403400 4 API calls 50374 4038cb 50372->50374 50376 4034bc 4 API calls 50373->50376 50374->50358 50404 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50375->50404 50376->50378 50378->50372 50380 403454 50379->50380 50383 403464 50379->50383 50382 4034bc 4 API calls 50380->50382 50380->50383 50381 403490 50381->50358 50382->50383 50383->50381 50384 402660 4 API calls 50383->50384 50384->50381 50386 45c4b5 50385->50386 50388 45c4c4 50386->50388 50401 45c3b8 19 API calls 50386->50401 50389 45c4fe 50388->50389 50402 45c3b8 19 API calls 50388->50402 50392 45c512 50389->50392 50403 45c3b8 19 API calls 50389->50403 50395 45c53e 50392->50395 50398 45c448 50392->50398 50395->50368 50396->50366 50397->50368 50399 45c457 VirtualFree 50398->50399 50400 45c469 VirtualAlloc 50398->50400 50399->50400 50400->50395 50401->50388 50402->50389 50403->50392 50404->50374 50405 467f64 50406 467f9a 50405->50406 50439 4681b1 50405->50439 50407 467fce 50406->50407 50410 467ff6 50406->50410 50411 468007 50406->50411 50412 467fe5 50406->50412 50413 468018 50406->50413 50414 468029 50406->50414 50407->50439 50505 4655fc 50407->50505 50408 403400 4 API calls 50415 46829e 50408->50415 50685 4679b8 37 API calls 50410->50685 50464 467b00 50411->50464 50444 467850 50412->50444 50686 467cd4 61 API calls 50413->50686 50687 467ef4 40 API calls 50414->50687 50419 403400 4 API calls 50415->50419 50422 4682a6 50419->50422 50423 46804b 50429 46808d 50423->50429 50423->50439 50688 48fe94 50423->50688 50426 46819e 50707 47e5dc 97 API calls 50426->50707 50429->50426 50430 42ca9c 6 API calls 50429->50430 50432 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50429->50432 50436 414a58 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50429->50436 50437 468247 50429->50437 50438 468205 50429->50438 50429->50439 50508 465538 50429->50508 50516 467150 50429->50516 50523 466888 50429->50523 50576 467230 50429->50576 50614 47e198 50429->50614 50716 46762c 19 API calls 50429->50716 50430->50429 50432->50429 50436->50429 50440 467230 23 API calls 50437->50440 50708 4562e4 50438->50708 50439->50408 50440->50439 50443 4562e4 24 API calls 50443->50437 50717 414a58 50444->50717 50446 467882 50451 48fe94 18 API calls 50446->50451 50455 4678c3 50446->50455 50447 467900 50449 467935 50447->50449 50450 46790c GetCursor LoadCursorA SetCursor Sleep SetCursor 50447->50450 50448 4678c9 50452 4678eb 50448->50452 50721 46961c 50448->50721 50730 47a2f8 37 API calls 50449->50730 50450->50449 50451->50455 50725 414a88 50452->50725 50455->50447 50455->50448 50458 4678fe 50462 403400 4 API calls 50458->50462 50459 467949 50459->50458 50461 414a88 4 API calls 50459->50461 50460 403450 4 API calls 50460->50452 50461->50458 50463 46798e 50462->50463 50463->50407 50743 4686d8 50464->50743 50467 467c98 50468 403400 4 API calls 50467->50468 50470 467cad 50468->50470 50469 414a58 4 API calls 50471 467b4e 50469->50471 50472 403420 4 API calls 50470->50472 50473 467b5b 50471->50473 50474 467c89 50471->50474 50475 467cba 50472->50475 50476 42c7a8 5 API calls 50473->50476 50477 403450 4 API calls 50474->50477 50478 403400 4 API calls 50475->50478 50479 467b6a 50476->50479 50477->50467 50480 467cc2 50478->50480 50746 42c36c 50479->50746 50480->50407 50482 467b75 50756 454918 13 API calls 50482->50756 50484 467c47 50484->50467 50484->50474 50490 42cc24 7 API calls 50484->50490 50486 467be7 50486->50467 50486->50484 50766 42cc24 50486->50766 50488 467b82 50488->50486 50757 462fec 50488->50757 50493 467c5d 50490->50493 50493->50474 50498 450c84 4 API calls 50493->50498 50500 467c74 50498->50500 50506 465538 19 API calls 50505->50506 50507 46560b 50506->50507 50507->50423 50509 465567 50508->50509 50510 40785c 19 API calls 50509->50510 50513 4655a8 50509->50513 50511 4655a0 50510->50511 50976 45206c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50511->50976 50514 403400 4 API calls 50513->50514 50515 4655c0 50514->50515 50515->50429 50517 467161 50516->50517 50518 46715c 50516->50518 51062 466408 45 API calls 50517->51062 50522 46715f 50518->50522 50977 466bbc 50518->50977 50520 467169 50520->50429 50522->50429 50524 403400 4 API calls 50523->50524 50525 4668b5 50524->50525 51402 47933c 50525->51402 50527 4668da 50528 4668f4 50527->50528 50529 4668de 50527->50529 50531 4668e8 50528->50531 51423 48fd84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50528->51423 51420 4631ec 50529->51420 50534 466a24 50531->50534 50535 4669b9 50531->50535 50575 466aed 50531->50575 50533 403420 4 API calls 50537 466b29 50533->50537 50539 403494 4 API calls 50534->50539 50538 403494 4 API calls 50535->50538 50536 466910 50536->50531 50540 466918 50536->50540 50537->50429 50541 4669c6 50538->50541 50542 466a31 50539->50542 50543 467230 23 API calls 50540->50543 50545 40357c 4 API calls 50541->50545 50546 40357c 4 API calls 50542->50546 50544 466925 50543->50544 51424 42f040 50544->51424 50548 4669d3 50545->50548 50549 466a3e 50546->50549 50551 40357c 4 API calls 50548->50551 50552 40357c 4 API calls 50549->50552 50555 4669e0 50551->50555 50553 466a4b 50552->50553 50557 40357c 4 API calls 50553->50557 50556 40357c 4 API calls 50555->50556 50559 4669ed 50556->50559 50560 466a58 50557->50560 50558 46696c 50558->50429 50561 4631ec 20 API calls 50559->50561 50562 40357c 4 API calls 50560->50562 50563 4669fb 50561->50563 50564 466a66 50562->50564 50565 40357c 4 API calls 50563->50565 50566 414a88 4 API calls 50564->50566 50567 466a04 50565->50567 50568 466a22 50566->50568 50569 40357c 4 API calls 50567->50569 51441 463524 50568->51441 50571 466a11 50569->50571 50572 414a88 4 API calls 50571->50572 50572->50568 50575->50533 50577 465538 19 API calls 50576->50577 50579 467248 50577->50579 50578 46727c 51603 461cdc 50578->51603 50579->50578 50580 461cdc 7 API calls 50579->50580 50580->50578 50584 467294 50586 4672e2 50584->50586 50598 46737b 50584->50598 51624 4671e4 19 API calls 50584->51624 50587 465538 19 API calls 50586->50587 50587->50598 50588 46743a GetSystemMenu EnableMenuItem 50589 414a88 4 API calls 50588->50589 50590 46745a 50589->50590 50591 467466 50590->50591 50592 467490 50590->50592 50593 414a88 4 API calls 50591->50593 50594 4674ac 50592->50594 50595 4674d6 50592->50595 50596 46747a 50593->50596 50597 414a88 4 API calls 50594->50597 50599 414a88 4 API calls 50595->50599 50600 414a88 4 API calls 50596->50600 50601 4674c0 50597->50601 50598->50588 50602 4674ea 50599->50602 50603 46748e 50600->50603 50604 414a88 4 API calls 50601->50604 50605 414a88 4 API calls 50602->50605 51620 467178 50603->51620 50604->50603 50605->50603 50608 4655fc 19 API calls 50611 467588 50608->50611 50610 467528 50610->50608 50612 4675eb 50611->50612 51626 48fde0 18 API calls 50611->51626 50612->50429 50615 4686d8 42 API calls 50614->50615 50616 47e1db 50615->50616 50617 47e1e4 50616->50617 51831 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50616->51831 50619 414a58 4 API calls 50617->50619 50620 47e1f4 50619->50620 50621 403450 4 API calls 50620->50621 50622 47e201 50621->50622 51646 4689e8 50622->51646 50625 47e211 50626 414a58 4 API calls 50625->50626 50628 47e221 50626->50628 50629 403450 4 API calls 50628->50629 50630 47e22e 50629->50630 50631 4661f0 SendMessageA 50630->50631 50632 47e247 50631->50632 50633 47e285 50632->50633 51833 47599c 23 API calls 50632->51833 51675 42414c IsIconic 50633->51675 50637 47e2b5 51683 47d79c 50637->51683 50638 47e2a0 SetActiveWindow 50638->50637 50685->50407 50686->50407 50687->50407 53445 43d508 50688->53445 50691 48fec0 53450 431710 50691->53450 50692 48ff46 50693 48ff55 50692->50693 53483 48f6bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50692->53483 50693->50429 50702 48ff0a 53481 48f750 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50702->53481 50704 48ff1e 53482 433910 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50704->53482 50706 48ff3e 50706->50429 50707->50439 50709 456309 50708->50709 50710 456329 50709->50710 50711 40785c 19 API calls 50709->50711 50713 403400 4 API calls 50710->50713 50712 456321 50711->50712 50714 4560d8 24 API calls 50712->50714 50715 45633e 50713->50715 50714->50710 50715->50443 50716->50429 50718 414a66 50717->50718 50719 4034e0 4 API calls 50718->50719 50720 414a73 50719->50720 50720->50446 50722 4678de 50721->50722 50723 469625 50721->50723 50722->50460 50731 4696fc 50723->50731 50726 414a58 4 API calls 50725->50726 50727 414aac 50726->50727 50728 403400 4 API calls 50727->50728 50729 414add 50728->50729 50729->50458 50730->50459 50732 469703 50731->50732 50735 45c014 50732->50735 50736 45c01f 50735->50736 50737 45c03a VirtualAlloc 50736->50737 50738 45c05e BZ2_bzDecompressInit 50737->50738 50739 45c059 50737->50739 50742 45bf70 19 API calls 50738->50742 50739->50738 50741 45c0a3 50741->50722 50742->50741 50774 468764 50743->50774 50747 42c376 50746->50747 50748 42c399 50746->50748 50904 42c858 CharPrevA 50747->50904 50749 403494 4 API calls 50748->50749 50751 42c3a2 50749->50751 50751->50482 50752 42c37d 50752->50748 50753 42c388 50752->50753 50905 4035c0 50753->50905 50755 42c396 50755->50482 50756->50488 50758 463006 50757->50758 50927 40785c 50758->50927 50970 42cba8 50766->50970 50775 414a58 4 API calls 50774->50775 50776 468796 50775->50776 50828 463284 50776->50828 50779 414a88 4 API calls 50780 4687a8 50779->50780 50781 4687b7 50780->50781 50783 4687d0 50780->50783 50867 47a2f8 37 API calls 50781->50867 50786 468817 50783->50786 50788 4687fe 50783->50788 50784 403420 4 API calls 50785 467b32 50784->50785 50785->50467 50785->50469 50787 46887c 50786->50787 50801 46881b 50786->50801 50870 42ca28 CharNextA 50787->50870 50868 47a2f8 37 API calls 50788->50868 50791 46888b 50792 46888f 50791->50792 50795 4688a8 50791->50795 50871 47a2f8 37 API calls 50792->50871 50794 468863 50869 47a2f8 37 API calls 50794->50869 50796 4688cc 50795->50796 50837 4633f4 50795->50837 50872 47a2f8 37 API calls 50796->50872 50801->50794 50801->50795 50804 4688e5 50805 403778 4 API calls 50804->50805 50806 4688fb 50805->50806 50845 42c878 50806->50845 50809 46890c 50873 463480 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50809->50873 50810 46893a 50811 42c7a8 5 API calls 50810->50811 50813 468945 50811->50813 50815 42c36c 5 API calls 50813->50815 50814 46891f 50816 450c84 4 API calls 50814->50816 50817 468950 50815->50817 50818 46892c 50816->50818 50849 42ca9c 50817->50849 50874 47a2f8 37 API calls 50818->50874 50827 4687cb 50827->50784 50829 46329e 50828->50829 50831 42ca9c 6 API calls 50829->50831 50832 403450 4 API calls 50829->50832 50833 406b18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50829->50833 50834 4632e7 50829->50834 50876 42c988 50829->50876 50831->50829 50832->50829 50833->50829 50835 403420 4 API calls 50834->50835 50836 463301 50835->50836 50836->50779 50839 4633fe 50837->50839 50838 463411 50838->50796 50841 463424 50838->50841 50839->50838 50892 42ca18 CharNextA 50839->50892 50842 46342e 50841->50842 50843 46345b 50842->50843 50893 42ca18 CharNextA 50842->50893 50843->50796 50843->50804 50846 42c8d1 50845->50846 50847 42c88e 50845->50847 50846->50809 50846->50810 50847->50846 50894 42ca18 CharNextA 50847->50894 50850 42c59c IsDBCSLeadByte 50849->50850 50851 42caad 50850->50851 50867->50827 50868->50827 50869->50827 50870->50791 50871->50827 50872->50827 50873->50814 50874->50827 50877 403494 4 API calls 50876->50877 50878 42c998 50877->50878 50879 403744 4 API calls 50878->50879 50881 42c9ce 50878->50881 50885 42c3b4 IsDBCSLeadByte 50878->50885 50879->50878 50882 42ca12 50881->50882 50886 4037b8 50881->50886 50891 42c3b4 IsDBCSLeadByte 50881->50891 50882->50829 50885->50878 50887 403744 4 API calls 50886->50887 50889 4037c6 50887->50889 50888 4037fc 50888->50881 50889->50888 50890 4038a4 4 API calls 50889->50890 50890->50888 50891->50881 50892->50839 50893->50842 50894->50847 50904->50752 50906 4035c4 50905->50906 50907 40357c 50905->50907 50906->50907 50908 403450 50906->50908 50911 4035e2 50906->50911 50912 4035d4 50906->50912 50907->50908 50914 4035bf 50907->50914 50917 40358a 50907->50917 50909 403464 50908->50909 50915 4034bc 4 API calls 50908->50915 50910 403490 50909->50910 50918 402660 4 API calls 50909->50918 50910->50755 50913 4034bc 4 API calls 50911->50913 50916 403450 4 API calls 50912->50916 50923 4035f5 50913->50923 50914->50755 50915->50909 50916->50907 50919 4035b4 50917->50919 50920 40359d 50917->50920 50918->50910 50922 4038a4 4 API calls 50919->50922 50921 4038a4 4 API calls 50920->50921 50925 4035a2 50921->50925 50922->50925 50924 403450 4 API calls 50923->50924 50926 403621 50924->50926 50925->50755 50926->50755 50930 407870 50927->50930 50931 40788d 50930->50931 50938 407520 50931->50938 50971 42ca9c 6 API calls 50970->50971 50972 42cbca 50971->50972 50976->50513 50979 466c03 50977->50979 50978 46707b 50981 467096 50978->50981 50982 4670c7 50978->50982 50979->50978 50980 466cbe 50979->50980 50984 403494 4 API calls 50979->50984 50983 466cdf 50980->50983 50988 466d20 50980->50988 50985 403494 4 API calls 50981->50985 50986 403494 4 API calls 50982->50986 50989 403494 4 API calls 50983->50989 50990 466c42 50984->50990 50991 4670a4 50985->50991 50987 4670d5 50986->50987 51090 465ae4 12 API calls 50987->51090 50996 403400 4 API calls 50988->50996 50993 466ced 50989->50993 50994 414a58 4 API calls 50990->50994 51089 465ae4 12 API calls 50991->51089 50997 414a58 4 API calls 50993->50997 50998 466c63 50994->50998 51011 466d1e 50996->51011 51000 466d0e 50997->51000 51063 403634 50998->51063 50999 403400 4 API calls 51003 4670f8 50999->51003 51005 403634 4 API calls 51000->51005 51010 403400 4 API calls 51003->51010 51004 466e8c 51008 403400 4 API calls 51004->51008 51005->51011 51007 4670b2 51007->50999 51013 466e8a 51008->51013 51009 466d40 51014 466d46 51009->51014 51015 466d7e 51009->51015 51016 467100 51010->51016 51049 466e04 51011->51049 51069 4661f0 51011->51069 51084 46662c 42 API calls 51013->51084 51018 403494 4 API calls 51014->51018 51020 403400 4 API calls 51015->51020 51019 403420 4 API calls 51016->51019 51022 466d54 51018->51022 51023 46710d 51019->51023 51025 466d7c 51020->51025 51075 477c14 51022->51075 51023->50522 51024 466e4b 51029 403494 4 API calls 51024->51029 51078 4664e4 51025->51078 51033 466e59 51029->51033 51031 466eb5 51039 466f16 51031->51039 51040 466ec0 51031->51040 51032 466d6c 51035 403634 4 API calls 51032->51035 51036 414a58 4 API calls 51033->51036 51035->51025 51038 466e7a 51036->51038 51037 466da5 51044 466e06 51037->51044 51045 466db0 51037->51045 51041 403634 4 API calls 51038->51041 51042 403400 4 API calls 51039->51042 51043 403494 4 API calls 51040->51043 51041->51013 51046 466f1e 51042->51046 51051 466ece 51043->51051 51047 403400 4 API calls 51044->51047 51048 403494 4 API calls 51045->51048 51050 466f14 51046->51050 51061 466fc7 51046->51061 51047->51049 51054 466dbe 51048->51054 51049->51004 51049->51024 51050->51046 51085 48fd84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51050->51085 51051->51046 51051->51050 51055 403634 4 API calls 51051->51055 51053 466f41 51053->51061 51086 490030 18 API calls 51053->51086 51054->51049 51057 403634 4 API calls 51054->51057 51055->51051 51057->51054 51059 467068 51088 4290b4 SendMessageA SendMessageA 51059->51088 51087 429064 SendMessageA 51061->51087 51062->50520 51064 40363c 51063->51064 51065 4034bc 4 API calls 51064->51065 51066 40364f 51065->51066 51067 403450 4 API calls 51066->51067 51068 403677 51067->51068 51091 429fb0 SendMessageA 51069->51091 51071 4661ff 51072 46621f 51071->51072 51092 429fb0 SendMessageA 51071->51092 51072->51009 51074 46620f 51074->51009 51093 477c34 51075->51093 51082 466511 51078->51082 51079 466573 51080 403400 4 API calls 51079->51080 51081 466588 51080->51081 51081->51037 51082->51079 51401 466468 42 API calls 51082->51401 51084->51031 51085->51053 51086->51061 51087->51059 51088->50978 51089->51007 51090->51007 51091->51071 51092->51074 51094 403494 4 API calls 51093->51094 51102 477c67 51094->51102 51095 477d6c 51096 403420 4 API calls 51095->51096 51097 477c2f 51096->51097 51097->51032 51098 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51098->51102 51100 403778 4 API calls 51100->51102 51102->51095 51102->51098 51102->51100 51105 476c84 51102->51105 51325 45206c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51102->51325 51326 403800 51102->51326 51330 42c858 CharPrevA 51102->51330 51106 476cd6 51105->51106 51109 476cb4 51105->51109 51107 476cf6 51106->51107 51108 476ce4 51106->51108 51112 476d04 51107->51112 51113 476d59 51107->51113 51110 403494 4 API calls 51108->51110 51109->51106 51335 475bb4 19 API calls 51109->51335 51222 476cf1 51110->51222 51114 476d33 51112->51114 51115 476d0d 51112->51115 51122 476d67 51113->51122 51123 476d7a 51113->51123 51117 476d46 51114->51117 51337 45206c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51114->51337 51118 476d20 51115->51118 51336 45206c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51115->51336 51116 403400 4 API calls 51119 47758c 51116->51119 51121 403494 4 API calls 51117->51121 51125 403494 4 API calls 51118->51125 51126 403400 4 API calls 51119->51126 51121->51222 51128 403494 4 API calls 51122->51128 51129 476d9b 51123->51129 51130 476d88 51123->51130 51125->51222 51127 477594 51126->51127 51127->51102 51128->51222 51132 476deb 51129->51132 51133 476da9 51129->51133 51131 403494 4 API calls 51130->51131 51131->51222 51138 476e0c 51132->51138 51139 476df9 51132->51139 51134 476dc5 51133->51134 51135 476db2 51133->51135 51137 476dd8 51134->51137 51338 45206c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51134->51338 51136 403494 4 API calls 51135->51136 51136->51222 51141 403494 4 API calls 51137->51141 51143 476e2d 51138->51143 51144 476e1a 51138->51144 51142 403494 4 API calls 51139->51142 51141->51222 51142->51222 51146 476e4e 51143->51146 51147 476e3b 51143->51147 51145 403494 4 API calls 51144->51145 51145->51222 51222->51116 51325->51102 51327 403804 51326->51327 51328 40382f 51326->51328 51329 4038a4 4 API calls 51327->51329 51328->51102 51329->51328 51330->51102 51335->51109 51336->51118 51337->51117 51338->51137 51401->51082 51403 47936a 51402->51403 51408 4793a0 51402->51408 51445 454818 51403->51445 51404 403420 4 API calls 51405 4794b4 51404->51405 51405->50527 51407 479394 51407->51408 51409 47947d 51407->51409 51413 477c14 42 API calls 51407->51413 51417 479429 51407->51417 51452 4751a0 51407->51452 51463 475294 51407->51463 51467 478f04 31 API calls 51407->51467 51408->51404 51409->50527 51412 477c14 42 API calls 51412->51417 51413->51407 51415 42c808 5 API calls 51415->51417 51416 42c830 5 API calls 51416->51417 51417->51407 51417->51412 51417->51415 51417->51416 51419 47946a 51417->51419 51468 47904c 57 API calls 51417->51468 51419->51408 51530 463100 51420->51530 51423->50536 51425 42f04c 51424->51425 51426 42f06f GetActiveWindow GetFocus 51425->51426 51427 41ee14 2 API calls 51426->51427 51428 42f086 51427->51428 51429 42f0a3 51428->51429 51430 42f093 RegisterClassA 51428->51430 51431 42f132 SetFocus 51429->51431 51432 42f0b1 CreateWindowExA 51429->51432 51430->51429 51434 403400 4 API calls 51431->51434 51432->51431 51433 42f0e4 51432->51433 51561 4241ec 51433->51561 51436 42f14e 51434->51436 51440 490030 18 API calls 51436->51440 51437 42f10c 51438 42f114 CreateWindowExA 51437->51438 51438->51431 51439 42f12a ShowWindow 51438->51439 51439->51431 51440->50558 51567 44b054 51441->51567 51446 454829 51445->51446 51447 454836 51446->51447 51448 45482d 51446->51448 51477 4545fc 29 API calls 51447->51477 51469 45451c 51448->51469 51451 454833 51451->51407 51453 4751b6 51452->51453 51454 4751b2 51452->51454 51455 403450 4 API calls 51453->51455 51454->51407 51456 4751c3 51455->51456 51457 4751e3 51456->51457 51458 4751c9 51456->51458 51460 475060 19 API calls 51457->51460 51506 475060 51458->51506 51461 4751df 51460->51461 51462 403400 4 API calls 51461->51462 51462->51454 51464 4752a0 51463->51464 51465 4752bb 51464->51465 51529 45206c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51464->51529 51465->51407 51467->51407 51468->51417 51478 42dc54 51469->51478 51471 454539 51472 454587 51471->51472 51481 454450 51471->51481 51472->51451 51475 454450 6 API calls 51476 454568 RegCloseKey 51475->51476 51476->51451 51477->51451 51479 42dc65 RegOpenKeyExA 51478->51479 51480 42dc5f 51478->51480 51479->51471 51480->51479 51486 42db90 51481->51486 51483 403420 4 API calls 51484 454502 51483->51484 51484->51475 51485 454478 51485->51483 51489 42da38 51486->51489 51490 42da5e RegQueryValueExA 51489->51490 51495 42daa3 51490->51495 51497 42da81 51490->51497 51491 403400 4 API calls 51492 42db6f 51491->51492 51492->51485 51493 42da9b 51494 403400 4 API calls 51493->51494 51494->51495 51495->51491 51496 4034e0 4 API calls 51496->51497 51497->51493 51497->51495 51497->51496 51498 403744 4 API calls 51497->51498 51499 42dad8 RegQueryValueExA 51498->51499 51499->51490 51500 42daf4 51499->51500 51500->51495 51501 4038a4 4 API calls 51500->51501 51502 42db36 51501->51502 51503 42db48 51502->51503 51505 403744 4 API calls 51502->51505 51504 403450 4 API calls 51503->51504 51504->51495 51505->51503 51507 47507b 51506->51507 51510 4750ac 51507->51510 51517 47513a 51507->51517 51524 474f14 19 API calls 51507->51524 51509 4750d1 51513 4750f2 51509->51513 51526 474f14 19 API calls 51509->51526 51510->51509 51525 474f14 19 API calls 51510->51525 51514 475132 51513->51514 51513->51517 51527 45206c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51513->51527 51518 474d98 51514->51518 51517->51461 51519 474dd3 51518->51519 51520 403450 4 API calls 51519->51520 51521 474df8 51520->51521 51528 473778 19 API calls 51521->51528 51523 474e39 51523->51517 51524->51510 51525->51509 51526->51513 51527->51514 51528->51523 51529->51465 51531 403494 4 API calls 51530->51531 51532 46312e 51531->51532 51547 42da00 51532->51547 51535 42da00 5 API calls 51536 463152 51535->51536 51537 462fec 19 API calls 51536->51537 51538 46315c 51537->51538 51539 42da00 5 API calls 51538->51539 51540 46316b 51539->51540 51550 463064 51540->51550 51543 42da00 5 API calls 51544 463184 51543->51544 51545 403400 4 API calls 51544->51545 51554 42d948 51547->51554 51552 463084 51550->51552 51551 40785c 19 API calls 51553 4630ce 51551->51553 51552->51551 51553->51543 51555 42d9f3 51554->51555 51557 42d968 51554->51557 51555->51535 51556 4037b8 4 API calls 51556->51557 51557->51555 51557->51556 51559 403800 4 API calls 51557->51559 51560 42c3b4 IsDBCSLeadByte 51557->51560 51559->51557 51560->51557 51562 42421e 51561->51562 51563 4241fe GetWindowTextA 51561->51563 51565 403494 4 API calls 51562->51565 51564 4034e0 4 API calls 51563->51564 51566 42421c 51564->51566 51565->51566 51566->51437 51570 44aecc 51567->51570 51571 44aeff 51570->51571 51572 414a58 4 API calls 51571->51572 51573 44af12 51572->51573 51605 461ce7 51603->51605 51604 461dc2 51614 463a7c 51604->51614 51605->51604 51609 461d37 51605->51609 51627 42198c 51605->51627 51606 461d7a 51606->51604 51633 418528 7 API calls 51606->51633 51609->51606 51610 461d71 51609->51610 51611 461d7c 51609->51611 51612 42198c 7 API calls 51610->51612 51613 42198c 7 API calls 51611->51613 51612->51606 51613->51606 51615 463aac 51614->51615 51616 463a8d 51614->51616 51615->50584 51617 414a88 4 API calls 51616->51617 51618 463a9b 51617->51618 51619 414a88 4 API calls 51618->51619 51619->51615 51621 467185 51620->51621 51622 42198c 7 API calls 51621->51622 51623 4671de 51622->51623 51623->50610 51625 46354c 18 API calls 51623->51625 51624->50586 51625->50610 51626->50612 51628 4219e4 51627->51628 51632 42199a 51627->51632 51628->51609 51629 4219c9 51629->51628 51642 421c98 SetFocus GetFocus 51629->51642 51632->51629 51634 408c24 51632->51634 51633->51604 51635 408c30 51634->51635 51643 406d54 LoadStringA 51635->51643 51638 403450 4 API calls 51639 408c61 51638->51639 51640 403400 4 API calls 51639->51640 51641 408c76 51640->51641 51641->51629 51642->51628 51644 4034e0 4 API calls 51643->51644 51645 406d81 51644->51645 51645->51638 51647 468a11 51646->51647 51648 414a58 4 API calls 51647->51648 51668 468a5e 51647->51668 51649 468a27 51648->51649 51839 463310 6 API calls 51649->51839 51650 403420 4 API calls 51652 468b08 51650->51652 51652->50625 51832 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51652->51832 51653 468a2f 51654 414a88 4 API calls 51653->51654 51655 468a3d 51654->51655 51656 468a4a 51655->51656 51658 468a63 51655->51658 51840 47a2f8 37 API calls 51656->51840 51659 468a7b 51658->51659 51661 4633f4 CharNextA 51658->51661 51841 47a2f8 37 API calls 51659->51841 51662 468a77 51661->51662 51662->51659 51663 468a91 51662->51663 51664 468a97 51663->51664 51665 468aad 51663->51665 51842 47a2f8 37 API calls 51664->51842 51667 42c878 CharNextA 51665->51667 51669 468aba 51667->51669 51668->51650 51669->51668 51843 463480 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51669->51843 51671 468ad1 51672 450c84 4 API calls 51671->51672 51673 468ade 51672->51673 51844 47a2f8 37 API calls 51673->51844 51676 42415d SetActiveWindow 51675->51676 51681 424193 51675->51681 51845 4235bc 51676->51845 51680 42417a 51680->51681 51681->50637 51681->50638 51684 47d7bf 51683->51684 51686 47d7ed 51683->51686 51858 48fde0 18 API calls 51684->51858 51687 471c44 51686->51687 51859 4560d8 51687->51859 51833->50633 51839->51653 51840->51668 51841->51668 51842->51668 51843->51671 51844->51668 51854 423568 SystemParametersInfoA 51845->51854 51848 4235d5 ShowWindow 51850 4235e0 51848->51850 51851 4235e7 51848->51851 51857 423598 SystemParametersInfoA 51850->51857 51853 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 51851->51853 51853->51680 51855 423586 51854->51855 51855->51848 51856 423598 SystemParametersInfoA 51855->51856 51856->51848 51857->51851 51858->51686 51860 456104 51859->51860 51875 45620c 51859->51875 51861 45625d 51875->51861 52319 455940 6 API calls 51875->52319 52319->51861 53484 431a2c 53445->53484 53447 403400 4 API calls 53448 43d5b6 53447->53448 53448->50691 53448->50692 53449 43d532 53449->53447 53451 431716 53450->53451 53452 402648 4 API calls 53451->53452 53453 431746 53452->53453 53454 48f8ec 53453->53454 53455 48f9c1 53454->53455 53459 48f906 53454->53459 53461 48fa04 53455->53461 53457 4338ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53457->53459 53459->53455 53459->53457 53460 403450 4 API calls 53459->53460 53489 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53459->53489 53490 4317e0 53459->53490 53460->53459 53462 48fa20 53461->53462 53498 4338ac 53462->53498 53464 48fa25 53465 4317e0 4 API calls 53464->53465 53466 48fa30 53465->53466 53467 43d0d4 53466->53467 53468 43d101 53467->53468 53473 43d0f3 53467->53473 53468->50702 53469 43d17d 53477 43d237 53469->53477 53501 446bc4 53469->53501 53473->53468 53473->53469 53474 446bc4 4 API calls 53473->53474 53474->53473 53475 43d43d 53475->53468 53527 446b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53475->53527 53477->53475 53478 43d41e 53477->53478 53525 446b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53477->53525 53526 446b64 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53478->53526 53481->50704 53482->50706 53483->50693 53485 403494 4 API calls 53484->53485 53486 431a3b 53485->53486 53487 431a65 53486->53487 53488 403744 4 API calls 53486->53488 53487->53449 53488->53486 53489->53459 53491 4317ee 53490->53491 53493 431800 53490->53493 53496 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53491->53496 53492 431822 53492->53459 53493->53492 53497 431780 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53493->53497 53496->53493 53497->53492 53499 402648 4 API calls 53498->53499 53500 4338bb 53499->53500 53500->53464 53502 446be3 53501->53502 53503 446bea 53501->53503 53528 446970 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53502->53528 53505 4317e0 4 API calls 53503->53505 53506 446bfa 53505->53506 53525->53477 53526->53475 53527->53475 53528->53503 53540 435420 53541 435435 53540->53541 53545 43544f 53541->53545 53546 434e08 53541->53546 53550 434e38 53546->53550 53551 434e52 53546->53551 53547 403400 4 API calls 53548 435257 53547->53548 53548->53545 53559 435268 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53548->53559 53549 4468e4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53549->53550 53550->53549 53550->53551 53552 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53550->53552 53553 402648 4 API calls 53550->53553 53555 4317e0 4 API calls 53550->53555 53556 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53550->53556 53557 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53550->53557 53560 433ef0 53550->53560 53572 4346b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53550->53572 53551->53547 53552->53550 53553->53550 53555->53550 53556->53550 53557->53550 53559->53545 53561 433fad 53560->53561 53562 433f1d 53560->53562 53591 433e50 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53561->53591 53563 403494 4 API calls 53562->53563 53565 433f2b 53563->53565 53567 403778 4 API calls 53565->53567 53566 433f9f 53568 403400 4 API calls 53566->53568 53570 433f4c 53567->53570 53569 433ffd 53568->53569 53569->53550 53570->53566 53573 48fa38 53570->53573 53572->53550 53574 48fb08 53573->53574 53575 48fa70 53573->53575 53592 448470 53574->53592 53576 403494 4 API calls 53575->53576 53578 48fa7b 53576->53578 53581 48fa8b 53578->53581 53583 4037b8 4 API calls 53578->53583 53579 403400 4 API calls 53580 48fb2c 53579->53580 53582 403400 4 API calls 53580->53582 53581->53579 53584 48fb34 53582->53584 53585 48faa4 53583->53585 53584->53570 53585->53581 53586 4037b8 4 API calls 53585->53586 53587 48fac7 53586->53587 53588 403778 4 API calls 53587->53588 53589 48faf8 53588->53589 53590 403634 4 API calls 53589->53590 53590->53574 53591->53566 53593 448495 53592->53593 53595 4484d8 53592->53595 53594 403494 4 API calls 53593->53594 53597 4484a0 53594->53597 53596 4484ec 53595->53596 53604 44806c 53595->53604 53599 403400 4 API calls 53596->53599 53600 4037b8 4 API calls 53597->53600 53601 44851f 53599->53601 53602 4484bc 53600->53602 53601->53581 53603 4037b8 4 API calls 53602->53603 53603->53595 53605 403494 4 API calls 53604->53605 53606 4480a2 53605->53606 53607 4037b8 4 API calls 53606->53607 53608 4480b4 53607->53608 53609 403778 4 API calls 53608->53609 53610 4480d5 53609->53610 53611 4037b8 4 API calls 53610->53611 53612 4480ed 53611->53612 53613 403778 4 API calls 53612->53613 53614 448118 53613->53614 53615 4037b8 4 API calls 53614->53615 53626 448130 53615->53626 53616 448168 53618 403420 4 API calls 53616->53618 53617 448203 53620 44820b GetProcAddress 53617->53620 53621 448248 53618->53621 53619 44819d LoadLibraryA 53619->53626 53623 44821e 53620->53623 53621->53596 53622 44818b LoadLibraryExA 53622->53626 53623->53616 53624 403b80 4 API calls 53624->53626 53625 403450 4 API calls 53625->53626 53626->53616 53626->53617 53626->53619 53626->53622 53626->53624 53626->53625 53628 43d5c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53626->53628 53628->53626 53629 48d920 53630 48d954 53629->53630 53631 48d96a 53630->53631 53632 48d956 53630->53632 53635 48d979 53631->53635 53636 48d9a6 53631->53636 53765 446adc 18 API calls 53632->53765 53634 48d95f Sleep 53693 48d9dd 53634->53693 53638 446b38 18 API calls 53635->53638 53641 48d9e2 53636->53641 53642 48d9b5 53636->53642 53637 403420 4 API calls 53639 48de14 53637->53639 53640 48d988 53638->53640 53644 48d990 FindWindowA 53640->53644 53647 48da38 53641->53647 53648 48d9f1 53641->53648 53643 446b38 18 API calls 53642->53643 53645 48d9c2 53643->53645 53646 446db8 5 API calls 53644->53646 53649 48d9ca FindWindowA 53645->53649 53685 48d9a1 53646->53685 53653 48da94 53647->53653 53654 48da47 53647->53654 53766 446adc 18 API calls 53648->53766 53651 446db8 5 API calls 53649->53651 53651->53693 53652 48d9fd 53767 446adc 18 API calls 53652->53767 53661 48daf0 53653->53661 53662 48daa3 53653->53662 53770 446adc 18 API calls 53654->53770 53657 48da0a 53768 446adc 18 API calls 53657->53768 53658 48da53 53771 446adc 18 API calls 53658->53771 53660 48da17 53769 446adc 18 API calls 53660->53769 53671 48daff 53661->53671 53680 48db2a 53661->53680 53775 446adc 18 API calls 53662->53775 53666 48da60 53772 446adc 18 API calls 53666->53772 53667 48da22 SendMessageA 53670 446db8 5 API calls 53667->53670 53668 48daaf 53776 446adc 18 API calls 53668->53776 53670->53685 53674 446b38 18 API calls 53671->53674 53673 48da6d 53773 446adc 18 API calls 53673->53773 53678 48db0c 53674->53678 53675 48dabc 53777 446adc 18 API calls 53675->53777 53677 48da78 PostMessageA 53774 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53677->53774 53686 48db14 RegisterClipboardFormatA 53678->53686 53683 48db78 53680->53683 53684 48db39 53680->53684 53682 48dac9 53778 446adc 18 API calls 53682->53778 53694 48dbcc 53683->53694 53695 48db87 53683->53695 53780 446adc 18 API calls 53684->53780 53685->53693 53690 446db8 5 API calls 53686->53690 53689 48db45 53781 446adc 18 API calls 53689->53781 53690->53693 53691 48dad4 SendNotifyMessageA 53779 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53691->53779 53693->53637 53702 48dbdb 53694->53702 53703 48dc20 53694->53703 53783 446adc 18 API calls 53695->53783 53697 48db52 53782 446adc 18 API calls 53697->53782 53700 48db93 53784 446adc 18 API calls 53700->53784 53701 48db5d SendMessageA 53705 446db8 5 API calls 53701->53705 53787 446adc 18 API calls 53702->53787 53711 48dc2f 53703->53711 53712 48dc82 53703->53712 53705->53685 53707 48dba0 53785 446adc 18 API calls 53707->53785 53708 48dbe7 53788 446adc 18 API calls 53708->53788 53710 48dbab PostMessageA 53786 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53710->53786 53715 446b38 18 API calls 53711->53715 53719 48dd09 53712->53719 53720 48dc91 53712->53720 53717 48dc3c 53715->53717 53716 48dbf4 53789 446adc 18 API calls 53716->53789 53721 42e1b4 2 API calls 53717->53721 53730 48dd18 53719->53730 53731 48dd3e 53719->53731 53723 446b38 18 API calls 53720->53723 53724 48dc49 53721->53724 53722 48dbff SendNotifyMessageA 53790 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53722->53790 53726 48dca0 53723->53726 53727 48dc5f GetLastError 53724->53727 53728 48dc4f 53724->53728 53791 446adc 18 API calls 53726->53791 53732 446db8 5 API calls 53727->53732 53729 446db8 5 API calls 53728->53729 53733 48dc5d 53729->53733 53796 446adc 18 API calls 53730->53796 53738 48dd4d 53731->53738 53739 48dd70 53731->53739 53732->53733 53737 446db8 5 API calls 53733->53737 53736 48dd22 FreeLibrary 53797 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53736->53797 53737->53693 53742 446b38 18 API calls 53738->53742 53748 48dd7f 53739->53748 53754 48ddb3 53739->53754 53740 48dcb3 GetProcAddress 53743 48dcf9 53740->53743 53744 48dcbf 53740->53744 53745 48dd59 53742->53745 53795 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53743->53795 53792 446adc 18 API calls 53744->53792 53750 48dd61 CreateMutexA 53745->53750 53798 487c0c 18 API calls 53748->53798 53749 48dccb 53793 446adc 18 API calls 53749->53793 53750->53693 53753 48dcd8 53756 446db8 5 API calls 53753->53756 53754->53693 53800 487c0c 18 API calls 53754->53800 53759 48dce9 53756->53759 53757 48dd8b 53758 48dd9c OemToCharBuffA 53757->53758 53799 487c24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53758->53799 53794 446c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53759->53794 53762 48ddce 53763 48dddf CharToOemBuffA 53762->53763 53801 487c24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53763->53801 53765->53634 53766->53652 53767->53657 53768->53660 53769->53667 53770->53658 53771->53666 53772->53673 53773->53677 53774->53685 53775->53668 53776->53675 53777->53682 53778->53691 53779->53693 53780->53689 53781->53697 53782->53701 53783->53700 53784->53707 53785->53710 53786->53685 53787->53708 53788->53716 53789->53722 53790->53693 53791->53740 53792->53749 53793->53753 53794->53685 53795->53685 53796->53736 53797->53693 53798->53757 53799->53693 53800->53762 53801->53693 53802 448268 53803 448296 53802->53803 53804 44829d 53802->53804 53807 403400 4 API calls 53803->53807 53805 4482b1 53804->53805 53808 44806c 7 API calls 53804->53808 53805->53803 53806 403494 4 API calls 53805->53806 53809 4482ca 53806->53809 53810 448447 53807->53810 53808->53805 53811 4037b8 4 API calls 53809->53811 53812 4482e6 53811->53812 53813 4037b8 4 API calls 53812->53813 53814 448302 53813->53814 53814->53803 53815 448316 53814->53815 53816 4037b8 4 API calls 53815->53816 53817 448330 53816->53817 53818 431710 4 API calls 53817->53818 53819 448352 53818->53819 53820 4317e0 4 API calls 53819->53820 53826 448372 53819->53826 53820->53819 53821 4483c8 53834 441e74 53821->53834 53824 4483b0 53824->53821 53846 443110 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53824->53846 53825 4483fc GetLastError 53847 448000 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53825->53847 53826->53824 53845 443110 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53826->53845 53829 44840b 53848 443150 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53829->53848 53831 448420 53849 443160 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53831->53849 53833 448428 53835 442e52 53834->53835 53836 441ead 53834->53836 53838 403400 4 API calls 53835->53838 53837 403400 4 API calls 53836->53837 53839 441eb5 53837->53839 53840 442e67 53838->53840 53841 431710 4 API calls 53839->53841 53840->53825 53843 441ec1 53841->53843 53842 442e42 53842->53825 53843->53842 53850 44154c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53843->53850 53845->53826 53846->53821 53847->53829 53848->53831 53849->53833 53850->53843 53851 44afe8 53852 44aff6 53851->53852 53854 44b015 53851->53854 53853 44aecc 11 API calls 53852->53853 53852->53854 53853->53854 53855 4135ac SetWindowLongA GetWindowLongA 53856 413609 SetPropA SetPropA 53855->53856 53857 4135eb GetWindowLongA 53855->53857 53861 41f30c 53856->53861 53857->53856 53858 4135fa SetWindowLongA 53857->53858 53858->53856 53866 4151e0 53861->53866 53873 423b7c 53861->53873 53967 4239f4 53861->53967 53862 413659 53867 4151ed 53866->53867 53868 415253 53867->53868 53869 415248 53867->53869 53872 415251 53867->53872 53974 424afc 13 API calls 53868->53974 53869->53872 53975 414fcc 46 API calls 53869->53975 53872->53862 53876 423bb2 53873->53876 53894 423bd3 53876->53894 53976 423ad8 53876->53976 53877 423c5c 53879 423c63 53877->53879 53880 423c97 53877->53880 53878 423bfd 53881 423c03 53878->53881 53882 423cc0 53878->53882 53889 423c69 53879->53889 53926 423f21 53879->53926 53885 423ca2 53880->53885 53886 42400a IsIconic 53880->53886 53883 423c35 53881->53883 53884 423c08 53881->53884 53887 423cd2 53882->53887 53888 423cdb 53882->53888 53883->53894 53915 423c4e 53883->53915 53916 423daf 53883->53916 53890 423d66 53884->53890 53891 423c0e 53884->53891 53892 424046 53885->53892 53893 423cab 53885->53893 53886->53894 53898 42401e GetFocus 53886->53898 53895 423ce8 53887->53895 53896 423cd9 53887->53896 53983 424104 11 API calls 53888->53983 53899 423e83 SendMessageA 53889->53899 53900 423c77 53889->53900 53988 423af4 NtdllDefWindowProc_A 53890->53988 53901 423c17 53891->53901 53902 423d8e PostMessageA 53891->53902 54002 4247c0 WinHelpA PostMessageA 53892->54002 53905 42405d 53893->53905 53924 423c30 53893->53924 53894->53862 53906 42414c 11 API calls 53895->53906 53984 423af4 NtdllDefWindowProc_A 53896->53984 53898->53894 53907 42402f 53898->53907 53899->53894 53900->53894 53900->53924 53945 423ec6 53900->53945 53910 423c20 53901->53910 53911 423e15 53901->53911 53994 423af4 NtdllDefWindowProc_A 53902->53994 53913 424066 53905->53913 53914 42407b 53905->53914 53906->53894 54001 41ef64 GetCurrentThreadId 73A25940 53907->54001 53919 423c29 53910->53919 53920 423d3e IsIconic 53910->53920 53921 423e1e 53911->53921 53922 423e4f 53911->53922 53912 423da9 53912->53894 54003 424444 53913->54003 54009 42449c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 53914->54009 53915->53924 53925 423d7b 53915->53925 53980 423af4 NtdllDefWindowProc_A 53916->53980 53918 424036 53918->53894 53929 42403e SetFocus 53918->53929 53919->53924 53930 423d01 53919->53930 53932 423d5a 53920->53932 53933 423d4e 53920->53933 53996 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53921->53996 53981 423af4 NtdllDefWindowProc_A 53922->53981 53924->53894 53982 423af4 NtdllDefWindowProc_A 53924->53982 53989 4240e8 53925->53989 53926->53894 53939 423f47 IsWindowEnabled 53926->53939 53929->53894 53930->53894 53985 422bbc ShowWindow PostMessageA PostQuitMessage 53930->53985 53987 423af4 NtdllDefWindowProc_A 53932->53987 53986 423b30 15 API calls 53933->53986 53937 423db5 53943 423df3 53937->53943 53944 423dd1 53937->53944 53938 423e26 53949 423e38 53938->53949 53955 41eec8 6 API calls 53938->53955 53939->53894 53950 423f55 53939->53950 53942 423e55 53951 423e6d 53942->53951 53957 41ee14 2 API calls 53942->53957 53947 4239f4 6 API calls 53943->53947 53995 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53944->53995 53945->53894 53952 423ee8 IsWindowEnabled 53945->53952 53954 423dfb PostMessageA 53947->53954 53997 423af4 NtdllDefWindowProc_A 53949->53997 53960 423f5c IsWindowVisible 53950->53960 53958 4239f4 6 API calls 53951->53958 53952->53894 53959 423ef6 53952->53959 53953 423dd9 PostMessageA 53953->53894 53954->53894 53955->53949 53957->53951 53958->53894 53998 412280 7 API calls 53959->53998 53960->53894 53962 423f6a GetFocus 53960->53962 53963 418150 53962->53963 53964 423f7f SetFocus 53963->53964 53999 4151b0 53964->53999 53968 423a7d 53967->53968 53969 423a04 53967->53969 53968->53862 53969->53968 53970 423a0a EnumWindows 53969->53970 53970->53968 53971 423a26 GetWindow GetWindowLongA 53970->53971 54088 42398c GetWindow 53970->54088 53972 423a45 53971->53972 53972->53968 53973 423a71 SetWindowPos 53972->53973 53973->53968 53973->53972 53974->53872 53975->53872 53977 423ae2 53976->53977 53978 423aed 53976->53978 53977->53978 54010 408688 GetSystemDefaultLCID 53977->54010 53978->53877 53978->53878 53980->53937 53981->53942 53982->53894 53983->53894 53984->53894 53985->53894 53986->53894 53987->53894 53988->53894 54073 41daa0 53989->54073 53992 424100 53992->53894 53993 4240f4 LoadIconA 53993->53992 53994->53912 53995->53953 53996->53938 53997->53894 53998->53894 54000 4151cb SetFocus 53999->54000 54000->53894 54001->53918 54002->53912 54004 424450 54003->54004 54006 42446a 54003->54006 54005 424457 SendMessageA 54004->54005 54008 42447f 54004->54008 54005->54008 54007 402648 4 API calls 54006->54007 54007->54008 54008->53894 54009->53912 54065 4084d0 GetLocaleInfoA 54010->54065 54013 403450 4 API calls 54014 4086c8 54013->54014 54015 4084d0 5 API calls 54014->54015 54016 4086dd 54015->54016 54017 4084d0 5 API calls 54016->54017 54018 408701 54017->54018 54071 40851c GetLocaleInfoA 54018->54071 54021 40851c GetLocaleInfoA 54022 408731 54021->54022 54023 4084d0 5 API calls 54022->54023 54024 40874b 54023->54024 54025 40851c GetLocaleInfoA 54024->54025 54026 408768 54025->54026 54027 4084d0 5 API calls 54026->54027 54028 408782 54027->54028 54029 403450 4 API calls 54028->54029 54030 40878f 54029->54030 54031 4084d0 5 API calls 54030->54031 54032 4087a4 54031->54032 54033 403450 4 API calls 54032->54033 54034 4087b1 54033->54034 54035 40851c GetLocaleInfoA 54034->54035 54036 4087bf 54035->54036 54037 4084d0 5 API calls 54036->54037 54038 4087d9 54037->54038 54066 4084f7 54065->54066 54067 408509 54065->54067 54068 4034e0 4 API calls 54066->54068 54069 403494 4 API calls 54067->54069 54070 408507 54068->54070 54069->54070 54070->54013 54072 408538 54071->54072 54072->54021 54076 41dac4 54073->54076 54077 41daaa 54076->54077 54078 41dad1 54076->54078 54077->53992 54077->53993 54078->54077 54085 40cbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54078->54085 54080 41daee 54080->54077 54081 41db08 54080->54081 54082 41dafb 54080->54082 54086 41bcfc 11 API calls 54081->54086 54087 41b2f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54082->54087 54085->54080 54086->54077 54087->54077 54089 4239b9 54088->54089 54090 4239ad GetWindowLongA 54088->54090 54090->54089 54091 23d1010 54093 23d1019 54091->54093 54092 23d101d 54093->54092 54096 45c108 54093->54096 54097 45c117 54096->54097 54098 45c14b VirtualAlloc 54097->54098 54102 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54097->54102 54100 45c163 54098->54100 54101 45c146 54101->54098 54102->54101 54103 416ab2 54104 416b5a 54103->54104 54105 416aca 54103->54105 54122 41528c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54104->54122 54107 416ae4 SendMessageA 54105->54107 54108 416ad8 54105->54108 54118 416b38 54107->54118 54109 416ae2 CallWindowProcA 54108->54109 54110 416afe 54108->54110 54109->54118 54119 419fc8 GetSysColor 54110->54119 54113 416b09 SetTextColor 54114 416b1e 54113->54114 54120 419fc8 GetSysColor 54114->54120 54116 416b23 SetBkColor 54121 41a650 GetSysColor CreateBrushIndirect 54116->54121 54119->54113 54120->54116 54121->54118 54122->54118 54123 4165b4 54124 4165c1 54123->54124 54125 41661b 54123->54125 54130 4164c0 CreateWindowExA 54124->54130 54126 4165c8 SetPropA SetPropA 54126->54125 54127 4165fb 54126->54127 54128 41660e SetWindowPos 54127->54128 54128->54125 54130->54126 54131 47bdbf 54132 47bdc8 54131->54132 54135 47bdf3 54131->54135 54134 47bde5 54132->54134 54132->54135 54133 47be32 54136 47be45 54133->54136 54137 47be52 54133->54137 54527 472974 186 API calls 54134->54527 54135->54133 54529 47a7cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54135->54529 54140 47be87 54136->54140 54141 47be49 54136->54141 54143 47be6c 54137->54143 54144 47be5b 54137->54144 54149 47be90 54140->54149 54150 47beab 54140->54150 54146 47be4d 54141->54146 54153 47bee5 54141->54153 54154 47beca 54141->54154 54142 47bdea 54142->54135 54528 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54142->54528 54532 47a9d8 37 API calls 54143->54532 54531 47a968 37 API calls 54144->54531 54145 47be25 54530 47a968 37 API calls 54145->54530 54159 47bf0e 54146->54159 54160 47bf2c 54146->54160 54533 47a9d8 37 API calls 54149->54533 54534 47a9d8 37 API calls 54150->54534 54536 47a9d8 37 API calls 54153->54536 54535 47a9d8 37 API calls 54154->54535 54162 47bf23 54159->54162 54537 47a968 37 API calls 54159->54537 54539 47a664 24 API calls 54160->54539 54538 47a664 24 API calls 54162->54538 54163 47bf2a 54166 47bf42 54163->54166 54167 47bf3c 54163->54167 54168 47bf40 54166->54168 54169 47a944 37 API calls 54166->54169 54167->54168 54252 47a944 54167->54252 54257 477f2c 54168->54257 54169->54168 54549 47a2f8 37 API calls 54252->54549 54254 47a95f 54550 408b48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54254->54550 54258 42d774 GetWindowsDirectoryA 54257->54258 54259 477f4a 54258->54259 54260 403450 4 API calls 54259->54260 54261 477f57 54260->54261 54262 42d7a0 GetSystemDirectoryA 54261->54262 54263 477f5f 54262->54263 54264 403450 4 API calls 54263->54264 54265 477f6c 54264->54265 54266 42d7cc 6 API calls 54265->54266 54267 477f74 54266->54267 54268 403450 4 API calls 54267->54268 54269 477f81 54268->54269 54270 477fa6 54269->54270 54271 477f8a 54269->54271 54273 403400 4 API calls 54270->54273 54571 42d0e4 54271->54571 54275 477fa4 54273->54275 54277 477feb 54275->54277 54278 42c7a8 5 API calls 54275->54278 54276 403450 4 API calls 54276->54275 54551 477db4 54277->54551 54280 477fc6 54278->54280 54282 403450 4 API calls 54280->54282 54284 477fd3 54282->54284 54283 403450 4 API calls 54285 478007 54283->54285 54284->54277 54287 403450 4 API calls 54284->54287 54286 478025 54285->54286 54288 4035c0 4 API calls 54285->54288 54289 477db4 8 API calls 54286->54289 54287->54277 54288->54286 54527->54142 54529->54145 54530->54133 54531->54146 54532->54146 54533->54146 54534->54146 54535->54146 54536->54146 54537->54162 54538->54163 54539->54163 54549->54254 54552 42dc54 RegOpenKeyExA 54551->54552 54553 477dda 54552->54553 54554 477e00 54553->54554 54555 477dde 54553->54555 54557 403400 4 API calls 54554->54557 54581 42db84 54555->54581 54559 477e07 54557->54559 54559->54283 54560 477df5 RegCloseKey 54560->54559 54561 403400 4 API calls 54561->54560 54572 4038a4 4 API calls 54571->54572 54573 42d0f7 54572->54573 54574 42d10e GetEnvironmentVariableA 54573->54574 54578 42d121 54573->54578 54584 42da08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54573->54584 54574->54573 54575 42d11a 54574->54575 54576 403400 4 API calls 54575->54576 54576->54578 54578->54276 54582 42da38 6 API calls 54581->54582 54583 42db8d 54582->54583 54583->54560 54583->54561 54584->54573 56078 493d30 56134 403344 56078->56134 56080 493d3e 56137 4056a0 56080->56137 56082 493d43 56140 4098b4 56082->56140 56086 493d4d 56150 4108c4 56086->56150 56088 493d52 56154 412898 56088->56154 56392 4032fc 56134->56392 56136 403349 GetModuleHandleA GetCommandLineA 56136->56080 56139 4056db 56137->56139 56393 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56137->56393 56139->56082 56394 408f8c 56140->56394 56145 408688 7 API calls 56146 4098d7 56145->56146 56409 408fd8 GetVersionExA 56146->56409 56149 409ae8 6F551CD0 56149->56086 56151 4108ce 56150->56151 56152 41090d GetCurrentThreadId 56151->56152 56153 410928 56152->56153 56153->56088 56411 40ae6c 56154->56411 56392->56136 56393->56139 56395 408c24 5 API calls 56394->56395 56396 408f9d 56395->56396 56397 408544 GetSystemDefaultLCID 56396->56397 56399 40857a 56397->56399 56398 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56398->56399 56399->56398 56400 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56399->56400 56401 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56399->56401 56403 4085dc 56399->56403 56400->56399 56401->56399 56402 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56402->56403 56403->56402 56404 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56403->56404 56405 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56403->56405 56406 40865f 56403->56406 56404->56403 56405->56403 56407 403420 4 API calls 56406->56407 56408 408679 56407->56408 56408->56145 56410 408fef 56409->56410 56410->56149 56413 40ae73 56411->56413 56412 40ae92 56415 410f7c 56412->56415 56413->56412 56422 40ada4 19 API calls 56413->56422 56416 410f9e 56415->56416 56417 406d54 5 API calls 56416->56417 56418 403450 4 API calls 56416->56418 56419 410fbd 56416->56419 56417->56416 56418->56416 56420 403400 4 API calls 56419->56420 56421 410fd2 56420->56421 56422->56413 57656 23d1100 57657 23d1109 57656->57657 57659 23d1112 57656->57659 57660 23d1119 57659->57660 57661 23d1e90 57659->57661 57665 23d1eae 57661->57665 57663 23d41e8 57670 23d44f0 RaiseException 57663->57670 57666 23d2265 57665->57666 57667 23d20b9 57665->57667 57668 45c108 5 API calls 57665->57668 57666->57667 57669 23d44f0 RaiseException 57666->57669 57667->57659 57668->57666 57669->57663 57670->57667
                                                                  Strings
                                                                  • Skipping due to "onlyifdestfileexists" flag., xrefs: 0046D316
                                                                  • Time stamp of our file: %s, xrefs: 0046CDB7
                                                                  • Dest filename: %s, xrefs: 0046CCB0
                                                                  • -- File entry --, xrefs: 0046CB17
                                                                  • Incrementing shared file count (32-bit)., xrefs: 0046D9A4
                                                                  • InUn, xrefs: 0046D561
                                                                  • Existing file is protected by Windows File Protection. Skipping., xrefs: 0046D208
                                                                  • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0046D2B2
                                                                  • Failed to strip read-only attribute., xrefs: 0046D2EF
                                                                  • Same time stamp. Skipping., xrefs: 0046D171
                                                                  • @, xrefs: 0046CBCC
                                                                  • Time stamp of existing file: (failed to read), xrefs: 0046CE53
                                                                  • Existing file's MD5 sum is different from our file. Proceeding., xrefs: 0046D0E0
                                                                  • Non-default bitness: 32-bit, xrefs: 0046CCD7
                                                                  • Existing file has a later time stamp. Skipping., xrefs: 0046D1EB
                                                                  • Existing file's MD5 sum matches our file. Skipping., xrefs: 0046D0D1
                                                                  • .tmp, xrefs: 0046D3D3
                                                                  • Will register the file (a DLL/OCX) later., xrefs: 0046D91E
                                                                  • Uninstaller requires administrator: %s, xrefs: 0046D591
                                                                  • Couldn't read time stamp. Skipping., xrefs: 0046D151
                                                                  • User opted not to overwrite the existing file. Skipping., xrefs: 0046D269
                                                                  • Version of existing file: (none), xrefs: 0046D116
                                                                  • IF, xrefs: 0046DB13
                                                                  • Skipping due to "onlyifdoesntexist" flag., xrefs: 0046CDEA
                                                                  • Same version. Skipping., xrefs: 0046D101
                                                                  • Installing the file., xrefs: 0046D325
                                                                  • , xrefs: 0046CFEB, 0046D1BC, 0046D23A
                                                                  • Version of our file: (none), xrefs: 0046CF18
                                                                  • Time stamp of existing file: %s, xrefs: 0046CE47
                                                                  • Will register the file (a type library) later., xrefs: 0046D912
                                                                  • Non-default bitness: 64-bit, xrefs: 0046CCCB
                                                                  • Time stamp of our file: (failed to read), xrefs: 0046CDC3
                                                                  • Version of our file: %u.%u.%u.%u, xrefs: 0046CF0C
                                                                  • Incrementing shared file count (64-bit)., xrefs: 0046D98B
                                                                  • Dest file is protected by Windows File Protection., xrefs: 0046CD09
                                                                  • Dest file exists., xrefs: 0046CDD7
                                                                  • Version of existing file: %u.%u.%u.%u, xrefs: 0046CF98
                                                                  • Failed to read existing file's MD5 sum. Proceeding., xrefs: 0046D0EC
                                                                  • Stripped read-only attribute., xrefs: 0046D2E3
                                                                  • Existing file is a newer version. Skipping., xrefs: 0046D01E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's MD5 sum is different from our file. Proceeding.$Existing file's MD5 sum matches our file. Skipping.$Failed to read existing file's MD5 sum. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing the file.$IF$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                  • API String ID: 0-3571605357
                                                                  • Opcode ID: eeaba1ed55c551783d6c4063a7afe46bb51bbf37f401dd38843f7e860b600746
                                                                  • Instruction ID: 764dd9b7837a55062f9756f2532f5d93a8586d3a18b7dcab1f1df9edb8937839
                                                                  • Opcode Fuzzy Hash: eeaba1ed55c551783d6c4063a7afe46bb51bbf37f401dd38843f7e860b600746
                                                                  • Instruction Fuzzy Hash: 83928434E042889FCB11DFA5C485BDDBBF1AF05308F1541ABE844AB392D7789E49DB1A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1591 423b7c-423bb0 1592 423bb2-423bb3 1591->1592 1593 423be4-423bfb call 423ad8 1591->1593 1594 423bb5-423bd1 call 40b3ac 1592->1594 1599 423c5c-423c61 1593->1599 1600 423bfd 1593->1600 1622 423bd3-423bdb 1594->1622 1623 423be0-423be2 1594->1623 1601 423c63 1599->1601 1602 423c97-423c9c 1599->1602 1603 423c03-423c06 1600->1603 1604 423cc0-423cd0 1600->1604 1612 423f21-423f29 1601->1612 1613 423c69-423c71 1601->1613 1607 423ca2-423ca5 1602->1607 1608 42400a-424018 IsIconic 1602->1608 1605 423c35-423c38 1603->1605 1606 423c08 1603->1606 1610 423cd2-423cd7 1604->1610 1611 423cdb-423ce3 call 424104 1604->1611 1618 423d19-423d20 1605->1618 1619 423c3e-423c3f 1605->1619 1614 423d66-423d76 call 423af4 1606->1614 1615 423c0e-423c11 1606->1615 1616 424046-42405b call 4247c0 1607->1616 1617 423cab-423cac 1607->1617 1620 4240c2-4240ca 1608->1620 1627 42401e-424029 GetFocus 1608->1627 1624 423ce8-423cf0 call 42414c 1610->1624 1625 423cd9-423cfc call 423af4 1610->1625 1611->1620 1612->1620 1621 423f2f-423f3a call 418150 1612->1621 1628 423e83-423eaa SendMessageA 1613->1628 1629 423c77-423c7c 1613->1629 1614->1620 1630 423c17-423c1a 1615->1630 1631 423d8e-423daa PostMessageA call 423af4 1615->1631 1616->1620 1641 423cb2-423cb5 1617->1641 1642 42405d-424064 1617->1642 1618->1620 1633 423d26-423d2d 1618->1633 1634 423c45-423c48 1619->1634 1635 423eaf-423eb6 1619->1635 1640 4240e1-4240e7 1620->1640 1621->1620 1676 423f40-423f4f call 418150 IsWindowEnabled 1621->1676 1622->1640 1623->1593 1623->1594 1624->1620 1625->1620 1627->1620 1646 42402f-424038 call 41ef64 1627->1646 1628->1620 1637 423c82-423c83 1629->1637 1638 423fba-423fc5 1629->1638 1649 423c20-423c23 1630->1649 1650 423e15-423e1c 1630->1650 1631->1620 1633->1620 1654 423d33-423d39 1633->1654 1655 423c4e-423c51 1634->1655 1656 423daf-423dcf call 423af4 1634->1656 1635->1620 1665 423ebc-423ec1 call 404e54 1635->1665 1658 423fe2-423fed 1637->1658 1659 423c89-423c8c 1637->1659 1638->1620 1661 423fcb-423fdd 1638->1661 1662 424090-424097 1641->1662 1663 423cbb 1641->1663 1652 424066-424079 call 424444 1642->1652 1653 42407b-42408e call 42449c 1642->1653 1646->1620 1687 42403e-424044 SetFocus 1646->1687 1669 423c29-423c2a 1649->1669 1670 423d3e-423d4c IsIconic 1649->1670 1671 423e1e-423e31 call 423a84 1650->1671 1672 423e4f-423e60 call 423af4 1650->1672 1652->1620 1653->1620 1654->1620 1674 423c57 1655->1674 1675 423d7b-423d89 call 4240e8 1655->1675 1714 423df3-423e10 call 4239f4 PostMessageA 1656->1714 1715 423dd1-423dee call 423a84 PostMessageA 1656->1715 1658->1620 1683 423ff3-424005 1658->1683 1680 423c92 1659->1680 1681 423ec6-423ece 1659->1681 1661->1620 1678 4240aa-4240b9 1662->1678 1679 424099-4240a8 1662->1679 1682 4240bb-4240bc call 423af4 1663->1682 1665->1620 1688 423c30 1669->1688 1689 423d01-423d09 1669->1689 1695 423d5a-423d61 call 423af4 1670->1695 1696 423d4e-423d55 call 423b30 1670->1696 1720 423e43-423e4a call 423af4 1671->1720 1721 423e33-423e3d call 41eec8 1671->1721 1725 423e62-423e68 call 41ee14 1672->1725 1726 423e76-423e7e call 4239f4 1672->1726 1674->1682 1675->1620 1676->1620 1722 423f55-423f64 call 418150 IsWindowVisible 1676->1722 1678->1620 1679->1620 1680->1682 1681->1620 1702 423ed4-423edb 1681->1702 1710 4240c1 1682->1710 1683->1620 1687->1620 1688->1682 1689->1620 1704 423d0f-423d14 call 422bbc 1689->1704 1695->1620 1696->1620 1702->1620 1713 423ee1-423ef0 call 418150 IsWindowEnabled 1702->1713 1704->1620 1710->1620 1713->1620 1736 423ef6-423f0c call 412280 1713->1736 1714->1620 1715->1620 1720->1620 1721->1720 1722->1620 1743 423f6a-423fb5 GetFocus call 418150 SetFocus call 4151b0 SetFocus 1722->1743 1740 423e6d-423e70 1725->1740 1726->1620 1736->1620 1746 423f12-423f1c 1736->1746 1740->1726 1743->1620 1746->1620
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 71c5fd17a32dc336cd4eb35345c4712ce61510335a7e9e4477b493b8e1b05fdb
                                                                  • Instruction ID: 08d2eb01bbb0ed60fc7aa7cee5e011afdc801c2d0a550085eeb8675b0aa62de6
                                                                  • Opcode Fuzzy Hash: 71c5fd17a32dc336cd4eb35345c4712ce61510335a7e9e4477b493b8e1b05fdb
                                                                  • Instruction Fuzzy Hash: ACE19A30B00124EBC710DF69E585A5EB7B0FF48704FA441AAE645AB352CB7DEE81DB09

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1958 463d14-463d2a 1959 463d34-463deb call 4908e8 call 402b30 * 6 1958->1959 1960 463d2c-463d2f call 402d30 1958->1960 1977 463ded-463e14 call 4145ac 1959->1977 1978 463e28-463e41 1959->1978 1960->1959 1982 463e16 1977->1982 1983 463e19-463e23 call 41456c 1977->1983 1984 463e43-463e6a call 41458c 1978->1984 1985 463e7e-463e8c call 490bf0 1978->1985 1982->1983 1983->1978 1991 463e6f-463e79 call 41454c 1984->1991 1992 463e6c 1984->1992 1993 463e8e-463e9d call 490a38 1985->1993 1994 463e9f-463ea1 call 490b5c 1985->1994 1991->1985 1992->1991 1999 463ea6-463ef9 call 49054c call 41a340 * 2 1993->1999 1994->1999 2006 463f0a-463f1f call 450c84 call 414a88 1999->2006 2007 463efb-463f08 call 414a88 1999->2007 2012 463f24-463f2b 2006->2012 2007->2012 2014 463f73-4643f9 call 490988 call 490cac call 41458c * 3 call 41462c call 41454c * 3 call 45d6a0 call 45d6b8 call 45d6c4 call 45d70c call 45d6a0 call 45d6b8 call 45d6c4 call 45d70c call 45d6b8 call 45d70c LoadBitmapA call 41d620 call 45d6dc call 45d6f4 call 463b70 call 46561c call 4631ec call 40357c call 414a88 call 463524 call 46352c call 4631ec call 40357c * 2 call 414a88 call 46561c call 4631ec call 414a88 call 463524 call 46352c call 414a88 * 2 call 46561c call 414a88 * 2 call 463524 call 41456c call 463524 call 41456c call 46561c call 414a88 call 463524 call 46352c call 46561c call 414a88 call 463524 call 41456c * 2 call 414a88 call 463524 call 41456c 2012->2014 2015 463f2d-463f6e call 41462c call 414670 call 420f08 call 420f34 call 420ad8 call 420b04 2012->2015 2145 464455-46446e call 4149b4 * 2 2014->2145 2146 4643fb-464453 call 41456c call 414a88 call 463524 call 41456c 2014->2146 2015->2014 2154 464473-464524 call 4631ec call 46561c call 4631ec call 414a88 call 490cac call 463524 2145->2154 2146->2154 2172 464526-464541 2154->2172 2173 46455e-464782 call 4631ec call 414a88 call 490cbc * 2 call 42e62c call 41456c call 463524 call 41456c call 414a88 call 490988 call 490cac call 41458c call 4631ec call 414a88 call 463524 call 41456c call 4631ec call 46561c call 4631ec call 414a88 call 463524 call 41456c call 46352c call 4631ec call 414a88 call 463524 2154->2173 2174 464546-464559 call 41456c 2172->2174 2175 464543 2172->2175 2230 464784-46478d 2173->2230 2231 4647c3-46487c call 4631ec call 46561c call 4631ec call 414a88 call 490cac call 463524 2173->2231 2174->2173 2175->2174 2230->2231 2232 46478f-4647be call 4149b4 call 46352c 2230->2232 2249 4648b6-464cfd call 4631ec call 414a88 call 490cbc * 2 call 42e62c call 41456c call 463524 call 41456c call 414a88 call 490988 call 490cac call 41458c call 414a88 call 4631ec call 46561c call 4631ec call 414a88 call 463524 call 46352c call 42bb40 call 490cbc call 44e3f0 call 4631ec call 46561c call 4631ec call 46561c call 414a88 * 2 call 4631ec call 46561c * 2 call 414a88 call 463524 call 46352c call 46561c call 49054c call 41a340 call 4631ec call 40357c call 414a88 call 463524 call 41456c call 414a88 * 2 call 490cbc call 403494 call 40357c * 2 call 414a88 2231->2249 2250 46487e-464899 2231->2250 2232->2231 2353 464d21-464d28 2249->2353 2354 464cff-464d1c call 44fa04 call 44fb60 2249->2354 2251 46489e-4648b1 call 41456c 2250->2251 2252 46489b 2250->2252 2251->2249 2252->2251 2356 464d4c-464d53 2353->2356 2357 464d2a-464d47 call 44fa04 call 44fb60 2353->2357 2354->2353 2360 464d77-464dbd call 418150 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 465710 2356->2360 2361 464d55-464d72 call 44fa04 call 44fb60 2356->2361 2357->2356 2374 464dd7 2360->2374 2375 464dbf-464dc6 2360->2375 2361->2360 2378 464dd9-464de8 2374->2378 2376 464dd3-464dd5 2375->2376 2377 464dc8-464dd1 2375->2377 2376->2378 2377->2374 2377->2376 2379 464e02 2378->2379 2380 464dea-464df1 2378->2380 2383 464e04-464e1e 2379->2383 2381 464df3-464dfc 2380->2381 2382 464dfe-464e00 2380->2382 2381->2379 2381->2382 2382->2383 2384 464ec7-464ece 2383->2384 2385 464e24-464e2d 2383->2385 2388 464ed4-464ef7 call 477c14 call 403450 2384->2388 2389 464f62-464f70 call 414a88 2384->2389 2386 464e2f-464e86 call 477c14 call 414a88 call 477c14 call 414a88 call 477c14 call 414a88 2385->2386 2387 464e88-464ec2 call 414a88 * 3 2385->2387 2386->2384 2387->2384 2412 464f09-464f1d call 403494 2388->2412 2413 464ef9-464f07 call 403494 2388->2413 2397 464f75-464f7e 2389->2397 2401 464f84-464f9c call 429f48 2397->2401 2402 46508e-4650bd call 42b8dc call 44e37c 2397->2402 2414 465013-465017 2401->2414 2415 464f9e-464fa2 2401->2415 2431 4650c3-4650c7 2402->2431 2432 46516b-46516f 2402->2432 2427 464f2f-464f60 call 42c6e0 call 42ca9c call 403494 call 414a88 2412->2427 2428 464f1f-464f2a call 403494 2412->2428 2413->2427 2420 465067-46506b 2414->2420 2421 465019-465022 2414->2421 2422 464fa4-464fde call 40b3ac call 477c14 2415->2422 2434 46507f-465089 call 429fcc 2420->2434 2435 46506d-46507d call 429fcc 2420->2435 2421->2420 2429 465024-46502f 2421->2429 2488 464fe0-464fe7 2422->2488 2489 46500d-465011 2422->2489 2427->2397 2428->2427 2429->2420 2439 465031-465035 2429->2439 2441 4650c9-4650db call 40b3ac 2431->2441 2442 465171-465178 2432->2442 2443 4651ee-4651f2 2432->2443 2434->2402 2435->2402 2447 465037-46505a call 40b3ac call 406a2c 2439->2447 2466 46510d-465144 call 477c14 call 44c64c 2441->2466 2467 4650dd-46510b call 477c14 call 44c71c 2441->2467 2442->2443 2450 46517a-465181 2442->2450 2451 4651f4-46520b call 40b3ac 2443->2451 2452 46525b-465264 2443->2452 2498 465061-465065 2447->2498 2499 46505c-46505f 2447->2499 2450->2443 2461 465183-46518e 2450->2461 2480 46520d-465249 call 40b3ac call 466384 * 2 call 466224 2451->2480 2481 46524b-465259 call 466384 2451->2481 2459 465266-46527e call 40b3ac call 466384 2452->2459 2460 465283-465298 call 4638d0 call 463648 2452->2460 2459->2460 2504 4652ea-4652f4 call 4149b4 2460->2504 2505 46529a-4652bd call 429fb0 call 40b3ac 2460->2505 2461->2460 2469 465194-465198 2461->2469 2506 465149-46514d 2466->2506 2467->2506 2479 46519a-4651b0 call 40b3ac 2469->2479 2510 4651b2-4651de call 429fcc call 466384 call 466224 2479->2510 2511 4651e3-4651e7 2479->2511 2480->2460 2481->2460 2488->2489 2500 464fe9-464ffb call 406a2c 2488->2500 2489->2414 2489->2422 2498->2420 2498->2447 2499->2420 2500->2489 2526 464ffd-465007 2500->2526 2521 4652f9-465318 call 4149b4 2504->2521 2540 4652bf-4652c6 2505->2540 2541 4652c8-4652d7 call 4149b4 2505->2541 2516 46514f-465156 2506->2516 2517 465158-46515a 2506->2517 2510->2460 2511->2479 2518 4651e9 2511->2518 2516->2517 2525 465161-465165 2516->2525 2517->2525 2518->2460 2536 465342-465365 call 477c14 call 403450 2521->2536 2537 46531a-46533d call 429fb0 call 4664e4 2521->2537 2525->2432 2525->2441 2526->2489 2531 465009 2526->2531 2531->2489 2555 465367-465370 2536->2555 2556 465382-46538b 2536->2556 2537->2536 2540->2541 2545 4652d9-4652e8 call 4149b4 2540->2545 2541->2521 2545->2521 2555->2556 2559 465372-465380 call 403494 2555->2559 2557 4653a1-4653b1 call 403494 2556->2557 2558 46538d-46539f call 403684 2556->2558 2566 4653c3-4653da call 414a88 2557->2566 2558->2557 2567 4653b3-4653be call 403494 2558->2567 2559->2566 2571 465410-46541a call 4149b4 2566->2571 2572 4653dc-4653e3 2566->2572 2567->2566 2576 46541f-465444 call 403400 * 3 2571->2576 2574 4653e5-4653ee 2572->2574 2575 4653f0-4653fa call 42b054 2572->2575 2574->2575 2577 4653ff-46540e call 4149b4 2574->2577 2575->2577 2577->2576
                                                                  APIs
                                                                    • Part of subcall function 00490A38: GetWindowRect.USER32(00000000), ref: 00490A4E
                                                                  • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 004640E3
                                                                    • Part of subcall function 0041D620: GetObjectA.GDI32(?,00000018,004640FD), ref: 0041D64B
                                                                    • Part of subcall function 00463B70: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00463C0D
                                                                    • Part of subcall function 00463B70: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463C33
                                                                    • Part of subcall function 00463B70: SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00463C8F
                                                                    • Part of subcall function 00463B70: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463CB5
                                                                    • Part of subcall function 0046352C: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00464198,00000000,00000000,00000000,0000000C,00000000), ref: 00463544
                                                                    • Part of subcall function 00490CBC: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00490CC6
                                                                    • Part of subcall function 00490988: 73A1A570.USER32(00000000,?,?,?), ref: 004909AA
                                                                    • Part of subcall function 00490988: SelectObject.GDI32(?,00000000), ref: 004909D0
                                                                    • Part of subcall function 00490988: 73A1A480.USER32(00000000,?,00490A2E,00490A27,?,00000000,?,?,?), ref: 00490A21
                                                                    • Part of subcall function 00490CAC: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00490CB6
                                                                  • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,0213D964,0213F5B8,?,?,0213F5E8,?,?,0213F638,?), ref: 00464D81
                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00464D92
                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00464DAA
                                                                    • Part of subcall function 00429FCC: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 00429FE2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$AppendExtractFileIconInfoObject$A480A570BitmapCallbackDispatcherLoadMessageRectSelectSendSystemUserWindow
                                                                  • String ID: $(Default)$STOPIMAGE
                                                                  • API String ID: 1965080796-770201673
                                                                  • Opcode ID: 33519521e4debd935cc63a3db84bae575aede25e64dc45950a0079ee8547bc46
                                                                  • Instruction ID: 53e0fe022a5b39c5bb2f4b3018524fe0c03dc016e1e7b9a52ae47558d6fc0c9c
                                                                  • Opcode Fuzzy Hash: 33519521e4debd935cc63a3db84bae575aede25e64dc45950a0079ee8547bc46
                                                                  • Instruction Fuzzy Hash: 2AF2C5386105118FCB00EB69D8D9F9973F5BF89304F1542B6E5049B36ADB78EC46CB8A
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004712EE,?,?,00000001,0049715C), ref: 004711DD
                                                                  • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004712EE,?,?,00000001,0049715C), ref: 004712BA
                                                                  • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004712EE,?,?,00000001,0049715C), ref: 004712C8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstNext
                                                                  • String ID: unins$unins???.*
                                                                  • API String ID: 3541575487-1009660736
                                                                  • Opcode ID: 7c3f7a65199f259125b28f9e714cfac99b8e2395138cda4eed2b54fbb44c75b0
                                                                  • Instruction ID: fbfcfdc37d97a530e875f0c7be138cc09a4dc2487c0c3f38d124d831dacda521
                                                                  • Opcode Fuzzy Hash: 7c3f7a65199f259125b28f9e714cfac99b8e2395138cda4eed2b54fbb44c75b0
                                                                  • Instruction Fuzzy Hash: AF3135706001489BDB10EB69C985ADE77B9DF44304F5085F6A848EB372D738DF858B58
                                                                  APIs
                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448249), ref: 0044818C
                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044820D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID:
                                                                  • API String ID: 2574300362-0
                                                                  • Opcode ID: d697c6387f5891f63f72e9586e17d7fdc544452ade99bcbc5833b7844cac4076
                                                                  • Instruction ID: 19f54218a5dc2dea34a8af529d7b6b78998629b1663bba48939600e11264bb51
                                                                  • Opcode Fuzzy Hash: d697c6387f5891f63f72e9586e17d7fdc544452ade99bcbc5833b7844cac4076
                                                                  • Instruction Fuzzy Hash: 8C516374E00505AFDB01EF95C481AAEB7F8EB45314F10817FE814BB396CA789E05CB59
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004517EB,?,?,-00000001,00000000), ref: 004517C5
                                                                  • GetLastError.KERNEL32(00000000,?,00000000,004517EB,?,?,-00000001,00000000), ref: 004517CD
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileFindFirstLast
                                                                  • String ID:
                                                                  • API String ID: 873889042-0
                                                                  • Opcode ID: b63df860fd87db762586364769f740e1b96024d7f4935a190be61726d5837854
                                                                  • Instruction ID: 3f690bc20a6f729f33fea0595cc7536f2a0b066d891ae7d1f56deb5eee5a1bd0
                                                                  • Opcode Fuzzy Hash: b63df860fd87db762586364769f740e1b96024d7f4935a190be61726d5837854
                                                                  • Instruction Fuzzy Hash: EDF0F975A04604AB8B10DB7A9C4199EF7ECDB49725710467BFC14D3292DA784D058558
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                                                  • Instruction ID: 1ce02aaae6ec4ade8b295bae84213e8e13784b7c216e354617812bc232f4da8b
                                                                  • Opcode Fuzzy Hash: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                                                  • Instruction Fuzzy Hash: 59E0D87170021467D711E95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE4046ED
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004240C1,?,00000000,004240CC), ref: 00423B1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: 64e955a3b472d01c0905e970ca99d3a2ef1fdf3ede39ae3382b7425e9cc24165
                                                                  • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                                  • Opcode Fuzzy Hash: 64e955a3b472d01c0905e970ca99d3a2ef1fdf3ede39ae3382b7425e9cc24165
                                                                  • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: NameUser
                                                                  • String ID:
                                                                  • API String ID: 2645101109-0
                                                                  • Opcode ID: 70e1216f35f591b841bffe5de81119a2b88dbf3dcd7a6e2b2308a53e5b3bc461
                                                                  • Instruction ID: 10d8a52b9a8dc5e418ab8954d23c21dfb9e403ecd82518f781544b4d8b7ecea6
                                                                  • Opcode Fuzzy Hash: 70e1216f35f591b841bffe5de81119a2b88dbf3dcd7a6e2b2308a53e5b3bc461
                                                                  • Instruction Fuzzy Hash: 8ED0CD7130420063C7006A659C81597758C4784305F10443F3DC6DA2C3E5BDD69C5656
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F01C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: 4879652ed21e09187649c90db3372a0843ac27ece4ea50845dfd7517ab6f9ddd
                                                                  • Instruction ID: a3f2727a8225cce52aa332fac080a49b8e88e69fc98919c7d6858de85465de56
                                                                  • Opcode Fuzzy Hash: 4879652ed21e09187649c90db3372a0843ac27ece4ea50845dfd7517ab6f9ddd
                                                                  • Instruction Fuzzy Hash: 5DD09E7121011D6B9B00DE99E840C6B33AD9B88710BA0C929F959C7246D634ED5197B9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 409 46b374-46b3a6 410 46b3c3 409->410 411 46b3a8-46b3af 409->411 414 46b3ca-46b402 call 403634 call 403738 call 42dcf8 410->414 412 46b3b1-46b3b8 411->412 413 46b3ba-46b3c1 411->413 412->410 412->413 413->414 421 46b404-46b418 call 403738 call 42dcf8 414->421 422 46b41d-46b446 call 403738 call 42dc1c 414->422 421->422 430 46b456-46b47f call 46b160 422->430 431 46b448-46b451 call 46b044 422->431 435 46b491-46b494 call 403400 430->435 436 46b481-46b48f call 403494 430->436 431->430 439 46b499-46b4e4 call 46b160 call 42c36c call 46b1a8 call 46b160 435->439 436->439 449 46b4e6-46b4f9 call 46b1d0 439->449 450 46b4fa-46b51b call 4540a8 call 46b160 439->450 449->450 457 46b571-46b578 450->457 458 46b51d-46b570 call 46b160 call 4753ec call 46b160 call 4753ec call 46b160 450->458 460 46b57a-46b5b7 call 4753ec call 46b160 call 4753ec call 46b160 457->460 461 46b5b8-46b5bf 457->461 458->457 460->461 463 46b600-46b625 call 40b3ac call 46b160 461->463 464 46b5c1-46b5ff call 46b160 * 3 461->464 482 46b627-46b632 call 477c14 463->482 483 46b634-46b63d call 403494 463->483 464->463 494 46b642-46b80f call 403778 call 46b160 call 477c14 call 46b1a8 call 403494 call 40357c * 2 call 46b160 call 403494 call 40357c * 2 call 46b160 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 call 46b1a8 call 477c14 482->494 483->494 559 46b825-46b833 call 46b1d0 494->559 560 46b811-46b823 call 46b160 494->560 564 46b838 559->564 565 46b839-46b882 call 46b1d0 call 46b204 call 46b160 call 477c14 call 46b268 560->565 564->565 576 46b884-46b8a7 call 46b1d0 * 2 565->576 577 46b8a8-46b8b2 565->577 576->577 579 46b956-46b95d 577->579 580 46b8b8-46b8bf 577->580 583 46b9b7-46b9cd RegCloseKey 579->583 584 46b95f-46b995 call 48fde0 579->584 581 46b923-46b92e 580->581 582 46b8c1-46b8e5 call 4306ac 580->582 589 46b931-46b935 581->589 582->589 595 46b8e7-46b8e8 582->595 584->583 589->579 593 46b937-46b950 call 4306e8 call 46b1d0 589->593 600 46b955 593->600 597 46b8ea-46b910 call 40b3ac call 475060 595->597 604 46b912-46b918 call 4306ac 597->604 605 46b91d-46b91f 597->605 600->579 604->605 605->597 607 46b921 605->607 607->589
                                                                  APIs
                                                                    • Part of subcall function 0046B160: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,E"G,0049715C,?,0046B477,?,00000000,0046B9CE,?,_is1), ref: 0046B183
                                                                  • RegCloseKey.ADVAPI32(?,0046B9D5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046BA20,?,?,00000001,0049715C), ref: 0046B9C8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseValue
                                                                  • String ID: " /SILENT$5.3.8 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                  • API String ID: 3132538880-149600739
                                                                  • Opcode ID: 7a485ba5c120d5bf4778917535b31d15dd35e2de5d88d4153f3f53de005cd791
                                                                  • Instruction ID: 4f67baa3a2fd884d9b4d1cf0cacc8b2d5039cb129539253d0906c5133a2846cc
                                                                  • Opcode Fuzzy Hash: 7a485ba5c120d5bf4778917535b31d15dd35e2de5d88d4153f3f53de005cd791
                                                                  • Instruction Fuzzy Hash: 02122234A001089FDB04DB55D895ADE73F5EB49304F60857BE801AB365EB78BE81CB9D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1000 48d920-48d954 call 403684 1003 48d96a-48d977 call 403684 1000->1003 1004 48d956-48d965 call 446adc Sleep 1000->1004 1010 48d979-48d9a1 call 446b38 call 403738 FindWindowA call 446db8 1003->1010 1011 48d9a6-48d9b3 call 403684 1003->1011 1009 48ddfa-48de14 call 403420 1004->1009 1010->1009 1018 48d9e2-48d9ef call 403684 1011->1018 1019 48d9b5-48d9d8 call 446b38 call 403738 FindWindowA call 446db8 1011->1019 1028 48da38-48da45 call 403684 1018->1028 1029 48d9f1-48da33 call 446adc * 4 SendMessageA call 446db8 1018->1029 1037 48d9dd 1019->1037 1038 48da94-48daa1 call 403684 1028->1038 1039 48da47-48da8f call 446adc * 4 PostMessageA call 446c10 1028->1039 1029->1009 1037->1009 1048 48daf0-48dafd call 403684 1038->1048 1049 48daa3-48daeb call 446adc * 4 SendNotifyMessageA call 446c10 1038->1049 1039->1009 1060 48db2a-48db37 call 403684 1048->1060 1061 48daff-48db25 call 446b38 call 403738 RegisterClipboardFormatA call 446db8 1048->1061 1049->1009 1076 48db78-48db85 call 403684 1060->1076 1077 48db39-48db73 call 446adc * 3 SendMessageA call 446db8 1060->1077 1061->1009 1089 48dbcc-48dbd9 call 403684 1076->1089 1090 48db87-48dbc7 call 446adc * 3 PostMessageA call 446c10 1076->1090 1077->1009 1100 48dbdb-48dc1b call 446adc * 3 SendNotifyMessageA call 446c10 1089->1100 1101 48dc20-48dc2d call 403684 1089->1101 1090->1009 1100->1009 1112 48dc2f-48dc4d call 446b38 call 42e1b4 1101->1112 1113 48dc82-48dc8f call 403684 1101->1113 1132 48dc5f-48dc6d GetLastError call 446db8 1112->1132 1133 48dc4f-48dc5d call 446db8 1112->1133 1123 48dd09-48dd16 call 403684 1113->1123 1124 48dc91-48dcbd call 446b38 call 403738 call 446adc GetProcAddress 1113->1124 1138 48dd18-48dd39 call 446adc FreeLibrary call 446c10 1123->1138 1139 48dd3e-48dd4b call 403684 1123->1139 1157 48dcf9-48dd04 call 446c10 1124->1157 1158 48dcbf-48dcf4 call 446adc * 2 call 446db8 call 446c10 1124->1158 1145 48dc72-48dc7d call 446db8 1132->1145 1133->1145 1138->1009 1150 48dd4d-48dd6b call 446b38 call 403738 CreateMutexA 1139->1150 1151 48dd70-48dd7d call 403684 1139->1151 1145->1009 1150->1009 1166 48dd7f-48ddb1 call 487c0c call 403574 call 403738 OemToCharBuffA call 487c24 1151->1166 1167 48ddb3-48ddc0 call 403684 1151->1167 1157->1009 1158->1009 1166->1009 1176 48ddc2-48ddf4 call 487c0c call 403574 call 403738 CharToOemBuffA call 487c24 1167->1176 1177 48ddf6 1167->1177 1176->1009 1177->1009
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,00000000,0048DE15,?,?,?,?,00000000,00000000,00000000), ref: 0048D960
                                                                  • FindWindowA.USER32(00000000,00000000), ref: 0048D991
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FindSleepWindow
                                                                  • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                  • API String ID: 3078808852-3310373309
                                                                  • Opcode ID: 17dee4f659c4668a3db073dcf69d13a9f8100a4d9405007261e365ad52f75ee5
                                                                  • Instruction ID: c34dba77050094b4b62c581b6a1f7b1cd51bfa32b1ed48732df69847b59072e1
                                                                  • Opcode Fuzzy Hash: 17dee4f659c4668a3db073dcf69d13a9f8100a4d9405007261e365ad52f75ee5
                                                                  • Instruction Fuzzy Hash: EDC15BA0F006102BD714BA3E8C4251F569ADF9A704B61D93FB446EB7CACE7DDC06435A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1511 47ea70-47ea95 GetModuleHandleA GetProcAddress 1512 47ea97-47eaad GetNativeSystemInfo GetProcAddress 1511->1512 1513 47eafc-47eb01 GetSystemInfo 1511->1513 1514 47eb06-47eb0f 1512->1514 1515 47eaaf-47eaba GetCurrentProcess 1512->1515 1513->1514 1516 47eb11-47eb15 1514->1516 1517 47eb1f-47eb26 1514->1517 1515->1514 1524 47eabc-47eac0 1515->1524 1518 47eb17-47eb1b 1516->1518 1519 47eb28-47eb2f 1516->1519 1520 47eb41-47eb46 1517->1520 1522 47eb31-47eb38 1518->1522 1523 47eb1d-47eb3a 1518->1523 1519->1520 1522->1520 1523->1520 1524->1514 1526 47eac2-47eac9 call 451444 1524->1526 1526->1514 1529 47eacb-47ead8 GetProcAddress 1526->1529 1529->1514 1530 47eada-47eaf1 GetModuleHandleA GetProcAddress 1529->1530 1530->1514 1531 47eaf3-47eafa 1530->1531 1531->1514
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0047EA81
                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0047EA8E
                                                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047EA9C
                                                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0047EAA4
                                                                  • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0047EAB0
                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0047EAD1
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 0047EAE4
                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0047EAEA
                                                                  • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0047EB01
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                  • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                  • API String ID: 2230631259-2623177817
                                                                  • Opcode ID: 0eb523028f8eb48073f20c6382e42c0c71a8b93fd368977a9a336fec99243c2f
                                                                  • Instruction ID: 95e86ad0917b0b419bfb9b08de75770eb1e9231142796ede94104b66a6cc5561
                                                                  • Opcode Fuzzy Hash: 0eb523028f8eb48073f20c6382e42c0c71a8b93fd368977a9a336fec99243c2f
                                                                  • Instruction Fuzzy Hash: 3C11E14060430194D620F3778C4AFEB1D488B4D328F188BFB684F6A293D67CF845C6AE

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1532 465710-465748 call 477c14 1535 46574e-46575e call 474860 1532->1535 1536 46592a-465944 call 403420 1532->1536 1541 465763-4657a8 call 40785c call 403738 call 42dc54 1535->1541 1547 4657ad-4657af 1541->1547 1548 4657b5-4657ca 1547->1548 1549 465920-465924 1547->1549 1550 4657df-4657e6 1548->1550 1551 4657cc-4657da call 42db84 1548->1551 1549->1536 1549->1541 1553 465813-46581a 1550->1553 1554 4657e8-46580a call 42db84 call 42db9c 1550->1554 1551->1550 1555 465873-46587a 1553->1555 1556 46581c-465841 call 42db84 * 2 1553->1556 1554->1553 1571 46580c 1554->1571 1560 4658c0-4658c7 1555->1560 1561 46587c-46588e call 42db84 1555->1561 1578 465843-46584c call 4754e0 1556->1578 1579 465851-465863 call 42db84 1556->1579 1564 465902-465918 RegCloseKey 1560->1564 1565 4658c9-4658fd call 42db84 * 3 1560->1565 1572 465890-465899 call 4754e0 1561->1572 1573 46589e-4658b0 call 42db84 1561->1573 1565->1564 1571->1553 1572->1573 1573->1560 1585 4658b2-4658bb call 4754e0 1573->1585 1578->1579 1579->1555 1589 465865-46586e call 4754e0 1579->1589 1585->1560 1589->1555
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegCloseKey.ADVAPI32(?,0046592A,?,?,00000001,00000000,00000000,00465945,?,00000000,00000000,?), ref: 00465913
                                                                  Strings
                                                                  • Inno Setup: No Icons, xrefs: 004657FB
                                                                  • Inno Setup: Selected Components, xrefs: 00465832
                                                                  • Inno Setup: App Path, xrefs: 004657D2
                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0046576F
                                                                  • Inno Setup: Deselected Components, xrefs: 00465854
                                                                  • Inno Setup: Deselected Tasks, xrefs: 004658A1
                                                                  • Inno Setup: Setup Type, xrefs: 00465822
                                                                  • Inno Setup: Icon Group, xrefs: 004657EE
                                                                  • Inno Setup: Selected Tasks, xrefs: 0046587F
                                                                  • Inno Setup: User Info: Organization, xrefs: 004658E2
                                                                  • Inno Setup: User Info: Name, xrefs: 004658CF
                                                                  • Inno Setup: User Info: Serial, xrefs: 004658F5
                                                                  • %s\%s_is1, xrefs: 0046578D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                  • API String ID: 47109696-1093091907
                                                                  • Opcode ID: ff4b5f5b09694f8e60ad05c6b2a5654adfdfaa362337e0b0ea75e2df74eca920
                                                                  • Instruction ID: f6af0d79caed7f17680e53a9f826e3af7b9dd2fcf11dd4bdaad6959135d6016d
                                                                  • Opcode Fuzzy Hash: ff4b5f5b09694f8e60ad05c6b2a5654adfdfaa362337e0b0ea75e2df74eca920
                                                                  • Instruction Fuzzy Hash: 1C51C470A00B08DBCB11EBA5D9527DEBBF5EF44314F5084BAE844A7391E738AE05CB59

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1750 4237e4-4237ee 1751 423917-42391b 1750->1751 1752 4237f4-423816 call 41f334 GetClassInfoA 1750->1752 1755 423847-423850 GetSystemMetrics 1752->1755 1756 423818-42382f RegisterClassA 1752->1756 1757 423852 1755->1757 1758 423855-42385f GetSystemMetrics 1755->1758 1756->1755 1759 423831-423842 call 408c24 call 40311c 1756->1759 1757->1758 1760 423861 1758->1760 1761 423864-4238c0 call 403738 call 406300 call 403400 call 4235bc SetWindowLongA 1758->1761 1759->1755 1760->1761 1773 4238c2-4238d5 call 4240e8 SendMessageA 1761->1773 1774 4238da-423908 GetSystemMenu DeleteMenu * 2 1761->1774 1773->1774 1774->1751 1775 42390a-423912 DeleteMenu 1774->1775 1775->1751
                                                                  APIs
                                                                    • Part of subcall function 0041F334: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                                                  • GetClassInfoA.USER32(00400000,004235EC), ref: 0042380F
                                                                  • RegisterClassA.USER32(00494630), ref: 00423827
                                                                  • GetSystemMetrics.USER32(00000000), ref: 00423849
                                                                  • GetSystemMetrics.USER32(00000001), ref: 00423858
                                                                  • SetWindowLongA.USER32(004105C0,000000FC,004235FC), ref: 004238B4
                                                                  • SendMessageA.USER32(004105C0,00000080,00000001,00000000), ref: 004238D5
                                                                  • GetSystemMenu.USER32(004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238E0
                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238EF
                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 004238FC
                                                                  • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000), ref: 00423912
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                  • String ID: 5B
                                                                  • API String ID: 183575631-3738334870
                                                                  • Opcode ID: e5b5147e0e34996107640ab488c5a955b3283bc40e3e9afea641ea9dff5fb6f0
                                                                  • Instruction ID: 4eea79998965153292ad411f177aff7c9d901da1d54039d3c3496ec011b6d66c
                                                                  • Opcode Fuzzy Hash: e5b5147e0e34996107640ab488c5a955b3283bc40e3e9afea641ea9dff5fb6f0
                                                                  • Instruction Fuzzy Hash: C53161B17402106AEB10AF65EC82F6A36989715709F11017BBA41AF2D7C67DED04876C

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1889 4786b4-47870a call 42c36c call 4035c0 call 478330 call 451300 1898 478716-478725 call 451300 1889->1898 1899 47870c-478711 call 45206c 1889->1899 1903 478727-47872d 1898->1903 1904 47873f-478745 1898->1904 1899->1898 1905 47874f-478757 call 403494 1903->1905 1906 47872f-478735 1903->1906 1907 478747-47874d 1904->1907 1908 47875c-478784 call 42e1b4 * 2 1904->1908 1905->1908 1906->1904 1909 478737-47873d 1906->1909 1907->1905 1907->1908 1915 478786-4787a6 call 40785c call 45206c 1908->1915 1916 4787ab-4787c5 GetProcAddress 1908->1916 1909->1904 1909->1905 1915->1916 1918 4787c7-4787cc call 45206c 1916->1918 1919 4787d1-4787ee call 403400 * 2 1916->1919 1918->1919
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(6FB90000,SHGetFolderPathA), ref: 004787B6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll$v*I
                                                                  • API String ID: 190572456-334234438
                                                                  • Opcode ID: be66341a320620e653f6c45c4751f4a3ce6152e8d6361f6d1450bbb32d09e8e0
                                                                  • Instruction ID: 4e79fbc02c44b613b3c49fc4f959da8ecdc300148f1290d7211daae813f9b9ff
                                                                  • Opcode Fuzzy Hash: be66341a320620e653f6c45c4751f4a3ce6152e8d6361f6d1450bbb32d09e8e0
                                                                  • Instruction Fuzzy Hash: 92313030A401099FCB00EB95D9869DEB7B5EB44344FA0847BE504E7751DB38AE05CB6D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1927 42f040-42f04a 1928 42f054-42f091 call 402b30 GetActiveWindow GetFocus call 41ee14 1927->1928 1929 42f04c-42f04f call 402d30 1927->1929 1935 42f0a3-42f0ab 1928->1935 1936 42f093-42f09d RegisterClassA 1928->1936 1929->1928 1937 42f132-42f14e SetFocus call 403400 1935->1937 1938 42f0b1-42f0e2 CreateWindowExA 1935->1938 1936->1935 1938->1937 1939 42f0e4-42f128 call 4241ec call 403738 CreateWindowExA 1938->1939 1939->1937 1946 42f12a-42f12d ShowWindow 1939->1946 1946->1937
                                                                  APIs
                                                                  • GetActiveWindow.USER32 ref: 0042F06F
                                                                  • GetFocus.USER32 ref: 0042F077
                                                                  • RegisterClassA.USER32(004947AC), ref: 0042F098
                                                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F16C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F0D6
                                                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F11C
                                                                  • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F12D
                                                                  • SetFocus.USER32(00000000,00000000,0042F14F,?,?,?,00000001,00000000,?,00456C22,00000000,00496628), ref: 0042F134
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                  • String ID: (fI$TWindowDisabler-Window
                                                                  • API String ID: 3167913817-2792019125
                                                                  • Opcode ID: 78bee34a2912ed172c18dee49d6077e526124c87938d1c18955716d3534fc76b
                                                                  • Instruction ID: 9a16d0d3a508250ca79586c259b8e8ef28b4afb6e22e0edeb3dc58e6f6f15fa9
                                                                  • Opcode Fuzzy Hash: 78bee34a2912ed172c18dee49d6077e526124c87938d1c18955716d3534fc76b
                                                                  • Instruction Fuzzy Hash: 78219571740710BAE210EB61DC02F2A76A4EB05B04FE2413BF604AB2D1D7B96D6486ED

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1947 451f18-451f69 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1948 451f74-451f76 1947->1948 1949 451f6b-451f72 1947->1949 1951 451f7a-451fb0 call 42e1b4 call 42e634 call 403400 1948->1951 1949->1948 1950 451f78 1949->1950 1950->1951
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451FB1,?,?,?,?,00000000,?,00493D84), ref: 00451F38
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451F3E
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451FB1,?,?,?,?,00000000,?,00493D84), ref: 00451F52
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451F58
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                  • API String ID: 1646373207-2130885113
                                                                  • Opcode ID: f7c0bbadbe2ad3badbf53ef5fce9f4d858355e4c5679a6d3426dfe18ab7d658c
                                                                  • Instruction ID: 81d573f55135c680e4a59f3a7192893b7339b29e5684a8e1abbc8a7c2162d48b
                                                                  • Opcode Fuzzy Hash: f7c0bbadbe2ad3badbf53ef5fce9f4d858355e4c5679a6d3426dfe18ab7d658c
                                                                  • Instruction Fuzzy Hash: 7C01A271204340AEDB00AFB2AC43F567A68D755B69FA1443BF800A61E7D7BC6D09CA2D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2587 46e548-46e5b7 call 403634 call 451788 2592 46e720-46e727 2587->2592 2593 46e5bd-46e5c8 2587->2593 2595 46e842-46e846 2592->2595 2596 46e72d-46e774 call 403494 call 40357c * 2 call 451788 2592->2596 2594 46e5cb-46e5d3 2593->2594 2599 46e6ea-46e6fc FindNextFileA 2594->2599 2600 46e5d9-46e5dd 2594->2600 2597 46e8b7-46e8e6 call 46a808 call 403420 * 2 2595->2597 2598 46e848-46e84f 2595->2598 2596->2595 2637 46e77a-46e785 2596->2637 2598->2597 2603 46e851-46e855 2598->2603 2599->2594 2604 46e702-46e718 FindClose 2599->2604 2605 46e5df-46e5e1 2600->2605 2606 46e5fc-46e602 call 403494 2600->2606 2603->2597 2609 46e857-46e86c call 477c14 2603->2609 2605->2599 2610 46e5e7-46e5fa call 40355c 2605->2610 2617 46e607-46e636 call 403634 call 477c14 2606->2617 2624 46e86e-46e879 call 40357c 2609->2624 2625 46e87b-46e895 call 42c830 call 4035c0 2609->2625 2610->2617 2638 46e650-46e654 2617->2638 2639 46e638-46e64e call 403634 2617->2639 2640 46e89a-46e8b3 call 46bdb4 2624->2640 2625->2640 2642 46e788-46e795 call 478e64 2637->2642 2644 46e656-46e689 call 42c830 call 42c808 call 403634 2638->2644 2645 46e68e-46e6ad call 43066c 2638->2645 2639->2645 2640->2597 2655 46e797-46e809 call 403494 call 40355c call 40357c * 2 call 46e548 2642->2655 2656 46e80c-46e81e FindNextFileA 2642->2656 2644->2645 2658 46e6af-46e6ba 2645->2658 2659 46e6bd-46e6d9 call 46cac4 2645->2659 2655->2656 2656->2642 2660 46e824-46e83a FindClose 2656->2660 2658->2659 2664 46e6de-46e6e5 call 430694 2659->2664 2664->2599
                                                                  APIs
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0046E719,?,00000000,?,00000001,00000000,0046E8E7,?,00000000,?,00000000,?,0046EAA2), ref: 0046E6F5
                                                                  • FindClose.KERNEL32(000000FF,0046E720,0046E719,?,00000000,?,00000001,00000000,0046E8E7,?,00000000,?,00000000,?,0046EAA2,?), ref: 0046E713
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0046E83B,?,00000000,?,00000001,00000000,0046E8E7,?,00000000,?,00000000,?,0046EAA2), ref: 0046E817
                                                                  • FindClose.KERNEL32(000000FF,0046E842,0046E83B,?,00000000,?,00000001,00000000,0046E8E7,?,00000000,?,00000000,?,0046EAA2,?), ref: 0046E835
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileNext
                                                                  • String ID: IF$sF$sF
                                                                  • API String ID: 2066263336-2713198477
                                                                  • Opcode ID: bdc8a216ea32f752e32f784e6c7f2b8329993d9c9193bfaa99fe67f2bf531f1b
                                                                  • Instruction ID: 1956227773dc9a3207c48d3214a08c53dea5f6dc60d2d07dcea37f7eb7c9428e
                                                                  • Opcode Fuzzy Hash: bdc8a216ea32f752e32f784e6c7f2b8329993d9c9193bfaa99fe67f2bf531f1b
                                                                  • Instruction Fuzzy Hash: 51B14E7490425D9FCF11DFA6C841ADEBBF9FF48304F5081AAE808A3291D7399A46CF65

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004784FB,?,?,00000000,00496628,00000000,00000000,?,00493709,00000000,004938B2,?,00000000), ref: 0047841B
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,004784FB,?,?,00000000,00496628,00000000,00000000,?,00493709,00000000,004938B2,?,00000000), ref: 00478424
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                                  • API String ID: 1375471231-1421604804
                                                                  • Opcode ID: 2f58f4a6335a0c17868105c26391f8df94f1bb5d1e35185059783d74c9aaef99
                                                                  • Instruction ID: 72476a99e2161b40fb6ad914ec12a5a984e93f0563ae6b63b3bf3d0ef78a2194
                                                                  • Opcode Fuzzy Hash: 2f58f4a6335a0c17868105c26391f8df94f1bb5d1e35185059783d74c9aaef99
                                                                  • Instruction Fuzzy Hash: 43414874A102099BCB01EF95C886ADEB7B5FF44708F50857FE81477392DB789E058B58

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430428
                                                                  • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430437
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00430451
                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00430472
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                  • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                  • API String ID: 4130936913-2943970505
                                                                  • Opcode ID: 9d5ad1c4b2b611221956b3f2440e411d5c15eefed9c5540ccecf6c4608072bdc
                                                                  • Instruction ID: fb22d118f79b5a846d13fc81b00b6fe070184277f249aa4ff93a19b6649950be
                                                                  • Opcode Fuzzy Hash: 9d5ad1c4b2b611221956b3f2440e411d5c15eefed9c5540ccecf6c4608072bdc
                                                                  • Instruction Fuzzy Hash: 93F082704483408ED700EF65D802B197AE0EBA8318F014A7FB998A62E1D73A9601CB2F
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00453D40,00453D40,00000031,00453D40,00000000), ref: 00453CCC
                                                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00453D40,00453D40,00000031,00453D40), ref: 00453CD9
                                                                    • Part of subcall function 00453A90: WaitForInputIdle.USER32(00000001,00000032), ref: 00453ABC
                                                                    • Part of subcall function 00453A90: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00453ADE
                                                                    • Part of subcall function 00453A90: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00453AED
                                                                    • Part of subcall function 00453A90: CloseHandle.KERNEL32(00000001,00453B1A,00453B13,?,00000031,00000080,00000000,?,?,00453E6B,00000080,0000003C,00000000,00453E81), ref: 00453B0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                  • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                  • API String ID: 854858120-615399546
                                                                  • Opcode ID: 37fea778c17c5cf0ce3a165c14437d8329c15c361137d79e19ae729541f2c62f
                                                                  • Instruction ID: 9001de2bd25fd05f465b63e3762ff7c21a50a5b55c7eedbacbe6793133894bc5
                                                                  • Opcode Fuzzy Hash: 37fea778c17c5cf0ce3a165c14437d8329c15c361137d79e19ae729541f2c62f
                                                                  • Instruction Fuzzy Hash: 8251577460034DABCB01EFA5C841BDDBBB9AF44746F50443BB804B7283D7789B098B59
                                                                  APIs
                                                                  • LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                                                  • OemToCharA.USER32(?,?), ref: 004236CC
                                                                  • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Char$FileIconLoadLowerModuleName
                                                                  • String ID: 2$MAINICON
                                                                  • API String ID: 3935243913-3181700818
                                                                  • Opcode ID: b8e4f3de8f6e7962c855b1bbff0a6ea575b20ad32e9f870a500b7efad52da8d9
                                                                  • Instruction ID: d7f5d394b2ec06d520cb0a4b60bf3498b9d8aa77ab50e693133e7ce4a757069a
                                                                  • Opcode Fuzzy Hash: b8e4f3de8f6e7962c855b1bbff0a6ea575b20ad32e9f870a500b7efad52da8d9
                                                                  • Instruction Fuzzy Hash: DC31A2B0A042559ADF10EF29D8C57C67BE8AF14308F4441BAE844DB393D7BED988CB65
                                                                  APIs
                                                                  • GetCurrentProcessId.KERNEL32(00000000), ref: 00418EAD
                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418ECE
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00418EE9
                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F0A
                                                                    • Part of subcall function 00423038: 73A1A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                                                    • Part of subcall function 00423038: EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                                                    • Part of subcall function 00423038: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                                                    • Part of subcall function 00423038: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                                                    • Part of subcall function 004235FC: LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                                                    • Part of subcall function 004235FC: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                                                    • Part of subcall function 004235FC: OemToCharA.USER32(?,?), ref: 004236CC
                                                                    • Part of subcall function 004235FC: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                                                    • Part of subcall function 0041F088: GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                                                    • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                                                    • Part of subcall function 0041F088: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                                                    • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F0FC
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F125
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F13A
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F14F
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F164
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F179
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F18E
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1A3
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1B8
                                                                    • Part of subcall function 0041F088: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1CD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                                  • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                  • API String ID: 3864787166-2767913252
                                                                  • Opcode ID: f0445bf7bf10bd264bb05b6e6528e102989456be178d4747d5ca1c008ae033b0
                                                                  • Instruction ID: b4a2cca2d4326696562d23f03e9beb5cdbbc64ba536a620a3ee3ba5bc66bdef7
                                                                  • Opcode Fuzzy Hash: f0445bf7bf10bd264bb05b6e6528e102989456be178d4747d5ca1c008ae033b0
                                                                  • Instruction Fuzzy Hash: 9A1160B06142409AC700FF2A984274A7AE0EB64309F41843FF448DB2A1DB3D9945CB5E
                                                                  APIs
                                                                  • SetWindowLongA.USER32(?,000000FC,?), ref: 004135D4
                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 004135DF
                                                                  • GetWindowLongA.USER32(?,000000F4), ref: 004135F1
                                                                  • SetWindowLongA.USER32(?,000000F4,?), ref: 00413604
                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 0041361B
                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 00413632
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: LongWindow$Prop
                                                                  • String ID:
                                                                  • API String ID: 3887896539-0
                                                                  • Opcode ID: 86a15e674b3ea48860a72e4751bd866d9c55aec508b8b4782c27e449c12c4e66
                                                                  • Instruction ID: 44bb5ba5a57c54889193f85f1a8a28b74f903b4ef320443ee5f093ebf11223bc
                                                                  • Opcode Fuzzy Hash: 86a15e674b3ea48860a72e4751bd866d9c55aec508b8b4782c27e449c12c4e66
                                                                  • Instruction Fuzzy Hash: B611C975500244BFDB00DF99DC85E9A3BE8BB19364F114266B928DB2A1D738D9908B68
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045437B,?,00000000,004543BB), ref: 004542C1
                                                                  Strings
                                                                  • PendingFileRenameOperations, xrefs: 00454260
                                                                  • WININIT.INI, xrefs: 004542F0
                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454244
                                                                  • PendingFileRenameOperations2, xrefs: 00454290
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                  • API String ID: 47109696-2199428270
                                                                  • Opcode ID: 7e363e07a95bbc210df0b9a163edd5247e701fbed2fca27e57f0868dd26fa95f
                                                                  • Instruction ID: 5dc9d3524cf6731dc98fa38ecc16b22c38dee717373b696336ba63adcf91df8c
                                                                  • Opcode Fuzzy Hash: 7e363e07a95bbc210df0b9a163edd5247e701fbed2fca27e57f0868dd26fa95f
                                                                  • Instruction Fuzzy Hash: 95519870F042089FDB14EF61DC51ADEB7B9EF84308F508577EC04AB692DB789A45CA58
                                                                  APIs
                                                                  • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00463C0D
                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463C33
                                                                    • Part of subcall function 00463AB0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00463B48
                                                                    • Part of subcall function 00463AB0: DestroyCursor.USER32(00000000), ref: 00463B5E
                                                                  • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00463C8F
                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00463CB5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Icon$ExtractFileInfo$CursorDestroyDraw
                                                                  • String ID: c:\directory
                                                                  • API String ID: 2926980410-3984940477
                                                                  • Opcode ID: 7d4ca7aa11da9cee7d20320182c7d975b40f740104ebbe357f0bb62694f5d5d3
                                                                  • Instruction ID: 39c8bb8e711a6e2bee2e0ffe2103d0816364d6fdfbe2631b8887c4dec0a3813b
                                                                  • Opcode Fuzzy Hash: 7d4ca7aa11da9cee7d20320182c7d975b40f740104ebbe357f0bb62694f5d5d3
                                                                  • Instruction Fuzzy Hash: 76415C71600248AFD711DF95DD8AFDABBE8EB48701F2141A7F904A7381D678AE808A59
                                                                  APIs
                                                                  • RegDeleteKeyA.ADVAPI32(00000000,?), ref: 0042DC88
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DE0B,00000000,0042DE23,?,?,?,?,00000006,?,00000000,004929D3), ref: 0042DCA3
                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DCA9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressDeleteHandleModuleProc
                                                                  • String ID: RegDeleteKeyExA$advapi32.dll
                                                                  • API String ID: 588496660-1846899949
                                                                  • Opcode ID: 08ebd3d1eb50582bbac49112764f79060e30de94754e30096b3cffddb85c4ff8
                                                                  • Instruction ID: 479eeeb2458f1cbf9b477f45b3eef1c6296245770f751ec8fb172f928072974a
                                                                  • Opcode Fuzzy Hash: 08ebd3d1eb50582bbac49112764f79060e30de94754e30096b3cffddb85c4ff8
                                                                  • Instruction Fuzzy Hash: 57E06DF0B45230AAD620676B7D4AFA327299B64725F54403BB105A619182FD4C40DE5C
                                                                  APIs
                                                                  • SetActiveWindow.USER32(?,?,00000000,0047E4AD,?,?,00000001,?), ref: 0047E2A9
                                                                  • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0047E31E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ActiveChangeNotifyWindow
                                                                  • String ID: $Need to restart Windows? %s
                                                                  • API String ID: 1160245247-4200181552
                                                                  • Opcode ID: bc8647be45d636d4caa72dc8c99c555568a6343f1155ea93f80916f10e779efa
                                                                  • Instruction ID: 2467752bb5085d5daeefdf20e1d782b0b59583cea52edf66936648f1f28d7b81
                                                                  • Opcode Fuzzy Hash: bc8647be45d636d4caa72dc8c99c555568a6343f1155ea93f80916f10e779efa
                                                                  • Instruction Fuzzy Hash: 5891A2306142448FCB14EB6AD886B9E77F4AF49308F5081BBF8049B366DB38AD05DB5D
                                                                  APIs
                                                                    • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                                  • GetLastError.KERNEL32(00000000,0046BFB1,?,?,00000001,0049715C), ref: 0046BE8E
                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046BF08
                                                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046BF2D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                  • String ID: Creating directory: %s
                                                                  • API String ID: 2451617938-483064649
                                                                  • Opcode ID: 9c5beb8dbacc51cfb43aff7c57801c44992aa4e0eaeaac134bdce2741092b2da
                                                                  • Instruction ID: 74c8ceada43d646c2a190f3e42c496f454ebfbbd9463b199f5a7343b775fa980
                                                                  • Opcode Fuzzy Hash: 9c5beb8dbacc51cfb43aff7c57801c44992aa4e0eaeaac134bdce2741092b2da
                                                                  • Instruction Fuzzy Hash: 80512E74E00258ABDB05DBA5C882ADEB7F5EF48304F5081AAEC50F7392D7785E44CB99
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00453996
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00453A5C), ref: 00453A00
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressByteCharMultiProcWide
                                                                  • String ID: SfcIsFileProtected$sfc.dll
                                                                  • API String ID: 2508298434-591603554
                                                                  • Opcode ID: ee3b5eb8bf44db3d7e65b105dd2a60489ce6968767a25fd9f830f4f92e2144a6
                                                                  • Instruction ID: 8b06ad9540cfbcb1f23f323bba9f9d3363974d9ca222cafbeef5aad8f4a13a74
                                                                  • Opcode Fuzzy Hash: ee3b5eb8bf44db3d7e65b105dd2a60489ce6968767a25fd9f830f4f92e2144a6
                                                                  • Instruction Fuzzy Hash: E6419770A043189FEB20DF65DC85B9E77B8AB04346F5041BBB948A7293D7789F48CA5C
                                                                  APIs
                                                                  • 74D41520.VERSION(00000000,?,?,?,v*I), ref: 00451258
                                                                  • 74D41500.VERSION(00000000,?,00000000,?,00000000,004512D3,?,00000000,?,?,?,v*I), ref: 00451285
                                                                  • 74D41540.VERSION(?,004512FC,?,?,00000000,?,00000000,?,00000000,004512D3,?,00000000,?,?,?,v*I), ref: 0045129F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: D41500D41520D41540
                                                                  • String ID: v*I
                                                                  • API String ID: 2153611984-3478583532
                                                                  • Opcode ID: 5f3ada57c286474a97ac07cbb667822a69c95a9fc17a97ff7f24c5c252d56a5c
                                                                  • Instruction ID: a0bbc775c0b373febb01ad34cb615bfdec89f2f34d6b2a70139f95cf6887392c
                                                                  • Opcode Fuzzy Hash: 5f3ada57c286474a97ac07cbb667822a69c95a9fc17a97ff7f24c5c252d56a5c
                                                                  • Instruction Fuzzy Hash: 9621B035A00248AFCB01DAE9C841EAFB7FCEB49300F5540BAFC00E3292D6799E058769
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,?,?,@fE,00000000,(fE,?,?,?,00000000,0045158A,?,?,?,00000001), ref: 00451564
                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,@fE,00000000,(fE,?,?,?,00000000,0045158A,?,?,?,00000001), ref: 0045156C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateErrorLastProcess
                                                                  • String ID: (fE$@fE
                                                                  • API String ID: 2919029540-1163616108
                                                                  • Opcode ID: ca15914b2a447b6ed57ba7f8671746eeaae98429ba3951c3e533be59ef09646a
                                                                  • Instruction ID: 1dfc3ee5c933d05d38f7810f40d6f084230013f91e4898be396792d47734d055
                                                                  • Opcode Fuzzy Hash: ca15914b2a447b6ed57ba7f8671746eeaae98429ba3951c3e533be59ef09646a
                                                                  • Instruction Fuzzy Hash: 15112776600208BF8B40DEA9DC81EEBB7ECEB8D310B514566FD18D3251E638AD148B64
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegCloseKey.ADVAPI32(?,00454587,?,00000001,00000000), ref: 0045457A
                                                                  Strings
                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454528
                                                                  • PendingFileRenameOperations, xrefs: 0045454C
                                                                  • PendingFileRenameOperations2, xrefs: 0045455B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                  • API String ID: 47109696-2115312317
                                                                  • Opcode ID: 4458fbd090e8167ec05650a9259938c74a69315818b20a83d3b06d959b890f21
                                                                  • Instruction ID: f0aed36f3011d3d24710920dd404f8fbfd5a00043595d59dc54131e664a66d34
                                                                  • Opcode Fuzzy Hash: 4458fbd090e8167ec05650a9259938c74a69315818b20a83d3b06d959b890f21
                                                                  • Instruction Fuzzy Hash: C8F0C2312042087FDB0496A2AC02A5A73ACD784729F708866FA04AA582FE78ED44951C
                                                                  APIs
                                                                  • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047B339,?,00000000,00000000,?,?,0047C4CC,?,?,00000000), ref: 0047B1E6
                                                                  • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047B339,?,00000000,00000000,?,?,0047C4CC,?,?), ref: 0047B1F3
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0047B30C,?,?,?,?,00000000,0047B339,?,00000000,00000000,?,?,0047C4CC), ref: 0047B2E8
                                                                  • FindClose.KERNEL32(000000FF,0047B313,0047B30C,?,?,?,?,00000000,0047B339,?,00000000,00000000,?,?,0047C4CC,?), ref: 0047B306
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileNext
                                                                  • String ID:
                                                                  • API String ID: 2066263336-0
                                                                  • Opcode ID: 4fda774ea91b862154f6ede3dc81b875fa2445d19b91cc05215c53bc7daf64b8
                                                                  • Instruction ID: 52a3f57b26ed505bd5ccb9f35be9564adbeac1ada31637d16635b0add77eef89
                                                                  • Opcode Fuzzy Hash: 4fda774ea91b862154f6ede3dc81b875fa2445d19b91cc05215c53bc7daf64b8
                                                                  • Instruction Fuzzy Hash: 9B514E70A00648AFCB11DF65CC45ADEB7B8EB88315F5085AAA808E7351D7389F858F94
                                                                  APIs
                                                                  • GetMenu.USER32(00000000), ref: 004212D1
                                                                  • SetMenu.USER32(00000000,00000000), ref: 004212EE
                                                                  • SetMenu.USER32(00000000,00000000), ref: 00421323
                                                                  • SetMenu.USER32(00000000,00000000), ref: 0042133F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Menu
                                                                  • String ID:
                                                                  • API String ID: 3711407533-0
                                                                  • Opcode ID: 828adb1f4503573b8b19ec7e50c880e5d7ba93b5c851f867c46ca8f401a21855
                                                                  • Instruction ID: 658f50d7c39b10a4f0c402205ec9e9078e39c2738942e4c3e39302bb3a71e335
                                                                  • Opcode Fuzzy Hash: 828adb1f4503573b8b19ec7e50c880e5d7ba93b5c851f867c46ca8f401a21855
                                                                  • Instruction Fuzzy Hash: 7641BE307002645BEB20AA7AA88579B37914F65308F4845BFFC44EF3A7CA7DCC4582AD
                                                                  APIs
                                                                  • SendMessageA.USER32(?,?,?,?), ref: 00416AF4
                                                                  • SetTextColor.GDI32(?,00000000), ref: 00416B0E
                                                                  • SetBkColor.GDI32(?,00000000), ref: 00416B28
                                                                  • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416B50
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Color$CallMessageProcSendTextWindow
                                                                  • String ID:
                                                                  • API String ID: 601730667-0
                                                                  • Opcode ID: 1d3cbda9518b2ce12e9cd07cc94b211126e19477f7e649d954dcb8d793c07e3f
                                                                  • Instruction ID: c000e8b01db0500dd6874d208778bcf8efa3d9016d5589f965051e8255cd057a
                                                                  • Opcode Fuzzy Hash: 1d3cbda9518b2ce12e9cd07cc94b211126e19477f7e649d954dcb8d793c07e3f
                                                                  • Instruction Fuzzy Hash: 74115EB2604604AFC710EE6ECC84E8777ECEF49710B15886BB55ADB652C638FC418B79
                                                                  APIs
                                                                  • EnumWindows.USER32(0042398C), ref: 00423A18
                                                                  • GetWindow.USER32(?,00000003), ref: 00423A2D
                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                                                  • SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EnumLongWindows
                                                                  • String ID:
                                                                  • API String ID: 4191631535-0
                                                                  • Opcode ID: 3f479a3e6eaf30b3cab108cb0ec1f6e4b33bd75e50ec1f2bc5912fb713e5924c
                                                                  • Instruction ID: 335c349655b4e4ce664b27c97d7ab575fba50449cb033fde685ace27ceb71c75
                                                                  • Opcode Fuzzy Hash: 3f479a3e6eaf30b3cab108cb0ec1f6e4b33bd75e50ec1f2bc5912fb713e5924c
                                                                  • Instruction Fuzzy Hash: 91115A70700610ABDB10EF68DC85F5A77E8EB08725F11026AF9A4AB2E2C37CDC40CB58
                                                                  APIs
                                                                  • 73A1A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                                                  • EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                                                  • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                                                  • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A24620A480A570EnumFonts
                                                                  • String ID:
                                                                  • API String ID: 2630238358-0
                                                                  • Opcode ID: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                                                  • Instruction ID: 4d68480f6d607538855b0f171b38ffa839f5ce6e0578d669e72114bdc8101102
                                                                  • Opcode Fuzzy Hash: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                                                  • Instruction Fuzzy Hash: 0601D2616053002AE700BF6A5C82B9B37649F00709F40027BF804AF2C7D6BE9805476E
                                                                  APIs
                                                                    • Part of subcall function 00450194: SetEndOfFile.KERNEL32(?,?,0045AB76,00000000,0045AD01,?,00000000,00000002,00000002), ref: 0045019B
                                                                  • FlushFileBuffers.KERNEL32(?), ref: 0045ACCD
                                                                  Strings
                                                                  • NumRecs range exceeded, xrefs: 0045ABCA
                                                                  • EndOffset range exceeded, xrefs: 0045AC01
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: File$BuffersFlush
                                                                  • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                  • API String ID: 3593489403-659731555
                                                                  • Opcode ID: a9cf851f2eaf95137e3288fbc8d387236cb4e639cfd326536c80b23121b82141
                                                                  • Instruction ID: c6fdafcf5e6ec5fbe1ee4fc1bc2965fc1f3208bb88431c07f9f54703bf840710
                                                                  • Opcode Fuzzy Hash: a9cf851f2eaf95137e3288fbc8d387236cb4e639cfd326536c80b23121b82141
                                                                  • Instruction Fuzzy Hash: D461C534A002948FDB21DF25C880AD9B7B1EF49305F0085EAED8D9B352D6B4AEC8CF55
                                                                  APIs
                                                                    • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00493D3E), ref: 0040334B
                                                                    • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00493D3E), ref: 00403356
                                                                    • Part of subcall function 00409AE8: 6F551CD0.COMCTL32(00493D4D), ref: 00409AE8
                                                                    • Part of subcall function 004108C4: GetCurrentThreadId.KERNEL32 ref: 00410912
                                                                    • Part of subcall function 00418FB0: GetVersion.KERNEL32(00493D61), ref: 00418FB0
                                                                    • Part of subcall function 0044F284: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00493D75), ref: 0044F2BF
                                                                    • Part of subcall function 0044F284: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F2C5
                                                                    • Part of subcall function 0044F668: GetVersionExA.KERNEL32(00496788,00493D7A), ref: 0044F677
                                                                    • Part of subcall function 00451F18: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451FB1,?,?,?,?,00000000,?,00493D84), ref: 00451F38
                                                                    • Part of subcall function 00451F18: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451F3E
                                                                    • Part of subcall function 00451F18: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00451FB1,?,?,?,?,00000000,?,00493D84), ref: 00451F52
                                                                    • Part of subcall function 00451F18: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00451F58
                                                                    • Part of subcall function 00461004: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00493D98), ref: 00461013
                                                                    • Part of subcall function 00461004: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00461019
                                                                    • Part of subcall function 00468FF4: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 00469009
                                                                    • Part of subcall function 0047467C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00493DA2), ref: 00474682
                                                                    • Part of subcall function 0047467C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047468F
                                                                    • Part of subcall function 0047467C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047469F
                                                                    • Part of subcall function 00490D20: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00490D39
                                                                  • SetErrorMode.KERNEL32(00000001,00000000,00493DEA), ref: 00493DBC
                                                                    • Part of subcall function 00493B38: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00493DC6,00000001,00000000,00493DEA), ref: 00493B42
                                                                    • Part of subcall function 00493B38: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00493B48
                                                                    • Part of subcall function 00424444: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424463
                                                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                  • ShowWindow.USER32(?,00000005,00000000,00493DEA), ref: 00493E2D
                                                                    • Part of subcall function 0047D8B0: SetActiveWindow.USER32(?), ref: 0047D954
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModeRegisterSendShowTextThread
                                                                  • String ID: Setup
                                                                  • API String ID: 3124306719-3839654196
                                                                  • Opcode ID: faa87ef93f26e9fed29b8f1a5af7e334510bd2bc09c437b048ce12aaff02692f
                                                                  • Instruction ID: 622fc638603ffec5bdb68cbe127673071c4bf9e417d05ed6bfb537885f772263
                                                                  • Opcode Fuzzy Hash: faa87ef93f26e9fed29b8f1a5af7e334510bd2bc09c437b048ce12aaff02692f
                                                                  • Instruction Fuzzy Hash: E331E6312046409FD701BBB7EC1395D3BA8EB8A71DB92447FF804866A3DE3C5C548A2E
                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0045283B,?,?,00000000,00496628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452792
                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,0045283B,?,?,00000000,00496628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045279B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID: .tmp
                                                                  • API String ID: 1375471231-2986845003
                                                                  • Opcode ID: 1c28547b29fed571f31a6a12edf6bdbbb6f0286fe72defdcbf585ca2806f4d18
                                                                  • Instruction ID: 0fbc8e7b61ef488be3dc006a941ab7ed86dfc6126bd14ded5e16d32ffb1420c7
                                                                  • Opcode Fuzzy Hash: 1c28547b29fed571f31a6a12edf6bdbbb6f0286fe72defdcbf585ca2806f4d18
                                                                  • Instruction Fuzzy Hash: C0215675A002089BDB01EFA1C9829DEB7B8EF59305F50457BE801B7342D6789E05CAA5
                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                                  • 73A25940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042EA14,?,00000001), ref: 0041EE69
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A25940CurrentThread
                                                                  • String ID: "lE
                                                                  • API String ID: 2655091166-192338472
                                                                  • Opcode ID: b328251ae0892c8a3b7f185b32438ae157af80a37aa78e1151a8addd2e42d252
                                                                  • Instruction ID: 6dec67758a4febc774e22da3091525d30ea0c4d8bfc57ce8b44416be19a69247
                                                                  • Opcode Fuzzy Hash: b328251ae0892c8a3b7f185b32438ae157af80a37aa78e1151a8addd2e42d252
                                                                  • Instruction Fuzzy Hash: C3015B74A04704AFD701CFA6EC11956BBE8E789720B22887BE904D37A0EA385811DE18
                                                                  APIs
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047811E,00000000,00478134,?,?,?,?,00000000), ref: 00477EFA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID: RegisteredOrganization$RegisteredOwner
                                                                  • API String ID: 3535843008-1113070880
                                                                  • Opcode ID: 3b9aa2d80e5bb588d7add13eca2ad8da36b34b0339f58eee0767cb30d0f9156c
                                                                  • Instruction ID: fa4f23c8c0b6d3cc437a60a3394110702e60ad628927354c58f60cad5fa28099
                                                                  • Opcode Fuzzy Hash: 3b9aa2d80e5bb588d7add13eca2ad8da36b34b0339f58eee0767cb30d0f9156c
                                                                  • Instruction Fuzzy Hash: 8CF09030718244AFDB10EAA59D92BAA375AD781308FA080BBE5049B391D779AD02D75C
                                                                  APIs
                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004231B9
                                                                  • LoadCursorA.USER32(00000000,00000000), ref: 004231E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CursorLoad
                                                                  • String ID: EI
                                                                  • API String ID: 3238433803-1715459816
                                                                  • Opcode ID: cf7d116e50ce189f5790faa080c989bb411d79830bfeb1cde74da96b9f6355ff
                                                                  • Instruction ID: e763212e35d88e91f52bf3e5ce882ef76e84b1945e438db40d164ba05c470673
                                                                  • Opcode Fuzzy Hash: cf7d116e50ce189f5790faa080c989bb411d79830bfeb1cde74da96b9f6355ff
                                                                  • Instruction Fuzzy Hash: 1DF0A7117001145BD620593E6CC1D3A72688F87736B61033BFE2AD72D1C62E2D51426D
                                                                  APIs
                                                                  • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,E"G,0049715C,?,0046B477,?,00000000,0046B9CE,?,_is1), ref: 0046B183
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Value
                                                                  • String ID: E"G$Inno Setup: Setup Version
                                                                  • API String ID: 3702945584-3103003659
                                                                  • Opcode ID: fe4bac22182e9b3690d628e5aab8f5fa60c8f4978fedd226071c0efb5d38f188
                                                                  • Instruction ID: 4d5e84264db937b37b97998ec3c417cbd25533f79302db5a87cce77b77850be7
                                                                  • Opcode Fuzzy Hash: fe4bac22182e9b3690d628e5aab8f5fa60c8f4978fedd226071c0efb5d38f188
                                                                  • Instruction Fuzzy Hash: 22E06D713012047FD710AA2A9C89F5BBBDCDF893A5F10403AB908DB392DA78ED4081A8
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047167F), ref: 0047146D
                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047167F), ref: 00471484
                                                                    • Part of subcall function 004521C4: GetLastError.KERNEL32(00000000,00452C35,00000005,00000000,00452C6A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00493575,00000000), ref: 004521C7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateErrorFileHandleLast
                                                                  • String ID: CreateFile
                                                                  • API String ID: 2528220319-823142352
                                                                  • Opcode ID: 800bb0325985d34956c9da8e04eb100ff20cf6eeeb2dc0571312b1378ebf424d
                                                                  • Instruction ID: c104701e3ac4c72cb8451278cea4e269ad366b77bc799aad6b71a423408a45bc
                                                                  • Opcode Fuzzy Hash: 800bb0325985d34956c9da8e04eb100ff20cf6eeeb2dc0571312b1378ebf424d
                                                                  • Instruction Fuzzy Hash: 00E06D746443047BEA10E669DCC6F4A77889B04738F108152FA48AF3E2C5B9EC408668
                                                                  APIs
                                                                  • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,\qI,00000004,00000001,?,0046B838,?,?,00000000,0046B9CE,?,_is1,?), ref: 0046B1E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Value
                                                                  • String ID: NoModify$\qI
                                                                  • API String ID: 3702945584-2584188330
                                                                  • Opcode ID: c3b01a61708714b50ccdeb908b300e988e8e75eb38ff40614f02e64a99329d3d
                                                                  • Instruction ID: 5eacf4f75227775215caf3d7335e589ae950959f2a2178ae4f8f9b9abb7c80c6
                                                                  • Opcode Fuzzy Hash: c3b01a61708714b50ccdeb908b300e988e8e75eb38ff40614f02e64a99329d3d
                                                                  • Instruction Fuzzy Hash: 90E01AB0600308BEEB04DA55CD4AF6F77ACDB48710F104059BA04DB281EA74AE40C6A8
                                                                  APIs
                                                                    • Part of subcall function 0042E1B4: SetErrorMode.KERNEL32(00008000), ref: 0042E1BE
                                                                    • Part of subcall function 0042E1B4: LoadLibraryA.KERNEL32(00000000,00000000,0042E208,?,00000000,0042E226,?,00008000), ref: 0042E1ED
                                                                  • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 00469009
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressErrorLibraryLoadModeProc
                                                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                  • API String ID: 2492108670-2683653824
                                                                  • Opcode ID: 97c0c09dc75a3a684baa6722c430497bd25667040c20172551983560de92535b
                                                                  • Instruction ID: 3b95b4fcd0a43e84c2e5215cc6223a96c0a9d59207468fff4f15a35feb75c840
                                                                  • Opcode Fuzzy Hash: 97c0c09dc75a3a684baa6722c430497bd25667040c20172551983560de92535b
                                                                  • Instruction Fuzzy Hash: 91B092F0642641A6CF00ABB2580271631089750708F14C0BB7284AF296FABE88049B2E
                                                                  APIs
                                                                  • GetSystemMenu.USER32(00000000,00000000,00000000,0047D09C), ref: 0047D034
                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0047D045
                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 0047D05D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Append$System
                                                                  • String ID:
                                                                  • API String ID: 1489644407-0
                                                                  • Opcode ID: a4b08483dabfab2733e9bc053085c0a3c7fafd496603550401735eefed55e13c
                                                                  • Instruction ID: c49c8260b0df57bd971d15bcc62f6f20f4436556b6efa56ccebc61c518663fc6
                                                                  • Opcode Fuzzy Hash: a4b08483dabfab2733e9bc053085c0a3c7fafd496603550401735eefed55e13c
                                                                  • Instruction Fuzzy Hash: 9831D030B543846AD720FB768C82BAA3AA59F1531CF50547FF904AB2D3CA7D9809C69D
                                                                  APIs
                                                                  • 73A1A570.USER32(00000000,?,00000000,00000000,0044AFCD,?,0047D8CB,?,?), ref: 0044AF41
                                                                  • SelectObject.GDI32(?,00000000), ref: 0044AF64
                                                                  • 73A1A480.USER32(00000000,?,0044AFA4,00000000,0044AF9D,?,00000000,?,00000000,00000000,0044AFCD,?,0047D8CB,?,?), ref: 0044AF97
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A480A570ObjectSelect
                                                                  • String ID:
                                                                  • API String ID: 1230475511-0
                                                                  • Opcode ID: e0573b52b8d0cf653cb97956980ba2b98f630935dda97703e8dcaa725f5ac4bc
                                                                  • Instruction ID: d869ba56a2ec6f0d5c870d586e3948e50cfd74acb1facaba93160b1832a15f46
                                                                  • Opcode Fuzzy Hash: e0573b52b8d0cf653cb97956980ba2b98f630935dda97703e8dcaa725f5ac4bc
                                                                  • Instruction Fuzzy Hash: 1B21A4B0A44248AFEB01DFA5C845B9EBBB9EB48304F51807AF500A7281D73C9954CB2A
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044AC8C,?,0047D8CB,?,?), ref: 0044AC5E
                                                                  • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044AC71
                                                                  • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044ACA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: DrawText$ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 65125430-0
                                                                  • Opcode ID: bcdfe699981e179dce2f2d8ed31dbe01375d55539489093dbbbd111fc7924bee
                                                                  • Instruction ID: 685493112d12ba358f0882a71248ae5c31f802529d156c39c17c166dd35f8f85
                                                                  • Opcode Fuzzy Hash: bcdfe699981e179dce2f2d8ed31dbe01375d55539489093dbbbd111fc7924bee
                                                                  • Instruction Fuzzy Hash: FB11E6B27046047FE700DAAA8CC1E6FB7ECEB88720F10413AF504E7280C6399E018669
                                                                  APIs
                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424382
                                                                  • TranslateMessage.USER32(?), ref: 004243FF
                                                                  • DispatchMessageA.USER32(?), ref: 00424409
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Message$DispatchPeekTranslate
                                                                  • String ID:
                                                                  • API String ID: 4217535847-0
                                                                  • Opcode ID: 4c72fe453077d3d5441811771d3c73f57da1beb0f02e586e781598996b195a0c
                                                                  • Instruction ID: aef1b0206ccdbb2aa8587e86ea6dacd49c82d9c27d6d10fa8c02d352bba97142
                                                                  • Opcode Fuzzy Hash: 4c72fe453077d3d5441811771d3c73f57da1beb0f02e586e781598996b195a0c
                                                                  • Instruction Fuzzy Hash: 6F11543030432056DA20E665A94179B73D4DFC1B44F80886EF9DD97382D77D9D4987AA
                                                                  APIs
                                                                  • SetPropA.USER32(00000000,00000000), ref: 004165DA
                                                                  • SetPropA.USER32(00000000,00000000), ref: 004165EF
                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 00416616
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Prop$Window
                                                                  • String ID:
                                                                  • API String ID: 3363284559-0
                                                                  • Opcode ID: d324db774ac04714c3ad6eb6c0384bcb009cb4e1a08786751ec3748c0ad2eb0f
                                                                  • Instruction ID: 49560f5f00ee2c9135054c0b38937f4b9f373f0e35015079742173c5fde362c9
                                                                  • Opcode Fuzzy Hash: d324db774ac04714c3ad6eb6c0384bcb009cb4e1a08786751ec3748c0ad2eb0f
                                                                  • Instruction Fuzzy Hash: C3F0BD71701220BBEB10AB599C85FA632DCAB09715F16057ABE09EF286C778DC44C7A8
                                                                  APIs
                                                                  • IsWindowVisible.USER32(?), ref: 0041EDD4
                                                                  • IsWindowEnabled.USER32(?), ref: 0041EDDE
                                                                  • EnableWindow.USER32(?,00000000), ref: 0041EE04
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$EnableEnabledVisible
                                                                  • String ID:
                                                                  • API String ID: 3234591441-0
                                                                  • Opcode ID: f1041f771c00274fafaec7c92c8c7bfa6f382932e423aeab5ff933265dcc9458
                                                                  • Instruction ID: feef2f1e36016e7b5cf4fb144cadbc7ab6d373431457e94ba2eb74728d462d7d
                                                                  • Opcode Fuzzy Hash: f1041f771c00274fafaec7c92c8c7bfa6f382932e423aeab5ff933265dcc9458
                                                                  • Instruction Fuzzy Hash: B9E0E5B41003006BD711AF67DC85E57769CBB94314F568437AD0597793EA3ED8418AB8
                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,0040867A), ref: 00408563
                                                                    • Part of subcall function 00406D54: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406D71
                                                                    • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                  • String ID: H=I
                                                                  • API String ID: 1658689577-3827348704
                                                                  • Opcode ID: 6e8303e27ed7ddfbf6acd002e5c720f3c58af445dc5c20a44dc96457956c1da1
                                                                  • Instruction ID: 74dcf24fece9135f842d9e2340cbc50c81b3ec91f87ebb2824f4d2ce1649f107
                                                                  • Opcode Fuzzy Hash: 6e8303e27ed7ddfbf6acd002e5c720f3c58af445dc5c20a44dc96457956c1da1
                                                                  • Instruction Fuzzy Hash: E7316375E00109ABCF00EF95C8819EEB7B9FF84314F118577E815BB285E738AE058B98
                                                                  APIs
                                                                  • SetActiveWindow.USER32(?), ref: 0047D954
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ActiveWindow
                                                                  • String ID: InitializeWizard
                                                                  • API String ID: 2558294473-2356795471
                                                                  • Opcode ID: e11a320216bbe91ec29931ea527e5565cefbe40d6e86ac73dd5f1dd7f4233be4
                                                                  • Instruction ID: e4d3bd33a04726a401a8ce8bfd0985dfa8140512a28c41ab327dfc63dc5b22f8
                                                                  • Opcode Fuzzy Hash: e11a320216bbe91ec29931ea527e5565cefbe40d6e86ac73dd5f1dd7f4233be4
                                                                  • Instruction Fuzzy Hash: B71173B1628200AFD714EB65EC42B5677F4DB15328F20447BF508972A1DA796844CB5D
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,00477FFA,00000000,00478134), ref: 00477DF9
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 00477DC9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                  • API String ID: 47109696-1019749484
                                                                  • Opcode ID: 609ad8c06805e5ed73b57a051d0e8d13d1cf0a7060c65d27e27e054ffdd16699
                                                                  • Instruction ID: 4a236c6a67e1dcfb615a2d1ed4eb14a8c966f40857a8dfce4ac85c8fce153308
                                                                  • Opcode Fuzzy Hash: 609ad8c06805e5ed73b57a051d0e8d13d1cf0a7060c65d27e27e054ffdd16699
                                                                  • Instruction Fuzzy Hash: 83F0A7317081146BDA00A65E9C42BAFA6DECF84758F70447BF508EB342D9BD9E0243AD
                                                                  APIs
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  Strings
                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 0042DC6E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID: System\CurrentControlSet\Control\Windows
                                                                  • API String ID: 71445658-1109719901
                                                                  • Opcode ID: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                                                  • Instruction ID: fabb803f5ff523eeab3b7a035bb747b9213277980d9d81731b2bf545c5070290
                                                                  • Opcode Fuzzy Hash: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                                                  • Instruction Fuzzy Hash: EDD0C772910128BBDB10DA89DC41DF7775DDB59760F54401AFD0497141C1B4EC5197F4
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DA74
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DAE4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID:
                                                                  • API String ID: 3660427363-0
                                                                  • Opcode ID: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                                                  • Instruction ID: de7305fe23da407263f6a21fe748e6d6d926aae016943a7179aec9e2dd5a457b
                                                                  • Opcode Fuzzy Hash: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                                                  • Instruction Fuzzy Hash: 4F417171E04129AFDF10DF91D891BAFBBB8EB01704F918466E810B7240D778BE04CB99
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DDF6,?,?,00000008,00000000,00000000,0042DE23), ref: 0042DD8C
                                                                  • RegCloseKey.ADVAPI32(?,0042DDFD,?,00000000,00000000,00000000,00000000,00000000,0042DDF6,?,?,00000008,00000000,00000000,0042DE23), ref: 0042DDF0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseEnumOpen
                                                                  • String ID:
                                                                  • API String ID: 1332880857-0
                                                                  • Opcode ID: a628f870802414320e03df51bf8e3bb33a6c14043c394065cade35f429d745f7
                                                                  • Instruction ID: 4db75c3f0003ee77c81ad7234f2e5e1b513bc4eba3d2eee43a500da64a91fe5e
                                                                  • Opcode Fuzzy Hash: a628f870802414320e03df51bf8e3bb33a6c14043c394065cade35f429d745f7
                                                                  • Instruction Fuzzy Hash: 4931B270F04649AFDB14DFA6DC52BAFBBB9EB48304F90407BE400F7281D6785A01CA29
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,00600000,00002000,00000001,?,?), ref: 0045C048
                                                                  • BZ2_bzDecompressInit._ISDECMP(?,00000000,00000000,?,?,?,00000000,00600000,00002000,00000001,?,?), ref: 0045C08E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AllocDecompressInitVirtualZ2_bz
                                                                  • String ID:
                                                                  • API String ID: 3582128297-0
                                                                  • Opcode ID: 5e1bb4ce1c492a444d67f47bfceb20c881f3a9913296b1b2033ca0d50a160f51
                                                                  • Instruction ID: 1652b93da1af4602b5d992a7e5443e5633366da5d0fd56bd45696732dcfbed5e
                                                                  • Opcode Fuzzy Hash: 5e1bb4ce1c492a444d67f47bfceb20c881f3a9913296b1b2033ca0d50a160f51
                                                                  • Instruction Fuzzy Hash: EC11E672600700BFD310DF658881B9AB7A5FF48714F044227E908C62C1D7B9A8288BD8
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AF52
                                                                  • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B0AF,00000000,0040B0C7,?,?,?,00000000), ref: 0040AF63
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindFree
                                                                  • String ID:
                                                                  • API String ID: 4097029671-0
                                                                  • Opcode ID: 4c56261ccbe53d89a965c675f2099a33abcf659a9ca46e95dfae9404eb622582
                                                                  • Instruction ID: d0e6d2b3de5701a5b01f0c314f0e154d100cb3f2f79c9d4e2e087994511e300e
                                                                  • Opcode Fuzzy Hash: 4c56261ccbe53d89a965c675f2099a33abcf659a9ca46e95dfae9404eb622582
                                                                  • Instruction Fuzzy Hash: 7701F7B1704300AFD700EF69DC92E1A77EDDB897187128076F500EB3D0DA799C119669
                                                                  APIs
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 004519EA
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00451A10), ref: 004519F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastMove
                                                                  • String ID:
                                                                  • API String ID: 55378915-0
                                                                  • Opcode ID: 6d867152c6c75b5f61e96aaa63bfdcdba42aba2db9c54179decd493f1758b19e
                                                                  • Instruction ID: d273310e98e6f6f493512cd52094e3967d661a26e20719f55c5043b00dcbd2bf
                                                                  • Opcode Fuzzy Hash: 6d867152c6c75b5f61e96aaa63bfdcdba42aba2db9c54179decd493f1758b19e
                                                                  • Instruction Fuzzy Hash: 4001F9B5B05304BB8B11EFB9AC415AEB7ECDB49325710497BFC08E3252EB385E048559
                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004514F7), ref: 004514D1
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,004514F7), ref: 004514D9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1375471231-0
                                                                  • Opcode ID: dc44d8321d6bfd874fb431d63ac4f699d1b34e2e0cde990bb9bae61842f6b8a0
                                                                  • Instruction ID: 4bfef19c8d441a435eb9b4716adbca3a052683e839c5073d40314bacb775639e
                                                                  • Opcode Fuzzy Hash: dc44d8321d6bfd874fb431d63ac4f699d1b34e2e0cde990bb9bae61842f6b8a0
                                                                  • Instruction Fuzzy Hash: 0BF0F471A00208ABCB00EFB59C0169EB3E8DB0A315B5089B7FC04E3352EA3D5A048598
                                                                  APIs
                                                                  • DeleteFileA.KERNEL32(00000000,00000000,0045168D,?,-00000001,?), ref: 00451667
                                                                  • GetLastError.KERNEL32(00000000,00000000,0045168D,?,-00000001,?), ref: 0045166F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 2018770650-0
                                                                  • Opcode ID: b6f76356a4849f5abc57c1e54de1195deacc4c0af2855476f224c489c14484d8
                                                                  • Instruction ID: 9c87cf970c535bca4ef0749dc9476fddb3b08082dd9a2dd975be5b17c6e34ad5
                                                                  • Opcode Fuzzy Hash: b6f76356a4849f5abc57c1e54de1195deacc4c0af2855476f224c489c14484d8
                                                                  • Instruction Fuzzy Hash: C6F04C75A00704AFCF00EF759C415AEB3ECDB0931575145B7FC14E3252E6785E148558
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00451867,?,?,00000000), ref: 00451841
                                                                  • GetLastError.KERNEL32(00000000,00000000,00451867,?,?,00000000), ref: 00451849
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 1799206407-0
                                                                  • Opcode ID: d0d5d3c750d501c03ded3afddd86826d5108db2b08ff96678fa0c0982c7945a8
                                                                  • Instruction ID: 5d01d42f9c80505706cbad87787f06b1fb9419d88b1618a5508945e5361375b9
                                                                  • Opcode Fuzzy Hash: d0d5d3c750d501c03ded3afddd86826d5108db2b08ff96678fa0c0982c7945a8
                                                                  • Instruction Fuzzy Hash: FBF04C70A00708ABCB20FFB5AC415ADB3ECEB093257504AB7FC24E3292DB384E048598
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,0045C006), ref: 0045C15A
                                                                  Strings
                                                                  • bzlib: Too much memory requested, xrefs: 0045C135
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID: bzlib: Too much memory requested
                                                                  • API String ID: 4275171209-1500031545
                                                                  • Opcode ID: fec82dd1f5786d769a5cb7008ec5019eeb6d260ca2ea21bd8973b0fa4da0c274
                                                                  • Instruction ID: c43b8c5375a74fd16ea94767b4f82bb7795889ade0a767dea687f0e438a2885d
                                                                  • Opcode Fuzzy Hash: fec82dd1f5786d769a5cb7008ec5019eeb6d260ca2ea21bd8973b0fa4da0c274
                                                                  • Instruction Fuzzy Hash: 6BF090727006100BD751DEBD8CC17CB62848B4835AF080072BF4CDE24BD6ACDC848BAC
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00008000), ref: 0042E1BE
                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,0042E208,?,00000000,0042E226,?,00008000), ref: 0042E1ED
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLibraryLoadMode
                                                                  • String ID:
                                                                  • API String ID: 2987862817-0
                                                                  • Opcode ID: 26e788730e3cbe96319a03b17e5e53d01e76f45806d8ea66fac71578cd018f2a
                                                                  • Instruction ID: b03bd68b0133cfb85c2b49f6daf1a90f00f582e3dd9511e38abcea9ad9b5a4f7
                                                                  • Opcode Fuzzy Hash: 26e788730e3cbe96319a03b17e5e53d01e76f45806d8ea66fac71578cd018f2a
                                                                  • Instruction Fuzzy Hash: 50F08270B14744BEDB119F77DC6282BBBECE74DB1079249B6F810A3691E63C5810C938
                                                                  APIs
                                                                  • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,0046C565,?,00000000), ref: 00450176
                                                                  • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,0046C565,?,00000000), ref: 0045017E
                                                                    • Part of subcall function 0044FF1C: GetLastError.KERNEL32(0044FD38,0044FFDE,?,00000000,?,00492FFC,00000001,00000000,00000002,00000000,0049315D,?,?,00000005,00000000,00493191), ref: 0044FF1F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$FilePointer
                                                                  • String ID:
                                                                  • API String ID: 1156039329-0
                                                                  • Opcode ID: 9ad55e6e0a57978d06bf4d1cb9d603d4e27671ffbc865b9d0649cece1accc0c3
                                                                  • Instruction ID: 474626a802956e5cbd21d4c165e028c99c6c63b09818e393c268beff974bb15b
                                                                  • Opcode Fuzzy Hash: 9ad55e6e0a57978d06bf4d1cb9d603d4e27671ffbc865b9d0649cece1accc0c3
                                                                  • Instruction Fuzzy Hash: 54E012B53046016BEB10EAB599C1F3B22D8DF44315F00447AB944CF187E675CC498B6A
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFree
                                                                  • String ID:
                                                                  • API String ID: 2087232378-0
                                                                  • Opcode ID: ac11951010fca1e09d027c43c8ed5b4b578696c80165eb8de0d03b95ec4bb515
                                                                  • Instruction ID: 1d7fc67d8943aca9bd8b7424c3d760102f2274f63a1bf98f742a2cdc6a51162d
                                                                  • Opcode Fuzzy Hash: ac11951010fca1e09d027c43c8ed5b4b578696c80165eb8de0d03b95ec4bb515
                                                                  • Instruction Fuzzy Hash: 28F0A772B0073067EB605A6A4C81F5359C49FC5B94F154076FD0DFF3E9D6B58C0142A9
                                                                  APIs
                                                                  • SendNotifyMessageA.USER32(0002041C,00000496,00002711,00000000), ref: 0047993C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MessageNotifySend
                                                                  • String ID:
                                                                  • API String ID: 3556456075-0
                                                                  • Opcode ID: f4afbd0644c4d93fd1e63ebf745a52f9f3565c7da5dcf8e82a0d7bc6db81745b
                                                                  • Instruction ID: ad7086caf21e8b4263301facb92e1587ddf9f064bccfa97be459d741656e1401
                                                                  • Opcode Fuzzy Hash: f4afbd0644c4d93fd1e63ebf745a52f9f3565c7da5dcf8e82a0d7bc6db81745b
                                                                  • Instruction Fuzzy Hash: 5C4195747140008BDB11FF66EC8198A7BA9AB90309765C57BB9049F3A7CA3CDD06CB5D
                                                                  APIs
                                                                  • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FBA9
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: InfoScroll
                                                                  • String ID:
                                                                  • API String ID: 629608716-0
                                                                  • Opcode ID: 50e1310ba0544b59a0555e2be0f3aefd4cf1699031129a7841ddf0d9dd467a2f
                                                                  • Instruction ID: 884c2cb002146e47c45dd1875db58eae66db6a4caaf859e9ca4b80fd75174b4c
                                                                  • Opcode Fuzzy Hash: 50e1310ba0544b59a0555e2be0f3aefd4cf1699031129a7841ddf0d9dd467a2f
                                                                  • Instruction Fuzzy Hash: DD2130716087456FC340DF39D840696BBE4BB48344F148A3EA098C3341D774E99ACBD6
                                                                  APIs
                                                                    • Part of subcall function 0041EE14: GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                                    • Part of subcall function 0041EE14: 73A25940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042EA14,?,00000001), ref: 0041EE69
                                                                  • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,00468756,?,00000000,?,?,00468963,?,00000000,004689A2), ref: 0046873A
                                                                    • Part of subcall function 0041EEC8: IsWindow.USER32(8BF0EBFF), ref: 0041EED6
                                                                    • Part of subcall function 0041EEC8: EnableWindow.USER32(8BF0EBFF,00000001), ref: 0041EEE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$A25940CurrentEnablePathPrepareThreadWrite
                                                                  • String ID:
                                                                  • API String ID: 390483697-0
                                                                  • Opcode ID: 537a648804628b5e02728cede5c6c912c08caa4db7979cef3d55c9bd7edfe597
                                                                  • Instruction ID: 5f1323f4397b3ee2810d501b1bf1d3990ce2eca8f47bc916b599dab184451e60
                                                                  • Opcode Fuzzy Hash: 537a648804628b5e02728cede5c6c912c08caa4db7979cef3d55c9bd7edfe597
                                                                  • Instruction Fuzzy Hash: 7EF02E30248300AFE7109B32AC06B197BE8E309B12F60087BF90882180FA796C40C62E
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                  • Instruction ID: b2f4e4313b6d59998101169f1e75a43fe1b88cae4c3ce48544be240c8b35f884
                                                                  • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                  • Instruction Fuzzy Hash: 2FF06D3010410DDBEB2CCF58D0619AF77A1EB49311B20807FE6078B390C674AE60DA58
                                                                  APIs
                                                                  • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 004164F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: cdcc0148ce654954751abbafc01dffb42bdee5d1888213000ee0bb92e9214fa3
                                                                  • Instruction ID: a44329a4cc8b06b024a2b0eee2fd8d89e642962040674eee811c3e7967e458ca
                                                                  • Opcode Fuzzy Hash: cdcc0148ce654954751abbafc01dffb42bdee5d1888213000ee0bb92e9214fa3
                                                                  • Instruction Fuzzy Hash: F5F025B2200510AFDB84CF9CD9C0F9373ECEB0C210B0981A6FA08CF24AD220EC108BB0
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0041495F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                  • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                  • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                  • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0045006C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 2ede321defe567e410583ee7d2eecbacf47d7ccc5192bb7a3ec4f55cb8d78e51
                                                                  • Instruction ID: 45ed5e217c844315310d89a20c49d2eff003bfa8467b370b0955f01a950c20be
                                                                  • Opcode Fuzzy Hash: 2ede321defe567e410583ee7d2eecbacf47d7ccc5192bb7a3ec4f55cb8d78e51
                                                                  • Instruction Fuzzy Hash: 39E0EDA53541583ED240AABCBC52F9767DC9759754F008033B998D7241D4619A158BA8
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0042CBF0,?,00000001,?,?,00000000,?,0042CC42,00000000,0045174D,00000000,0045176E,?,00000000), ref: 0042CBD3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                                                  • Instruction ID: dfed850972a7f4cfed0b3d6ce6ead54829112a593105f6481b619d55be1254e6
                                                                  • Opcode Fuzzy Hash: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                                                  • Instruction Fuzzy Hash: 1AE06571304708BFD701EB62AC93E5EBBACD745714B914876B400A7651D5B8AE00845C
                                                                  APIs
                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451F9B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E653
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FormatMessage
                                                                  • String ID:
                                                                  • API String ID: 1306739567-0
                                                                  • Opcode ID: 1e35d6990590c6e50af99b1e8368dee699bbd3b64eed18c8552a5533455f4f95
                                                                  • Instruction ID: 6dc52a3738478b360af1f37268f932a47e6ce6d9338a48a593b8bc47814fb21e
                                                                  • Opcode Fuzzy Hash: 1e35d6990590c6e50af99b1e8368dee699bbd3b64eed18c8552a5533455f4f95
                                                                  • Instruction Fuzzy Hash: 7AE0D86178431119F62514166C53B7B110E8390B44FD080267A109D3C3C6AE990D429E
                                                                  APIs
                                                                  • CreateWindowExA.USER32(00000000,004235EC,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 00406329
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                  • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                                  • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                  • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                                  APIs
                                                                  • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC48
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: 4676b834bccda8ccd94f8a4f379db04665fbdc7bc7b85aab9c145464b6c6dbba
                                                                  • Instruction ID: 5aa87c08ff8936fcaaa84cf50ff31e6a06e3de0a8084b04fc6442f63f77fe161
                                                                  • Opcode Fuzzy Hash: 4676b834bccda8ccd94f8a4f379db04665fbdc7bc7b85aab9c145464b6c6dbba
                                                                  • Instruction Fuzzy Hash: BDE07EB2600129AF9B40DE8DDC81EEB37ADAB1D350F404016FA08D7200C2B4EC519BB4
                                                                  APIs
                                                                  • FindClose.KERNEL32(00000000,000000FF,0046CD88,00000000,0046DB81,?,00000000,0046DBCA,?,00000000,0046DD03,?,00000000,?,00000000), ref: 004537F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFind
                                                                  • String ID:
                                                                  • API String ID: 1863332320-0
                                                                  • Opcode ID: 54b39f45c5f67c440eef70d7cfdfc20af3eff7d0f7fc73acc1bfbd45dbef0565
                                                                  • Instruction ID: 3c2f3b5d168bf93cd631a235a9b0e84732c2fbaaec0239a20caabd19728dc336
                                                                  • Opcode Fuzzy Hash: 54b39f45c5f67c440eef70d7cfdfc20af3eff7d0f7fc73acc1bfbd45dbef0565
                                                                  • Instruction Fuzzy Hash: 0FE065709046004BCB18DF3A88802167AD15F89321F04C56ABC58CB396D63CD4154666
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(00490B52,?,00490B74,?,?,00000000,00490B52,?,?), ref: 0041460B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                  • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                  • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                  • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406E8C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 8104b81393d7ab99e5490d03bd39932e7ae08d55ff3641e8619ba5a3672376b0
                                                                  • Instruction ID: 5e9ef0cb41ef517b54198f539e7e4457f1ce254f1207c5e451c0fee893fabf4d
                                                                  • Opcode Fuzzy Hash: 8104b81393d7ab99e5490d03bd39932e7ae08d55ff3641e8619ba5a3672376b0
                                                                  • Instruction Fuzzy Hash: 3DD05B763082107AD620A55BAC44DA76BDCCFC5770F11063EB558C71C1D6309C01C675
                                                                  APIs
                                                                    • Part of subcall function 00423568: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042357D
                                                                  • ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                                    • Part of subcall function 00423598: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 004235B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: InfoParametersSystem$ShowWindow
                                                                  • String ID:
                                                                  • API String ID: 3202724764-0
                                                                  • Opcode ID: e43ee2013604c357900ae1fc59d7573d1bdcd4a9f72dbe210b738252a55b591a
                                                                  • Instruction ID: 6e8deb3ed7ffb4c54c7bf11bddd21d475954711d807402a63cfbe74293682e9f
                                                                  • Opcode Fuzzy Hash: e43ee2013604c357900ae1fc59d7573d1bdcd4a9f72dbe210b738252a55b591a
                                                                  • Instruction Fuzzy Hash: 03D05E123812743102107ABB280998B42A84D862AB388043BB54CDB202E91E8A81A1AC
                                                                  APIs
                                                                  • SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: TextWindow
                                                                  • String ID:
                                                                  • API String ID: 530164218-0
                                                                  • Opcode ID: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                                                  • Instruction ID: a3b20f4c882213fa23ff33249cd178fa67041ba6f44abe22b1f00704e939aabb
                                                                  • Opcode Fuzzy Hash: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                                                  • Instruction Fuzzy Hash: 4CD05EE27011702BCB01BBED54C4AC667CC8B8829AB1940BBF918EF257C638CE448398
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00450DF7,00000000), ref: 0042CC0B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                                  • Instruction ID: 3d474633da5dc292dd1e9b08acfa0ea7ef8e6560f0837aa6ac70ccb6d2902417
                                                                  • Opcode Fuzzy Hash: 696c079d1e659a807bafa968d47e5a3e4cea9be412662ea6c9d5bc89f686c2e0
                                                                  • Instruction Fuzzy Hash: 42C08CE03022001A9A1465BF2CC511F42C8891827A3A41F37F53CE32D2D27E88A72428
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00464198,00000000,00000000,00000000,0000000C,00000000), ref: 00463544
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                  • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                  • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                  • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A834,0040CDE0,?,00000000,?), ref: 00406E45
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 729f5fe22d032bc30c7b3c1cd235c04f69d711967675883a87a82d232c0a1fda
                                                                  • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                  • Opcode Fuzzy Hash: 729f5fe22d032bc30c7b3c1cd235c04f69d711967675883a87a82d232c0a1fda
                                                                  • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                  APIs
                                                                  • SetEndOfFile.KERNEL32(?,?,0045AB76,00000000,0045AD01,?,00000000,00000002,00000002), ref: 0045019B
                                                                    • Part of subcall function 0044FF1C: GetLastError.KERNEL32(0044FD38,0044FFDE,?,00000000,?,00492FFC,00000001,00000000,00000002,00000000,0049315D,?,?,00000005,00000000,00493191), ref: 0044FF1F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 734332943-0
                                                                  • Opcode ID: e509c6469c0495ff3d8d50289cc47f78563c4c1ba542cbc23bb40268093561b4
                                                                  • Instruction ID: 1bebecc74f079ece343e3a7d1167f4405f8714b267b02dadb744202632b617bb
                                                                  • Opcode Fuzzy Hash: e509c6469c0495ff3d8d50289cc47f78563c4c1ba542cbc23bb40268093561b4
                                                                  • Instruction Fuzzy Hash: B1C04C65300500479F00A6AE9AC190763D85E493053144166B904CF217E769DC084A15
                                                                  APIs
                                                                  • SetCurrentDirectoryA.KERNEL32(00000000,?,00492F8A,00000000,0049315D,?,?,00000005,00000000,00493191,?,?,00000000), ref: 0040721B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentDirectory
                                                                  • String ID:
                                                                  • API String ID: 1611563598-0
                                                                  • Opcode ID: 116f646fca034a371e6a5c157b9d4efecc0deabf7e2bcd6bcee3aaaef58023bf
                                                                  • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                  • Opcode Fuzzy Hash: 116f646fca034a371e6a5c157b9d4efecc0deabf7e2bcd6bcee3aaaef58023bf
                                                                  • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(?,0042E22D), ref: 0042E220
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorMode
                                                                  • String ID:
                                                                  • API String ID: 2340568224-0
                                                                  • Opcode ID: 5cb12245fe54509065a79bb868ac9e2c98d4f3c192dc6fa753926c2ceb3ff8f1
                                                                  • Instruction ID: f738dbc2c191c097ff54108f810fd354cf398823fcd47068a980be29c21e85c8
                                                                  • Opcode Fuzzy Hash: 5cb12245fe54509065a79bb868ac9e2c98d4f3c192dc6fa753926c2ceb3ff8f1
                                                                  • Instruction Fuzzy Hash: 91B09B76B0C6005DF705D6D5745152D63D8D7C57203E149B7F111D2581D93C58004928
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                                  • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                                  • Opcode Fuzzy Hash: 15102f7382d34fed751781a5022c55e4c44b9a191595ad2a6c0bef55f1a25186
                                                                  • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9db86b8de405a088a6b83ccdf8f0a71830a501c36d28a1e2c04e4f1b6f6536bf
                                                                  • Instruction ID: ed683a4cea5e88021bbc1409ff1e0a58e0c8ba7b79923d7a23a2ead903146a7f
                                                                  • Opcode Fuzzy Hash: 9db86b8de405a088a6b83ccdf8f0a71830a501c36d28a1e2c04e4f1b6f6536bf
                                                                  • Instruction Fuzzy Hash: 06517374E042099FEB00EFA9C482AAFBBF5EB49714F50817EE500A7351DB389D41CB98
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0045C530
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 0d17fe96e3633b4bce3b832ac9760b9aaf1ce13a3da319c575eb1aa85a739f95
                                                                  • Instruction ID: 14a4b43ea6d34418f5281b9fa506a5ac76af5718967a6568408b7e2708702b1d
                                                                  • Opcode Fuzzy Hash: 0d17fe96e3633b4bce3b832ac9760b9aaf1ce13a3da319c575eb1aa85a739f95
                                                                  • Instruction Fuzzy Hash: 38116D716003049FDB10EF59C8C1B5B77A4AF8035AF04856AFD589B2C7DA38E8098B6A
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 51e3fafbdfe8660b505851f4d6be169e8525a68d4396489dbf7e9f5c1b76ca38
                                                                  • Instruction ID: b4617262a153a49870252b9da37c83347ffd54b91452f412ea0f349906787434
                                                                  • Opcode Fuzzy Hash: 51e3fafbdfe8660b505851f4d6be169e8525a68d4396489dbf7e9f5c1b76ca38
                                                                  • Instruction Fuzzy Hash: 361118742407099BC710DF59D881B86FBE5EB983A0B10C53BED688B385D378E945CBA9
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,00004003,00401973), ref: 00401766
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: 09cabece21cf584f7b8116981dfbad3f8653d6c5a4f55eb454a10d9661d4edbc
                                                                  • Instruction ID: dd39995c24d96b1f0cd65365fb3acc738aa13d81c460f04ccbda7f03c85f078f
                                                                  • Opcode Fuzzy Hash: 09cabece21cf584f7b8116981dfbad3f8653d6c5a4f55eb454a10d9661d4edbc
                                                                  • Instruction Fuzzy Hash: 6D01FC766442148FC3109F69DCC0E2677E8D794378F16453EDA85673A1D37A6C018BDC
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,00451D55), ref: 00451D37
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1452528299-0
                                                                  • Opcode ID: 71e2df81562d081cfc3b7c0604159a17834d755aac5edb84eb94c15d08a8dafe
                                                                  • Instruction ID: e3d7173dcba9813c1ba58f59c584787317fa7bacb17c2f5dfad0096e4185b841
                                                                  • Opcode Fuzzy Hash: 71e2df81562d081cfc3b7c0604159a17834d755aac5edb84eb94c15d08a8dafe
                                                                  • Instruction Fuzzy Hash: 33014C35A042086A8B11DF69A800AEEBBFCDB493307204277EC24C3352D7345D0896A4
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,0045C526), ref: 0045C45F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: d768226e7fba4269a657a5b5fd178533c35ed0e4588795ab0a1def39923edae1
                                                                  • Instruction ID: 1478ebf07427cf02148a29aa6d11c6baa8331ab22c4979bc7c5621885ffd690e
                                                                  • Opcode Fuzzy Hash: d768226e7fba4269a657a5b5fd178533c35ed0e4588795ab0a1def39923edae1
                                                                  • Instruction Fuzzy Hash: A3D0E9B17557045FDF90EE798CC1B1637D8BB48701F5044666904DB28AE674E804CA58
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: 6426b765ee4710f80a467e35d2b5e2dcb1ef302f189ca94f8ea113479ab17829
                                                                  • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                  • Opcode Fuzzy Hash: 6426b765ee4710f80a467e35d2b5e2dcb1ef302f189ca94f8ea113479ab17829
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                                                  • SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                                                  • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                                                  • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F0FC
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F125
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F13A
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F14F
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F164
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F179
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F18E
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F1A3
                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F1B8
                                                                  • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F1CD
                                                                  • FreeLibrary.KERNEL32(00000001,?,00418F60,00000000,?,?,?,00000001), ref: 0041F1DF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                  • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                  • API String ID: 2323315520-3614243559
                                                                  • Opcode ID: 905ad1abe554de4c9c87ee93fc66b05e811c282670d156124e80981e2e022fa2
                                                                  • Instruction ID: da08133687b7634b50b6c6a847516dd753fa1eb4508864759417a9d87976edef
                                                                  • Opcode Fuzzy Hash: 905ad1abe554de4c9c87ee93fc66b05e811c282670d156124e80981e2e022fa2
                                                                  • Instruction Fuzzy Hash: 3531F0B1640740EBDB00EBF5EC86E653654F768B28756093BB608DB162D77D488ACB1C
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00456F4B
                                                                  • QueryPerformanceCounter.KERNEL32(02123858,00000000,004571DE,?,?,02123858,00000000,?,004578DA,?,02123858,00000000), ref: 00456F54
                                                                  • GetSystemTimeAsFileTime.KERNEL32(02123858,02123858), ref: 00456F5E
                                                                  • GetCurrentProcessId.KERNEL32(?,02123858,00000000,004571DE,?,?,02123858,00000000,?,004578DA,?,02123858,00000000), ref: 00456F67
                                                                  • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00456FDD
                                                                  • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02123858,02123858), ref: 00456FEB
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00494AB0,00000003,00000000,00000000,00000000,0045719A), ref: 00457033
                                                                  • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00457189,?,00000000,C0000000,00000000,00494AB0,00000003,00000000,00000000,00000000,0045719A), ref: 0045706C
                                                                    • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00457115
                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045714B
                                                                  • CloseHandle.KERNEL32(000000FF,00457190,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00457183
                                                                    • Part of subcall function 004521C4: GetLastError.KERNEL32(00000000,00452C35,00000005,00000000,00452C6A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00493575,00000000), ref: 004521C7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                  • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                  • API String ID: 770386003-3271284199
                                                                  • Opcode ID: db8fd2fc78e565b827584a2edf5057b8c02e1c2819e108cfb918dd51187f8bd3
                                                                  • Instruction ID: 74aa415ad1ea60bbdae350522e06097b085bab64edb15c432539c789e3fb1ec4
                                                                  • Opcode Fuzzy Hash: db8fd2fc78e565b827584a2edf5057b8c02e1c2819e108cfb918dd51187f8bd3
                                                                  • Instruction Fuzzy Hash: BE713470E047449EDB10EB65DC45B9EBBF8AB09705F1084BAF908FB282D7785944CF69
                                                                  APIs
                                                                  • GetVersion.KERNEL32 ref: 0045B40E
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045B42E
                                                                  • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045B43B
                                                                  • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045B448
                                                                  • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045B456
                                                                    • Part of subcall function 0045B2FC: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045B39B,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045B375
                                                                  • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045B649,?,?,00000000), ref: 0045B50F
                                                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045B649,?,?,00000000), ref: 0045B518
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                  • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                  • API String ID: 59345061-4263478283
                                                                  • Opcode ID: 43cf285be75af16d28b70a61d725766e54ef82dd91fe4d8500f2a4656713b6ea
                                                                  • Instruction ID: 6c61bc0a80eb4c4dbfce7050d99b8824e7e44c683a952ee731b7dc2fcda1d9fb
                                                                  • Opcode Fuzzy Hash: 43cf285be75af16d28b70a61d725766e54ef82dd91fe4d8500f2a4656713b6ea
                                                                  • Instruction Fuzzy Hash: D95183B0900608EFDB10DF99C841BEEB7B8EB49715F14806AF914B7382D7789945CFA9
                                                                  APIs
                                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 0047400B
                                                                  • GetLastError.KERNEL32(?,?), ref: 00474014
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00474061
                                                                  • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00474085
                                                                  • CloseHandle.KERNEL32(00000000,004740B6,00000000,00000000,000000FF,000000FF,00000000,004740AF,?,?,?), ref: 004740A9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCodeErrorExecuteExitHandleLastMultipleObjectsProcessShellWait
                                                                  • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                  • API String ID: 171997614-221126205
                                                                  • Opcode ID: 5b8597bcbc8f8c5ae3c4155d609866ba6a553f42b55d50e207bb29467e8107af
                                                                  • Instruction ID: 21abd225cb95cd52fde85432385c755240643f660143bcd0d2c87c57ea318f0c
                                                                  • Opcode Fuzzy Hash: 5b8597bcbc8f8c5ae3c4155d609866ba6a553f42b55d50e207bb29467e8107af
                                                                  • Instruction Fuzzy Hash: C2216570A04644AEDB14EBA98942AEE76E8EB45314F50857BF708F73C2DB7C89048B5D
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422964
                                                                  • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422B2E), ref: 00422974
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSendShowWindow
                                                                  • String ID:
                                                                  • API String ID: 1631623395-0
                                                                  • Opcode ID: dab1c7a95abb2f6b78a5b5496c47886fe6a5887a187a3e5c78a325a4ca6a616d
                                                                  • Instruction ID: 22a298226f26ad5282d2b06c056c5494fcfa573f7ff451a3aba74327ab4f92ef
                                                                  • Opcode Fuzzy Hash: dab1c7a95abb2f6b78a5b5496c47886fe6a5887a187a3e5c78a325a4ca6a616d
                                                                  • Instruction Fuzzy Hash: A6917271B04214FFD710EBA9DA86F9D77F4AB09314F5104BAF504AB3A2C778AE409B58
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 00418303
                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00418320
                                                                  • GetWindowRect.USER32(?), ref: 0041833C
                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 0041834A
                                                                  • GetWindowLongA.USER32(?,000000F8), ref: 0041835F
                                                                  • ScreenToClient.USER32(00000000), ref: 00418368
                                                                  • ScreenToClient.USER32(00000000,?), ref: 00418373
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                  • String ID: ,
                                                                  • API String ID: 2266315723-3772416878
                                                                  • Opcode ID: 6e73cc248294e567c08844e3e97027ea107a04c87d830052551685df03000aaa
                                                                  • Instruction ID: 9cf88c6662a8b54f2d940af1896da5675c8924d24fa9a5d7825e36bf04e718ba
                                                                  • Opcode Fuzzy Hash: 6e73cc248294e567c08844e3e97027ea107a04c87d830052551685df03000aaa
                                                                  • Instruction Fuzzy Hash: 40112B71505201AFDB00DF69C885F9B77E8AF49314F18067EBD58DB286C739D900CB69
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 004540FF
                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00454105
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 0045411E
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00454145
                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045414A
                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 0045415B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                  • String ID: SeShutdownPrivilege
                                                                  • API String ID: 107509674-3733053543
                                                                  • Opcode ID: 6d326c56e3389c6054edbf04cc0a0bfa3430e689102129bb81e0ccce36095d02
                                                                  • Instruction ID: 23e316a6b65d16f9dfa0652e36dd3acbc823fd2f88bfdf927afa7474fa9dcef7
                                                                  • Opcode Fuzzy Hash: 6d326c56e3389c6054edbf04cc0a0bfa3430e689102129bb81e0ccce36095d02
                                                                  • Instruction Fuzzy Hash: F4F0687028470275E610A6718C0BF6B219897D0B4DF50492ABE55EE1C3D7BCD98C8A2A
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045B9C5
                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045B9D5
                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045B9E5
                                                                  • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047ADB7,00000000,0047ADE0), ref: 0045BA0A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$CryptVersion
                                                                  • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                  • API String ID: 1951258720-508647305
                                                                  • Opcode ID: bb245507e40185cfc3454a96feae2fb86a921a1e24ca28a56a513b06711a4f80
                                                                  • Instruction ID: 3310e940ea810e7a4cfc61d0fb1510fb446f85d9db7b56b365dbfe59fc7890d4
                                                                  • Opcode Fuzzy Hash: bb245507e40185cfc3454a96feae2fb86a921a1e24ca28a56a513b06711a4f80
                                                                  • Instruction Fuzzy Hash: 6FF030B0529700CBDB15DF76AC85B633795E7A035AF04C83BA404A52B2D77C0948DFAC
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004933B2,?,?,00000000,00496628,?,0049353C,00000000,00493590,?,?,00000000,00496628), ref: 004932CB
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049334E
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0049338A,?,00000000,?,00000000,004933B2,?,?,00000000,00496628,?,0049353C,00000000), ref: 00493366
                                                                  • FindClose.KERNEL32(000000FF,00493391,0049338A,?,00000000,?,00000000,004933B2,?,?,00000000,00496628,?,0049353C,00000000,00493590), ref: 00493384
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$AttributesCloseFirstNext
                                                                  • String ID: isRS-$isRS-???.tmp
                                                                  • API String ID: 134685335-3422211394
                                                                  • Opcode ID: 172fabb35fda56184fcc6afeec7ce7ac32534be04a4058a378d8e503f55c2e3a
                                                                  • Instruction ID: 5633c822496b3c15561250c09836fafcff3343a2b8121c6b265d8e662121e78b
                                                                  • Opcode Fuzzy Hash: 172fabb35fda56184fcc6afeec7ce7ac32534be04a4058a378d8e503f55c2e3a
                                                                  • Instruction Fuzzy Hash: 0C316671900618ABDF20EF66CC41ADEBBBCDB45315F5045B6AC08A32A1DA389F458E58
                                                                  APIs
                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004559D5
                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004559FC
                                                                  • SetForegroundWindow.USER32(?), ref: 00455A0D
                                                                  • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00455CE9,?,00000000,00455D25), ref: 00455CD4
                                                                  Strings
                                                                  • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00455B54
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                  • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                  • API String ID: 2236967946-3182603685
                                                                  • Opcode ID: dc18a0bd097e5dc125896746ab49c735efa94621b29c9650157d33084829803b
                                                                  • Instruction ID: 641f4334fd39536c62f33be4aad6c94b83d4d91879ac69f64f0a27da761a08b4
                                                                  • Opcode Fuzzy Hash: dc18a0bd097e5dc125896746ab49c735efa94621b29c9650157d33084829803b
                                                                  • Instruction Fuzzy Hash: 7691EF34604644EFD716CF65D961F6ABBF9EB48305F2180BAEC0897792C738AE04DB18
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00454A4C), ref: 00454948
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045494E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                  • API String ID: 1646373207-3712701948
                                                                  • Opcode ID: 940f1656f79e2746797ba2c7f144ff350c7923992133811c33095aeb5d01e7f1
                                                                  • Instruction ID: a35fddf5537fe1294da07d462b19703c1e2432f1509f9c3cfdc8e6ab53f23c8b
                                                                  • Opcode Fuzzy Hash: 940f1656f79e2746797ba2c7f144ff350c7923992133811c33095aeb5d01e7f1
                                                                  • Instruction Fuzzy Hash: 5F316271A44259AFCF01EFA5D8829EFB7B8EF89704F504566E800F7252D6785D088B68
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 00417C7F
                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Placement$Iconic
                                                                  • String ID: ,
                                                                  • API String ID: 568898626-3772416878
                                                                  • Opcode ID: 03031bbae82d4ebc83d5b44bdded535e8e858e0e74a82307596a1815367d6806
                                                                  • Instruction ID: c7e48a005123f112bfb3c773aae920d88014dc0855fb7fe4f04d55f6c4297c8c
                                                                  • Opcode Fuzzy Hash: 03031bbae82d4ebc83d5b44bdded535e8e858e0e74a82307596a1815367d6806
                                                                  • Instruction Fuzzy Hash: 92213E71604204ABCF00EF69D8C4ADA77B8AF48314F11456AFD18DF346D678E984CBA8
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001,00000000,004608A9), ref: 0046071D
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0046087C,?,00000001,00000000,004608A9), ref: 004607AC
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0046085E,?,00000000,?,00000000,0046087C,?,00000001,00000000,004608A9), ref: 0046083E
                                                                  • FindClose.KERNEL32(000000FF,00460865,0046085E,?,00000000,?,00000000,0046087C,?,00000001,00000000,004608A9), ref: 00460858
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseErrorFirstModeNext
                                                                  • String ID:
                                                                  • API String ID: 4011626565-0
                                                                  • Opcode ID: 9510b9faef03bde7981ffc1cbf9985c7220a2f823146c1e9c5838e7dce2b82fe
                                                                  • Instruction ID: 7619e791fa07d7eebd9624ba39f19b19d28f343f6bd3970fbebcfbc1750160fe
                                                                  • Opcode Fuzzy Hash: 9510b9faef03bde7981ffc1cbf9985c7220a2f823146c1e9c5838e7dce2b82fe
                                                                  • Instruction Fuzzy Hash: A941B774A006189FDB11EF65DC55ADFB7B8EB88705F4044BAF804A7342E63C9E488E59
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32(00000001,00000000,00460D4F), ref: 00460BDD
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00460D1A,?,00000001,00000000,00460D4F), ref: 00460C23
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00460CFC,?,00000000,?,00000000,00460D1A,?,00000001,00000000,00460D4F), ref: 00460CD8
                                                                  • FindClose.KERNEL32(000000FF,00460D03,00460CFC,?,00000000,?,00000000,00460D1A,?,00000001,00000000,00460D4F), ref: 00460CF6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseErrorFirstModeNext
                                                                  • String ID:
                                                                  • API String ID: 4011626565-0
                                                                  • Opcode ID: 7abd12056deb8ad1b7411797b3350813c5d50cedf8c2c8dfad8c15baec6e26d5
                                                                  • Instruction ID: edec818d45ba830d657fd50c6db7a10dbaddb2d902f4e62a2bc7916600c583f8
                                                                  • Opcode Fuzzy Hash: 7abd12056deb8ad1b7411797b3350813c5d50cedf8c2c8dfad8c15baec6e26d5
                                                                  • Instruction Fuzzy Hash: 8D417375A006189BCB10EFA5DC859DFB7B8EF88705F5045AAF804A7341E738AE448E59
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451C67,00000000,00451C88), ref: 0042E6C2
                                                                  • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E6ED
                                                                  • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451C67,00000000,00451C88), ref: 0042E6FA
                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451C67,00000000,00451C88), ref: 0042E702
                                                                  • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00451C67,00000000,00451C88), ref: 0042E708
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                  • String ID:
                                                                  • API String ID: 1177325624-0
                                                                  • Opcode ID: 91d336010cbf3d8894e3e09169d6c0f7ede2d497e3ffd38329e904f44c3651c2
                                                                  • Instruction ID: 53ccfbf0bf59ae6588beb9129f4ac6c5d938a4cdc4829e3b8b95457f0e8f2975
                                                                  • Opcode Fuzzy Hash: 91d336010cbf3d8894e3e09169d6c0f7ede2d497e3ffd38329e904f44c3651c2
                                                                  • Instruction Fuzzy Hash: 90F090713917243AF620B1BA6C87F7B418CC7C5B68F10823ABB04FF1C1D9A85D06566D
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 0047E96E
                                                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 0047E98C
                                                                  • ShowWindow.USER32(00000000,00000005,00000000,000000F0,00497038,0047E136,0047E16A,00000000,0047E18A,?,?,00000001,00497038), ref: 0047E9AE
                                                                  • ShowWindow.USER32(00000000,00000000,00000000,000000F0,00497038,0047E136,0047E16A,00000000,0047E18A,?,?,00000001,00497038), ref: 0047E9C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$IconicLong
                                                                  • String ID:
                                                                  • API String ID: 2754861897-0
                                                                  • Opcode ID: 043d2bb411354caa0c456dc48a8140a96cace7138bf2291d880c05a4ecf65b05
                                                                  • Instruction ID: eafc39e9becc41036e4ca24a6eaf2badf01027d7e99d1cfb18d85109fc6b26ac
                                                                  • Opcode Fuzzy Hash: 043d2bb411354caa0c456dc48a8140a96cace7138bf2291d880c05a4ecf65b05
                                                                  • Instruction Fuzzy Hash: BC0171F2204240AADB40A7778C46B9627995B19348F0446FBBA489B3F2CA2DDC89D75C
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0045F234), ref: 0045F1B8
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0045F214,?,00000000,?,00000000,0045F234), ref: 0045F1F4
                                                                  • FindClose.KERNEL32(000000FF,0045F21B,0045F214,?,00000000,?,00000000,0045F234), ref: 0045F20E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstNext
                                                                  • String ID:
                                                                  • API String ID: 3541575487-0
                                                                  • Opcode ID: 586132b0b211750728cbdbf98f41df38bf16c13d96c8b3be39bea33d0b1ede93
                                                                  • Instruction ID: c177f096a54f61cce93441c330e7815858ed8c84b8e73aa9a196f583aa084cd0
                                                                  • Opcode Fuzzy Hash: 586132b0b211750728cbdbf98f41df38bf16c13d96c8b3be39bea33d0b1ede93
                                                                  • Instruction Fuzzy Hash: 9F21F671504608AECB10DB65DC41ADEBBBCEB49704F5084F7FC08E32A2D6399E4DCA5A
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 00424154
                                                                  • SetActiveWindow.USER32(?,?,?,00468F56), ref: 00424161
                                                                    • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                                    • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021225AC,0042417A,?,?,?,00468F56), ref: 00423ABF
                                                                  • SetFocus.USER32(00000000,?,?,?,00468F56), ref: 0042418E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveFocusIconicShow
                                                                  • String ID:
                                                                  • API String ID: 649377781-0
                                                                  • Opcode ID: a65c021155f1c03a73d128d70588895e9b57b31c41d8e799492c0e92c8cf3974
                                                                  • Instruction ID: 4136aac35a779e4733478972a6ab5bc4469f39141bd8f2cff661810d574da02b
                                                                  • Opcode Fuzzy Hash: a65c021155f1c03a73d128d70588895e9b57b31c41d8e799492c0e92c8cf3974
                                                                  • Instruction Fuzzy Hash: 3EF03A717001208BDB40AFAA98C4B9633A8AF48304B55017BBD09EF34BCA7CDC5187A8
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 00417C7F
                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Placement$Iconic
                                                                  • String ID:
                                                                  • API String ID: 568898626-0
                                                                  • Opcode ID: df2f2a8c3b857432242d8d8123c1cfaf0c2dea3d56ff885e9ac627941bf6ed4b
                                                                  • Instruction ID: f0313cfea0d4087130c3a657ee055cc65a4736f61d4b278e94d42609036002a6
                                                                  • Opcode Fuzzy Hash: df2f2a8c3b857432242d8d8123c1cfaf0c2dea3d56ff885e9ac627941bf6ed4b
                                                                  • Instruction Fuzzy Hash: 31015A31204104ABDF10EE6A98C5EEA73A8AF44324F114166FD08CF342E638EC8086A8
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CaptureIconic
                                                                  • String ID:
                                                                  • API String ID: 2277910766-0
                                                                  • Opcode ID: af1c5b43412e2fcaa88ec6dbe6a8b705b794b180b560b7f19973f3177c796014
                                                                  • Instruction ID: 516534a0d685a41b5289b303ed97122a4deaa6af678778b669afb1f0a2bf06d6
                                                                  • Opcode Fuzzy Hash: af1c5b43412e2fcaa88ec6dbe6a8b705b794b180b560b7f19973f3177c796014
                                                                  • Instruction Fuzzy Hash: 80F04471B04602A7DB20E72EC8C5AA762F69F44394B54443FF415C7B96EA7CDCC48758
                                                                  APIs
                                                                  • IsIconic.USER32(?), ref: 0042410B
                                                                    • Part of subcall function 004239F4: EnumWindows.USER32(0042398C), ref: 00423A18
                                                                    • Part of subcall function 004239F4: GetWindow.USER32(?,00000003), ref: 00423A2D
                                                                    • Part of subcall function 004239F4: GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                                                    • Part of subcall function 004239F4: SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                                                  • SetActiveWindow.USER32(?,?,?,00423CE3,00000000,004240CC), ref: 0042411F
                                                                    • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                  • String ID:
                                                                  • API String ID: 2671590913-0
                                                                  • Opcode ID: 5c58d947887613df8a1a5b004a34a5df3c7671d93cde12ce2b76e9099da7ea36
                                                                  • Instruction ID: b8e4b42960b6b3797255afb6d30997fccd36cf0c86298b6f3b138aeb4614201e
                                                                  • Opcode Fuzzy Hash: 5c58d947887613df8a1a5b004a34a5df3c7671d93cde12ce2b76e9099da7ea36
                                                                  • Instruction Fuzzy Hash: 76E0E5A0300100C7EB00AFAAD8C9B9672A9BB48304F5501BABC08CF24BD6B8C8948724
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,00412745), ref: 00412733
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: d4e55210cf07738a517e22d4988152bb99c4c61b8d064cb1407e8ad5a00c8708
                                                                  • Instruction ID: 7676943622bfa1b87a175b7a8473920ed7b4936c8d574fb73453cf2521b2b913
                                                                  • Opcode Fuzzy Hash: d4e55210cf07738a517e22d4988152bb99c4c61b8d064cb1407e8ad5a00c8708
                                                                  • Instruction Fuzzy Hash: 5751D3356042059FC710DF5AD681A9BF3E5FF98304B3582ABE814C73A5D6B8AD92874C
                                                                  APIs
                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0047466A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: NtdllProc_Window
                                                                  • String ID:
                                                                  • API String ID: 4255912815-0
                                                                  • Opcode ID: 28dc23b23800ef1f8e944c7e4f63bbd5668637b7df82285debce20ae8f6128bf
                                                                  • Instruction ID: 45d1217c07d0316af599d6ba2297e32cae7e42cf6b11ce9a3f5dc5ae60aa5d8b
                                                                  • Opcode Fuzzy Hash: 28dc23b23800ef1f8e944c7e4f63bbd5668637b7df82285debce20ae8f6128bf
                                                                  • Instruction Fuzzy Hash: 2F415735604108EFCB10CF99C2809AAB7F5FB89310B25C992E948DB715D73CEE41DB54
                                                                  APIs
                                                                  • CoCreateInstance.OLE32(00494B14,00000000,00000001,00494B24,0049705C,00000000,0046A6B0,?,?,00000001,0049715C), ref: 0046A692
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstance
                                                                  • String ID:
                                                                  • API String ID: 542301482-0
                                                                  • Opcode ID: 2a660552262edd31ff5d5fc9f318d00e103859eac43464ac65b66698b9dd7cae
                                                                  • Instruction ID: c4608683c7318c8ac6f4315199cfec0a20b6d7f112700f43f6ecb7c1e9f58aec
                                                                  • Opcode Fuzzy Hash: 2a660552262edd31ff5d5fc9f318d00e103859eac43464ac65b66698b9dd7cae
                                                                  • Instruction Fuzzy Hash: E42100303187009FE721CF19EC86B06B7E5EB9A314F648177E8089A2A5E7789851CF5E
                                                                  APIs
                                                                  • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045BA7B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CryptFour
                                                                  • String ID:
                                                                  • API String ID: 2153018856-0
                                                                  • Opcode ID: 4f346a98cc88831264cd2124032434adf3cc0e033ed38f361bacdd6b0811f564
                                                                  • Instruction ID: 61cffff204aae194db39770809f152df25ce8d6a8d2ad72ceff09a7df0b0244f
                                                                  • Opcode Fuzzy Hash: 4f346a98cc88831264cd2124032434adf3cc0e033ed38f361bacdd6b0811f564
                                                                  • Instruction Fuzzy Hash: 23C092F201820CBFA6009B96ECC9CB7BB6CE6A96A47408526F708821119672AC1096B9
                                                                  APIs
                                                                  • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,00469CF3), ref: 0045BA8E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CryptFour
                                                                  • String ID:
                                                                  • API String ID: 2153018856-0
                                                                  • Opcode ID: 2fe21e2df50c4eb10528ed429992e02407ab6b88a57ceb0413aa46c228635ffb
                                                                  • Instruction ID: 7502cee4c87c1f740629c6f8d7cf668bf226a85633ce0fa418fe1039a2bf82e9
                                                                  • Opcode Fuzzy Hash: 2fe21e2df50c4eb10528ed429992e02407ab6b88a57ceb0413aa46c228635ffb
                                                                  • Instruction Fuzzy Hash: 9DA002F0B943007AFD305B615E0EF26252C97D1F41F2048A57305A90E085A46400963D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2902540826.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000001.00000002.2902516851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2902572714.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_10000000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                  • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                  • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                  • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2902540826.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000001.00000002.2902516851.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2902572714.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_10000000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                  • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                  • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                    • Part of subcall function 0044B144: GetVersionExA.KERNEL32(00000094), ref: 0044B161
                                                                  • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F2B5,00493D75), ref: 0044B1BF
                                                                  • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B1D7
                                                                  • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B1E9
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B1FB
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B20D
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B21F
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B231
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B243
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B255
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B267
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B279
                                                                  • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B28B
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B29D
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B2AF
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B2C1
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B2D3
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B2E5
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B2F7
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B309
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B31B
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B32D
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B33F
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B351
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B363
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B375
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B387
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B399
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B3AB
                                                                  • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B3BD
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B3CF
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B3E1
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B3F3
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B405
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B417
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B429
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B43B
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B44D
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B45F
                                                                  • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B471
                                                                  • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B483
                                                                  • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B495
                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B4A7
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B4B9
                                                                  • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B4CB
                                                                  • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B4DD
                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B4EF
                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B501
                                                                  • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B513
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoadVersion
                                                                  • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                  • API String ID: 1968650500-2910565190
                                                                  • Opcode ID: d7913233a9212312b157c999b7e4b85ca97687b31d7648bf52fda453b2fa86da
                                                                  • Instruction ID: 08ad650e451160eeff2e9a8798f972904cc626ec458b999fa3fe35c02a9039cb
                                                                  • Opcode Fuzzy Hash: d7913233a9212312b157c999b7e4b85ca97687b31d7648bf52fda453b2fa86da
                                                                  • Instruction Fuzzy Hash: AA91CFB0A40B50EFEF00EFF598C6A2636A8EB15B18B1545BBB444EF295D778C804CF59
                                                                  APIs
                                                                  • CreateMutexA.KERNEL32(00494AA4,00000001,00000000,00000000,00456A45,?,?,?,00000001,?,00456C5F,00000000,00456C75,?,00000000,00496628), ref: 0045675D
                                                                  • CreateFileMappingA.KERNEL32(000000FF,00494AA4,00000004,00000000,00002018,00000000), ref: 00456795
                                                                  • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,00456A1B,?,00494AA4,00000001,00000000,00000000,00456A45,?,?,?), ref: 004567BC
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568C9
                                                                  • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,00456A1B,?,00494AA4,00000001,00000000,00000000,00456A45), ref: 00456821
                                                                    • Part of subcall function 004521C4: GetLastError.KERNEL32(00000000,00452C35,00000005,00000000,00452C6A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00493575,00000000), ref: 004521C7
                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004568E0
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456919
                                                                  • GetLastError.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045692B
                                                                  • UnmapViewOfFile.KERNEL32(00000000,00456A22,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 004569FD
                                                                  • CloseHandle.KERNEL32(00000000,00456A22,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456A0C
                                                                  • CloseHandle.KERNEL32(00000000,00456A22,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456A15
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                                  • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp$_lE$ulE
                                                                  • API String ID: 4012871263-859896865
                                                                  • Opcode ID: 974b68a6b5560a5ad07791377e09aa7a55d158729e489fb9536c80890bbd4993
                                                                  • Instruction ID: 0bc5468dbf6c4b77da2dd734ecbb60747089e7e5c326fe29eb5729a3a51c4f10
                                                                  • Opcode Fuzzy Hash: 974b68a6b5560a5ad07791377e09aa7a55d158729e489fb9536c80890bbd4993
                                                                  • Instruction Fuzzy Hash: B4919270A002189FDB10EBA9C841B9EB7B4EB09305F51856BF904FB383D7789948CF69
                                                                  APIs
                                                                  • 73A1A570.USER32(00000000,?,0041A8B4,?), ref: 0041C9B0
                                                                  • 73A24C40.GDI32(?,00000000,?,0041A8B4,?), ref: 0041C9BC
                                                                  • 73A26180.GDI32(0041A8B4,?,00000001,00000001,00000000,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9E0
                                                                  • 73A24C00.GDI32(?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9F0
                                                                  • SelectObject.GDI32(0041CDAC,00000000), ref: 0041CA0B
                                                                  • FillRect.USER32(0041CDAC,?,?), ref: 0041CA46
                                                                  • SetTextColor.GDI32(0041CDAC,00000000), ref: 0041CA5B
                                                                  • SetBkColor.GDI32(0041CDAC,00000000), ref: 0041CA72
                                                                  • PatBlt.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00FF0062), ref: 0041CA88
                                                                  • 73A24C40.GDI32(?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4), ref: 0041CA9B
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041CACC
                                                                  • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4), ref: 0041CAE4
                                                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?), ref: 0041CAED
                                                                  • 73A18830.GDI32(0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CAFC
                                                                  • 73A122A0.GDI32(0041CDAC,0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CB05
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041CB1E
                                                                  • SetBkColor.GDI32(00000000,00000000), ref: 0041CB35
                                                                  • 73A24D40.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CB7A,?,?,00000000), ref: 0041CB51
                                                                  • SelectObject.GDI32(00000000,?), ref: 0041CB5E
                                                                  • DeleteDC.GDI32(00000000), ref: 0041CB74
                                                                    • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                                  • String ID:
                                                                  • API String ID: 1381628555-0
                                                                  • Opcode ID: 5ce4730595b9121447a1872f173f20d10d25d53d997ed037483a86544c508abe
                                                                  • Instruction ID: 7128b10ae0d2f5501f58bad1f60f679124a592cf14607d549707b49f1954e982
                                                                  • Opcode Fuzzy Hash: 5ce4730595b9121447a1872f173f20d10d25d53d997ed037483a86544c508abe
                                                                  • Instruction Fuzzy Hash: 5961FC71A44609ABDF10EBE5DC86FAFB7B8EF48704F10446AF504E7281C67CA9418B69
                                                                  APIs
                                                                  • AllocateAndInitializeSid.ADVAPI32(00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DEF6
                                                                  • GetVersion.KERNEL32(00000000,0042E0A0,?,00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF13
                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E0A0,?,00494788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF2C
                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DF32
                                                                  • FreeSid.ADVAPI32(00000000,0042E0A7,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E09A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressAllocateFreeHandleInitializeModuleProcVersion
                                                                  • String ID: CheckTokenMembership$advapi32.dll
                                                                  • API String ID: 1717332306-1888249752
                                                                  • Opcode ID: 8969c824a6f45c363618cdff1c6be5cb78a1f9e32b4a9d86b8a6758cee11ddf9
                                                                  • Instruction ID: 5045d4bdae095839e21654112f0de3b8f2816e6eca6f617d5415efb28b53f152
                                                                  • Opcode Fuzzy Hash: 8969c824a6f45c363618cdff1c6be5cb78a1f9e32b4a9d86b8a6758cee11ddf9
                                                                  • Instruction Fuzzy Hash: 6151C571B44629AEDB10EAE69C42F7F77ECEB09304F94447BB500F7282C5BC9806866D
                                                                  APIs
                                                                  • ShowWindow.USER32(?,00000005,00000000,00493938,?,?,00000000,?,00000000,00000000,?,00493CC4,00000000,00493CCE,?,00000000), ref: 00493623
                                                                  • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00493938,?,?,00000000,?,00000000,00000000,?,00493CC4,00000000), ref: 00493636
                                                                  • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00493938,?,?,00000000,?,00000000,00000000), ref: 00493646
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00493667
                                                                  • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00493938,?,?,00000000,?,00000000), ref: 00493677
                                                                    • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00492F94,00000000,0049315D,?,?,00000005), ref: 0042D35D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                  • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                  • API String ID: 2000705611-3672972446
                                                                  • Opcode ID: 27d943dc3ec51cb297f2457e7ad71318564f22296d6f0832dbcd1283a32e83c1
                                                                  • Instruction ID: 069f63a9bc373b1237d23f91b9d25b4e36a8de1e840b7ae5a548d8600e8c9c0e
                                                                  • Opcode Fuzzy Hash: 27d943dc3ec51cb297f2457e7ad71318564f22296d6f0832dbcd1283a32e83c1
                                                                  • Instruction Fuzzy Hash: BB91C470A04244AFDF11EFA5C856BAEBFE4EB4A305F5144B6F400AB791C67C9E05CB19
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,004591D6,?,?,?,?,?,00000006,?,00000000,004929D3,?,00000000,00492A76), ref: 00459088
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: .chm$.chw$.fts$.gid$.hlp$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                  • API String ID: 1452528299-1593206319
                                                                  • Opcode ID: 4ca83c0c131cf7631de4174a92c74c5e1a58bd2534c8902a63655a9bf246fc88
                                                                  • Instruction ID: 0864155d01f34d7a91bcdf7f64c5104b46c5be8f648494af20f32c457a803b59
                                                                  • Opcode Fuzzy Hash: 4ca83c0c131cf7631de4174a92c74c5e1a58bd2534c8902a63655a9bf246fc88
                                                                  • Instruction Fuzzy Hash: E261D330B04255ABDB00EB69C8867AE77A5AF49719F90446BFC01EB383CB7C8D09C759
                                                                  APIs
                                                                  • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B333
                                                                  • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B33D
                                                                  • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B34F
                                                                  • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B366
                                                                  • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B372
                                                                  • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B39F
                                                                  • 73A1A480.USER32(00000000,00000000,0041B3D2,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3C5
                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B437
                                                                  • DeleteDC.GDI32(00000000), ref: 0041B440
                                                                  • DeleteDC.GDI32(?), ref: 0041B449
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                                  • String ID:
                                                                  • API String ID: 359944910-0
                                                                  • Opcode ID: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                                                  • Instruction ID: ef99a8f9a6f00624a9096b2aeeb37702e3b70ceb3a8cbf3cb68c8f3869cb2bd7
                                                                  • Opcode Fuzzy Hash: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                                                  • Instruction Fuzzy Hash: 1541D071E40619AFDF10DAE9D846FEFB7BCEF08704F104466B614FB281C67869408BA4
                                                                  APIs
                                                                    • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0046EF4F
                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046F046
                                                                  • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0046F05C
                                                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046F081
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                  • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                  • API String ID: 971782779-3668018701
                                                                  • Opcode ID: 529f7920ae01150bcd069fa40545394316d482a1096c5141e0bd5aef7471e155
                                                                  • Instruction ID: d95914f94fb186a895dd9bd55fd1341a8d835b278728754eb2ac591f97b8fe2a
                                                                  • Opcode Fuzzy Hash: 529f7920ae01150bcd069fa40545394316d482a1096c5141e0bd5aef7471e155
                                                                  • Instruction Fuzzy Hash: F0D13374A00249AFDB01DF95D882FDEBBF5AF08314F54506AF800B7392D678AE45CB69
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegQueryValueExA.ADVAPI32(0045939E,00000000,00000000,?,00000000,?,00000000,004536F1,?,0045939E,00000003,00000000,00000000,00453728), ref: 00453571
                                                                    • Part of subcall function 0042E634: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451F9B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E653
                                                                  • RegQueryValueExA.ADVAPI32(0045939E,00000000,00000000,00000000,?,00000004,00000000,0045363B,?,0045939E,00000000,00000000,?,00000000,?,00000000), ref: 004535F5
                                                                  • RegQueryValueExA.ADVAPI32(0045939E,00000000,00000000,00000000,?,00000004,00000000,0045363B,?,0045939E,00000000,00000000,?,00000000,?,00000000), ref: 00453624
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045348F
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004534C8
                                                                  • RegOpenKeyEx, xrefs: 004534F4
                                                                  • , xrefs: 004534E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue$FormatMessageOpen
                                                                  • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                  • API String ID: 2812809588-1577016196
                                                                  • Opcode ID: 0577be5c125f2955c6b4f9a8eb6fc0b50c24027f5aaff3dd9bd3d331dc1cfd74
                                                                  • Instruction ID: 5d87de93f9ec1944e446a630c4641d8f8463ec551cc6aa6a09b197ee9e23b8d1
                                                                  • Opcode Fuzzy Hash: 0577be5c125f2955c6b4f9a8eb6fc0b50c24027f5aaff3dd9bd3d331dc1cfd74
                                                                  • Instruction Fuzzy Hash: 10910275E04248BBDB11DF95C942BDEB7F9EB08346F50406BF900F7382D6789A098B69
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(?), ref: 00457397
                                                                  • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 004573B3
                                                                  • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 004573C1
                                                                  • GetExitCodeProcess.KERNEL32(?), ref: 004573D2
                                                                  • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00457419
                                                                  • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00457435
                                                                  Strings
                                                                  • Helper process exited, but failed to get exit code., xrefs: 0045740B
                                                                  • Helper process exited with failure code: 0x%x, xrefs: 004573FF
                                                                  • Stopping 64-bit helper process. (PID: %u), xrefs: 00457389
                                                                  • Helper isn't responding; killing it., xrefs: 004573A3
                                                                  • Helper process exited., xrefs: 004573E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                  • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                  • API String ID: 3355656108-1243109208
                                                                  • Opcode ID: c622efa3c7eab7cccda726d3a4b9de256e6627cd4402bb3f218a784690392fa4
                                                                  • Instruction ID: 51b9fef4e3630302d875d0b33b843881230cc4703e5d54bf9f75f6b4352a6378
                                                                  • Opcode Fuzzy Hash: c622efa3c7eab7cccda726d3a4b9de256e6627cd4402bb3f218a784690392fa4
                                                                  • Instruction Fuzzy Hash: 3C216A706087409AC720EB79D44175BBBD4AF09305F40C93FB99ACB683D778E848DB6A
                                                                  APIs
                                                                    • Part of subcall function 0042DC1C: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC48
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004532E3,?,00000000,004533A7), ref: 00453233
                                                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004532E3,?,00000000,004533A7), ref: 0045336F
                                                                    • Part of subcall function 0042E634: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00451F9B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E653
                                                                  Strings
                                                                  • , xrefs: 00453195
                                                                  • RegCreateKeyEx, xrefs: 004531A7
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045317B
                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045314B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateFormatMessageQueryValue
                                                                  • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                  • API String ID: 2481121983-1280779767
                                                                  • Opcode ID: c5db3acd86c8ed43af1b2e086ff8c3ee11ed8bea7a7bdb3acdd93afa95ba8e83
                                                                  • Instruction ID: f9a2ef16c2c3133b80d09f89e5e1cd3a5cf59ff53075ba998d39aa5346fe0c71
                                                                  • Opcode Fuzzy Hash: c5db3acd86c8ed43af1b2e086ff8c3ee11ed8bea7a7bdb3acdd93afa95ba8e83
                                                                  • Instruction Fuzzy Hash: DA813175A00209AFDB01DFD5C941BEEB7B9EB08345F50446AF901F7282D778AB09CB69
                                                                  APIs
                                                                    • Part of subcall function 004525E4: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00491F89,_iu,?,00000000,0045271E), ref: 004526D3
                                                                    • Part of subcall function 004525E4: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00491F89,_iu,?,00000000,0045271E), ref: 004526E3
                                                                  • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00491E35
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00491F89), ref: 00491E56
                                                                  • CreateWindowExA.USER32(00000000,STATIC,00491F98,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00491E7D
                                                                  • SetWindowLongA.USER32(?,000000FC,00491610), ref: 00491E90
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491F5C,?,?,000000FC,00491610,00000000,STATIC,00491F98), ref: 00491EC0
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00491F34
                                                                  • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491F5C,?,?,000000FC,00491610,00000000), ref: 00491F40
                                                                    • Part of subcall function 00452934: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00452A1B
                                                                  • 73A25CF0.USER32(?,00491F63,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00491F5C,?,?,000000FC,00491610,00000000,STATIC), ref: 00491F56
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                  • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                  • API String ID: 170458502-2312673372
                                                                  • Opcode ID: 28938b429154b767fb1c0e4a0d7d78f9b510867f89cad3db97fbf0b3b28c7270
                                                                  • Instruction ID: 1fa6f6feea9b25d2971888e3dd47e4ddd1b06d8a9d4bfeca80800dbaaf4e61e0
                                                                  • Opcode Fuzzy Hash: 28938b429154b767fb1c0e4a0d7d78f9b510867f89cad3db97fbf0b3b28c7270
                                                                  • Instruction Fuzzy Hash: 62413070A04209AEDF00EBA5DC42F9E7BB8EB09714F51457AF510F7292D7799E048B68
                                                                  APIs
                                                                  • GetActiveWindow.USER32 ref: 0042ECF8
                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042ED0C
                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042ED19
                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042ED26
                                                                  • GetWindowRect.USER32(?,00000000), ref: 0042ED72
                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042EDB0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                  • API String ID: 2610873146-3407710046
                                                                  • Opcode ID: fe613c2731d00d0cd16ca02d104e5a609af7fb0ddab17ae87087b7d45de0b7ce
                                                                  • Instruction ID: 863a55e862d9e6b04a8261c5a8ec9b0d3da2fb9689b09071f949f11a5ed4b6db
                                                                  • Opcode Fuzzy Hash: fe613c2731d00d0cd16ca02d104e5a609af7fb0ddab17ae87087b7d45de0b7ce
                                                                  • Instruction Fuzzy Hash: 1821F2723006116BD300966ADC81F7B3698DB94714F49062EF984DB3C1EA78EC008A99
                                                                  APIs
                                                                  • GetActiveWindow.USER32 ref: 0045F40C
                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0045F420
                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0045F42D
                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0045F43A
                                                                  • GetWindowRect.USER32(?,00000000), ref: 0045F486
                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 0045F4C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                  • API String ID: 2610873146-3407710046
                                                                  • Opcode ID: 3f3f9c0362815f508f114d1d1e8dfbefa52bddc243e473b6c784f83b642c9795
                                                                  • Instruction ID: 96173372f89cf5f13818fd2272458ee8ea05114f38bc457241c4665ef26b7844
                                                                  • Opcode Fuzzy Hash: 3f3f9c0362815f508f114d1d1e8dfbefa52bddc243e473b6c784f83b642c9795
                                                                  • Instruction Fuzzy Hash: 702192766016046BD310DA688C81F3B3799DB95721F19463EFD48DB382EA78DC0C8A5A
                                                                  APIs
                                                                  • SysFreeString.OLEAUT32(?), ref: 00454F89
                                                                  • CoCreateInstance.OLE32(00494A58,00000000,00000001,00494774,?,00000000,00455084), ref: 00454DFA
                                                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                  • CoCreateInstance.OLE32(00494764,00000000,00000001,00494774,?,00000000,00455084), ref: 00454E20
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CreateInstanceString$AllocByteCharFreeMultiWide
                                                                  • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue$IShellLink::QueryInterface
                                                                  • API String ID: 2125489766-2052886881
                                                                  • Opcode ID: cad9f70ec55d6396ec91b922acc9c762cb42afdf484e64a9565cfa992f2d80ff
                                                                  • Instruction ID: cca295efe9e316360f18d1487a7fffb56923434bd9eaf823bd695e8cfda601ee
                                                                  • Opcode Fuzzy Hash: cad9f70ec55d6396ec91b922acc9c762cb42afdf484e64a9565cfa992f2d80ff
                                                                  • Instruction Fuzzy Hash: FA917F71A00104AFDB50DFA9C885FAE77F8AF49706F104066F904EB292DB78DD49CB69
                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00457717,?,00000000,0045777A,?,?,02123858,00000000), ref: 00457595
                                                                  • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004576AC,?,00000000,00000001,00000000,00000000,00000000,00457717), ref: 004575F2
                                                                  • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004576AC,?,00000000,00000001,00000000,00000000,00000000,00457717), ref: 004575FF
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0045764B
                                                                  • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00457685,?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004576AC,?,00000000), ref: 00457671
                                                                  • GetLastError.KERNEL32(?,?,00000000,00000001,00457685,?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,004576AC,?,00000000), ref: 00457678
                                                                    • Part of subcall function 004521C4: GetLastError.KERNEL32(00000000,00452C35,00000005,00000000,00452C6A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00493575,00000000), ref: 004521C7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                  • String ID: CreateEvent$TransactNamedPipe
                                                                  • API String ID: 2182916169-3012584893
                                                                  • Opcode ID: 82633f1e13542bc09f8a62cac19a1d02bf7d9946d73281c4075d0679b7a6bff7
                                                                  • Instruction ID: 74bf62d718516431411c8cfcdac6262dd27c802055fb12708190a6f8294e92f4
                                                                  • Opcode Fuzzy Hash: 82633f1e13542bc09f8a62cac19a1d02bf7d9946d73281c4075d0679b7a6bff7
                                                                  • Instruction Fuzzy Hash: DC419E74A04608AFDB15DFA9D981F9EB7F9EB08714F1040B6F904E7282D6789E44CA68
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,004553BD,?,?,00000031,?), ref: 00455280
                                                                  • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00455286
                                                                  • LoadTypeLib.OLEAUT32(00000000,?), ref: 004552D3
                                                                    • Part of subcall function 004521C4: GetLastError.KERNEL32(00000000,00452C35,00000005,00000000,00452C6A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00493575,00000000), ref: 004521C7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                  • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                  • API String ID: 1914119943-2711329623
                                                                  • Opcode ID: d841f29eb096205a0f3416c9d951142dcd1957d51abb7032768e202f30d78586
                                                                  • Instruction ID: 6df54f243d02ef1e0602510236a9b3221d9f23a1e2cb2880605133cdd6ce2c52
                                                                  • Opcode Fuzzy Hash: d841f29eb096205a0f3416c9d951142dcd1957d51abb7032768e202f30d78586
                                                                  • Instruction Fuzzy Hash: E431B271A00E04AFC700EFAACC61E6FB7B9EB8974571184A6FD04D7252DA78DD44CB28
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E33D,?,?,00000001,00000000,?,?,00000001,00000000,00000002,00000000,0047C645), ref: 0042E261
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E267
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E33D,?,?,00000001,00000000,?,?,00000001), ref: 0042E2B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCloseHandleModuleProc
                                                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                  • API String ID: 4190037839-2401316094
                                                                  • Opcode ID: ffac53d26eb6cbf5b0ada881a774ac81498bfeb0793634945fc8492fe776f38d
                                                                  • Instruction ID: 44979bf40cca6e0e4165a5df68b7b04978596e6ab031f823bf96e39524dcb0bd
                                                                  • Opcode Fuzzy Hash: ffac53d26eb6cbf5b0ada881a774ac81498bfeb0793634945fc8492fe776f38d
                                                                  • Instruction Fuzzy Hash: 3D212430B00229EBDB00EAA7DC51B9E77A9EB45315F90447BA901E7281D77C9E05DB5C
                                                                  APIs
                                                                  • RectVisible.GDI32(?,?), ref: 00416D83
                                                                  • SaveDC.GDI32(?), ref: 00416D97
                                                                  • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416DBA
                                                                  • RestoreDC.GDI32(?,?), ref: 00416DD5
                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416E55
                                                                  • FrameRect.USER32(?,?,?), ref: 00416E88
                                                                  • DeleteObject.GDI32(?), ref: 00416E92
                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416EA2
                                                                  • FrameRect.USER32(?,?,?), ref: 00416ED5
                                                                  • DeleteObject.GDI32(?), ref: 00416EDF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                  • String ID:
                                                                  • API String ID: 375863564-0
                                                                  • Opcode ID: 6ab49abbd5e11e256a83ad2b74ff4d94dcb102c44cd1f9c9ecdb67f051fd6bb7
                                                                  • Instruction ID: 01d81588b69ff1f480347e903aed9c185fc6c29f227380d1fa6610f1b9ad60dd
                                                                  • Opcode Fuzzy Hash: 6ab49abbd5e11e256a83ad2b74ff4d94dcb102c44cd1f9c9ecdb67f051fd6bb7
                                                                  • Instruction Fuzzy Hash: A8513C712086449BDB50EF69C8C0B9B77E8EF48314F15566AFD48CB286C738EC81CB99
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                  • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                  • String ID:
                                                                  • API String ID: 1694776339-0
                                                                  • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                  • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                  • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                  • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                  APIs
                                                                  • GetSystemMenu.USER32(00000000,00000000), ref: 004221A3
                                                                  • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004221C1
                                                                  • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221CE
                                                                  • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221DB
                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221E8
                                                                  • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004221F5
                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422202
                                                                  • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042220F
                                                                  • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0042222D
                                                                  • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422249
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Delete$EnableItem$System
                                                                  • String ID:
                                                                  • API String ID: 3985193851-0
                                                                  • Opcode ID: ef763d989a1d1634d7dfecb47c710b46c86fa523770bbd2ad5a3045f81e0a70b
                                                                  • Instruction ID: e98f5eede000e984507cfb68b46ad6efe0a5c83d9602cc3651cf502f29ecaa29
                                                                  • Opcode Fuzzy Hash: ef763d989a1d1634d7dfecb47c710b46c86fa523770bbd2ad5a3045f81e0a70b
                                                                  • Instruction Fuzzy Hash: 23213370380744BAE720D725DD8BF9B7BD89B04708F0444A5BA487F2D7C6F9AE40869C
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(10000000), ref: 0047CCF8
                                                                  • FreeLibrary.KERNEL32(023D0000), ref: 0047CD0C
                                                                  • SendNotifyMessageA.USER32(0002041C,00000496,00002710,00000000), ref: 0047CD7E
                                                                  Strings
                                                                  • GetCustomSetupExitCode, xrefs: 0047CBAD
                                                                  • Deinitializing Setup., xrefs: 0047CB6E
                                                                  • DeinitializeSetup, xrefs: 0047CC09
                                                                  • Restarting Windows., xrefs: 0047CD59
                                                                  • Not restarting Windows because Setup is being run from the debugger., xrefs: 0047CD2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary$MessageNotifySend
                                                                  • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                  • API String ID: 3817813901-1884538726
                                                                  • Opcode ID: 24df48e3a3fbb3e864b6ef9579e69475a6d95d0ccf73b4895a86131a6b1f0127
                                                                  • Instruction ID: a4d14918c0218baa3209ba6b579eb1121db39f64bcd9a3eed85f8b0f3568493a
                                                                  • Opcode Fuzzy Hash: 24df48e3a3fbb3e864b6ef9579e69475a6d95d0ccf73b4895a86131a6b1f0127
                                                                  • Instruction Fuzzy Hash: 5451BB306182009FD721EB79DC86B9A7BE4EB19714F20C47BEC08973A1DB389844CB1D
                                                                  APIs
                                                                    • Part of subcall function 00457C80: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00457DB2,00000000,00457EFF,?,00000000,00000000,00000000), ref: 00457CCD
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00457EFF,?,00000000,00000000,00000000), ref: 00457E0E
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00457EFF,?,00000000,00000000,00000000), ref: 00457E74
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  Strings
                                                                  • .NET Framework not found, xrefs: 00457EC2
                                                                  • v2.0.50727, xrefs: 00457E00
                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00457E28
                                                                  • .NET Framework version %s not found, xrefs: 00457EAE
                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00457DC2
                                                                  • v1.1.4322, xrefs: 00457E66
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Close$Open
                                                                  • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$v1.1.4322$v2.0.50727
                                                                  • API String ID: 2976201327-1070292914
                                                                  • Opcode ID: 1cc56b239fdeaedb2d1580aa1e236bae9e7dbefe451ece1d529d4f9f4840087b
                                                                  • Instruction ID: a7080551ad088c2b423479524e70766616a95c19d9bf76f9f53dc3544d02a1df
                                                                  • Opcode Fuzzy Hash: 1cc56b239fdeaedb2d1580aa1e236bae9e7dbefe451ece1d529d4f9f4840087b
                                                                  • Instruction Fuzzy Hash: 6541FB34A082455FCB00DF65E852BDE7BB5EB45305F5544BBE400DB282D7399A0ECB58
                                                                  APIs
                                                                    • Part of subcall function 004738B4: GetWindowThreadProcessId.USER32(00000000), ref: 004738BC
                                                                    • Part of subcall function 004738B4: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004739B3,8pI,00000000), ref: 004738CF
                                                                    • Part of subcall function 004738B4: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 004738D5
                                                                  • SendMessageA.USER32(00000000,0000004A,00000000,F=G), ref: 004739C1
                                                                  • GetTickCount.KERNEL32 ref: 00473A06
                                                                  • GetTickCount.KERNEL32 ref: 00473A10
                                                                  • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00473A65
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                  • String ID: 8pI$CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d$F=G
                                                                  • API String ID: 613034392-3008138361
                                                                  • Opcode ID: 8ee80246c502ebe2d217147552e4321fa44327553599dbd5040285cc7266feb8
                                                                  • Instruction ID: a5a746e970c0969c9dd2d84057cde5d1f5128fdc73edff5516e37bd3d8525890
                                                                  • Opcode Fuzzy Hash: 8ee80246c502ebe2d217147552e4321fa44327553599dbd5040285cc7266feb8
                                                                  • Instruction Fuzzy Hash: BD31A274B002159ADB10EFB988877EEB6A49F04705F50843BF188FB382D67D9E01979D
                                                                  APIs
                                                                  • SHGetMalloc.SHELL32(?), ref: 0045E16B
                                                                  • GetActiveWindow.USER32 ref: 0045E1CF
                                                                  • CoInitialize.OLE32(00000000), ref: 0045E1E3
                                                                  • SHBrowseForFolder.SHELL32(?), ref: 0045E1FA
                                                                  • CoUninitialize.OLE32(0045E23B,00000000,?,?,?,?,?,00000000,0045E2BF), ref: 0045E20F
                                                                  • SetActiveWindow.USER32(?,0045E23B,00000000,?,?,?,?,?,00000000,0045E2BF), ref: 0045E225
                                                                  • SetActiveWindow.USER32(?,?,0045E23B,00000000,?,?,?,?,?,00000000,0045E2BF), ref: 0045E22E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                  • String ID: A
                                                                  • API String ID: 2684663990-3554254475
                                                                  • Opcode ID: 17d7348a5de289b0dead946994b069c8017cc8ca8e543aece7dc191273ce19ba
                                                                  • Instruction ID: efbc9e586ece9eef5370bbcd722c8b65d602126f4e949b0fde047d6aec855b50
                                                                  • Opcode Fuzzy Hash: 17d7348a5de289b0dead946994b069c8017cc8ca8e543aece7dc191273ce19ba
                                                                  • Instruction Fuzzy Hash: DD313E70E00218AFDB04EFA6D886A9EBBF8EB09704F51447AF804E7252D7785A44CF59
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000000E), ref: 00418BE0
                                                                  • GetSystemMetrics.USER32(0000000D), ref: 00418BE8
                                                                  • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418BEE
                                                                    • Part of subcall function 00409920: 6F52C400.COMCTL32((fI,000000FF,00000000,00418C1C,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00409924
                                                                  • 6F59CB00.COMCTL32((fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C3E
                                                                  • 6F59C740.COMCTL32(00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418C49
                                                                  • 6F59CB00.COMCTL32((fI,00000001,?,?,00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000), ref: 00418C5C
                                                                  • 6F530860.COMCTL32((fI,00418C7F,?,00000000,?,(fI,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E), ref: 00418C72
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$C400C740F530860F532980
                                                                  • String ID: (fI
                                                                  • API String ID: 209721339-4122540895
                                                                  • Opcode ID: 65e0913070e1a46d1e4049ee6121461fcfbb365fe4eb4b9520eb625876ba3720
                                                                  • Instruction ID: ebdf7d90a3a22d50ab8fd643d9f8c48181b88e499e337cf830e96f2c39c8652b
                                                                  • Opcode Fuzzy Hash: 65e0913070e1a46d1e4049ee6121461fcfbb365fe4eb4b9520eb625876ba3720
                                                                  • Instruction Fuzzy Hash: 19113675744204BADB50EBF5DC82F5E77B8DB48704F50406AB604E72D2E6799D408768
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(023D0000,inflateInit_), ref: 0045BAF1
                                                                  • GetProcAddress.KERNEL32(023D0000,inflate), ref: 0045BB01
                                                                  • GetProcAddress.KERNEL32(023D0000,inflateEnd), ref: 0045BB11
                                                                  • GetProcAddress.KERNEL32(023D0000,inflateReset), ref: 0045BB21
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                  • API String ID: 190572456-3516654456
                                                                  • Opcode ID: 131badbbba323afb4533588c2264d8d0fdc163024531a8c12f541a788bca7b37
                                                                  • Instruction ID: 9385be58336e67af4b7d81d08276a4406f5930c71283b962e18427fa23d56c25
                                                                  • Opcode Fuzzy Hash: 131badbbba323afb4533588c2264d8d0fdc163024531a8c12f541a788bca7b37
                                                                  • Instruction Fuzzy Hash: 98018FB1914700DEEB24DF32AC81B233696E368316F14C43BA908566ABD7BC154DCF9C
                                                                  APIs
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041A929
                                                                  • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041A963
                                                                  • SetBkColor.GDI32(?,?), ref: 0041A978
                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041A9C2
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041A9CD
                                                                  • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041A9DD
                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AA1C
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AA26
                                                                  • SetBkColor.GDI32(00000000,?), ref: 0041AA33
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Color$StretchText
                                                                  • String ID:
                                                                  • API String ID: 2984075790-0
                                                                  • Opcode ID: 2a71b0a0a2b9dc45dabe6500bf7ea0e2082f1bf18c933a91daaa413ec303015b
                                                                  • Instruction ID: 69ae49bf6c4e82acacdff2fe07525d2a8d99776db7c40e28fbb8516f53671917
                                                                  • Opcode Fuzzy Hash: 2a71b0a0a2b9dc45dabe6500bf7ea0e2082f1bf18c933a91daaa413ec303015b
                                                                  • Instruction Fuzzy Hash: B461D6B5A00505EFCB40EFA9D985E9AB7F8EF48314B14816AF518DB252C734ED41CF58
                                                                  APIs
                                                                    • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00456640,?, /s ",?,regsvr32.exe",?,00456640), ref: 004565B2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseDirectoryHandleSystem
                                                                  • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                  • API String ID: 2051275411-1862435767
                                                                  • Opcode ID: 8fe4098f072b01508a2dae6be17a7e934180b2d95f083cfdf5f2cf566c0ea0e2
                                                                  • Instruction ID: 52aef77ad583d0b614e6b59c501e8ae0a7a50fb5039906ee3f49a51f08d687bb
                                                                  • Opcode Fuzzy Hash: 8fe4098f072b01508a2dae6be17a7e934180b2d95f083cfdf5f2cf566c0ea0e2
                                                                  • Instruction Fuzzy Hash: A9412870A003486BDB10EFD5D841B8DB7F9AF45305F91407BA904BB296D7789A098B19
                                                                  APIs
                                                                  • OffsetRect.USER32(?,00000001,00000001), ref: 0044CCE9
                                                                  • GetSysColor.USER32(00000014), ref: 0044CCF0
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044CD08
                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CD31
                                                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044CD3B
                                                                  • GetSysColor.USER32(00000010), ref: 0044CD42
                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044CD5A
                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CD83
                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044CDAE
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Text$Color$Draw$OffsetRect
                                                                  • String ID:
                                                                  • API String ID: 1005981011-0
                                                                  • Opcode ID: 05433eeb21f7eade2ad8fd780ee4a3c9ffb71d8696478e3b6365215710ea7c5d
                                                                  • Instruction ID: 55e274db1b9bafabb3ce5fe040df84b1e5030e62ce747351cd8478152fc2054d
                                                                  • Opcode Fuzzy Hash: 05433eeb21f7eade2ad8fd780ee4a3c9ffb71d8696478e3b6365215710ea7c5d
                                                                  • Instruction Fuzzy Hash: DF21CFB42015007FC710FB2ACD8AE8B7BECDF19319B05857AB958EB393C678DD408669
                                                                  APIs
                                                                    • Part of subcall function 00450194: SetEndOfFile.KERNEL32(?,?,0045AB76,00000000,0045AD01,?,00000000,00000002,00000002), ref: 0045019B
                                                                    • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,004938C1,00000000,00493916,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 004916ED
                                                                  • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00491701
                                                                  • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 0049171B
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00491727
                                                                  • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 0049172D
                                                                  • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00491740
                                                                  Strings
                                                                  • Deleting Uninstall data files., xrefs: 00491663
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                  • String ID: Deleting Uninstall data files.
                                                                  • API String ID: 1570157960-2568741658
                                                                  • Opcode ID: 79e0f6f07ce9797d0280cf604a4eab7190ee0c45943d47177282953db41bdb4e
                                                                  • Instruction ID: 98e26087738e558cfd95a453ea0d3de37a203fc09e9b81159c464f1ea26851f6
                                                                  • Opcode Fuzzy Hash: 79e0f6f07ce9797d0280cf604a4eab7190ee0c45943d47177282953db41bdb4e
                                                                  • Instruction Fuzzy Hash: 72215070758201AAEB10A7B5EC86B273BACD755318F51047BB5009A2E3D5785C44DB2D
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046C715,?,?,?,?,00000000), ref: 0046C67F
                                                                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046C715), ref: 0046C696
                                                                  • AddFontResourceA.GDI32(00000000), ref: 0046C6B3
                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0046C6C7
                                                                  Strings
                                                                  • Failed to open Fonts registry key., xrefs: 0046C69D
                                                                  • AddFontResource, xrefs: 0046C6D1
                                                                  • Failed to set value in Fonts registry key., xrefs: 0046C688
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                  • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                  • API String ID: 955540645-649663873
                                                                  • Opcode ID: 4a5bc799ae3d4c9066e0aef8c5d10aa75db323fdc00f2ff4c954b2191ebeb607
                                                                  • Instruction ID: 2f2198b0230ca9042f6283156b13f90ea2ab76d772d2ec21c0c1f667ac3d8f50
                                                                  • Opcode Fuzzy Hash: 4a5bc799ae3d4c9066e0aef8c5d10aa75db323fdc00f2ff4c954b2191ebeb607
                                                                  • Instruction Fuzzy Hash: DD21C4707402057AE710EAA68C82F7A73ADDB45709F104037B940FB3C2EA7C9D06962E
                                                                  APIs
                                                                    • Part of subcall function 00416380: GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                                                    • Part of subcall function 00416380: UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                                                    • Part of subcall function 00416380: RegisterClassA.USER32(?), ref: 0041643E
                                                                  • GetVersion.KERNEL32 ref: 0045F870
                                                                  • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0045F8AE
                                                                  • SHGetFileInfo.SHELL32(0045F94C,00000000,?,00000160,00004011), ref: 0045F8CB
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0045F8E9
                                                                  • SetCursor.USER32(00000000,00000000,00007F02,0045F94C,00000000,?,00000160,00004011), ref: 0045F8EF
                                                                  • SetCursor.USER32(?,0045F92F,00007F02,0045F94C,00000000,?,00000160,00004011), ref: 0045F922
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                  • String ID: Explorer
                                                                  • API String ID: 2594429197-512347832
                                                                  • Opcode ID: 1bbb4912840947177faf2f689e6f3e77832cba3255e01617ebec8df7a2ac1a51
                                                                  • Instruction ID: bec1cba5f3dfdb0e8112d5750da6ec0fcf7430c77da03b8fadd74fef556e5570
                                                                  • Opcode Fuzzy Hash: 1bbb4912840947177faf2f689e6f3e77832cba3255e01617ebec8df7a2ac1a51
                                                                  • Instruction Fuzzy Hash: 3B2127717803047AE710BBB59C47B9B36889B09709F4044BFBA05EA2C3CA7D8C09866D
                                                                  APIs
                                                                  • RtlEnterCriticalSection.KERNEL32(00496420,00000000,00401B68), ref: 00401ABD
                                                                  • LocalFree.KERNEL32(007A2898,00000000,00401B68), ref: 00401ACF
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,007A2898,00000000,00401B68), ref: 00401AEE
                                                                  • LocalFree.KERNEL32(007A3898,?,00000000,00008000,007A2898,00000000,00401B68), ref: 00401B2D
                                                                  • RtlLeaveCriticalSection.KERNEL32(00496420,00401B6F), ref: 00401B58
                                                                  • RtlDeleteCriticalSection.KERNEL32(00496420,00401B6F), ref: 00401B62
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                  • String ID: l>z
                                                                  • API String ID: 3782394904-1335453705
                                                                  • Opcode ID: d7983087b8bcbabcafc2c9d8a305f4a93e6fa46b606c4ef3e584c6169f95cf8d
                                                                  • Instruction ID: bf2c7a4256457c5f50c71aa29f18f829c6f6e2c919ab822836d088e606c14c70
                                                                  • Opcode Fuzzy Hash: d7983087b8bcbabcafc2c9d8a305f4a93e6fa46b606c4ef3e584c6169f95cf8d
                                                                  • Instruction Fuzzy Hash: 5D118F30A403405EEB15ABE99D82F263BE59761B4CF56407BF80067AF1D77C9850C76E
                                                                  APIs
                                                                  • RtlInitializeCriticalSection.KERNEL32(00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                  • RtlEnterCriticalSection.KERNEL32(00496420,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                  • RtlLeaveCriticalSection.KERNEL32(00496420,00401A89,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                  • String ID: `dI$`dI$l>z
                                                                  • API String ID: 730355536-1055582413
                                                                  • Opcode ID: f176e8b5bc4d8de55a84342bec8c86950c68c795945543f3ab918003abf5a290
                                                                  • Instruction ID: 5e78e1d922e44001d172df758a9733a16a6df98b74bc9f0da5c534ca1700ba01
                                                                  • Opcode Fuzzy Hash: f176e8b5bc4d8de55a84342bec8c86950c68c795945543f3ab918003abf5a290
                                                                  • Instruction Fuzzy Hash: EC01C0706442405EFB19ABE99802B253ED4D795B88F13803FF440A6AF1C67C4840CB2D
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,004587F2,?,00000000,00000000,00000000,?,00000006,?,00000000,004929D3,?,00000000,00492A76), ref: 00458736
                                                                    • Part of subcall function 00452FD8: FindClose.KERNEL32(000000FF,004530CE), ref: 004530BD
                                                                  Strings
                                                                  • Deleting directory: %s, xrefs: 004586BF
                                                                  • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 004587AB
                                                                  • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00458710
                                                                  • Stripped read-only attribute., xrefs: 004586F8
                                                                  • Failed to strip read-only attribute., xrefs: 00458704
                                                                  • Failed to delete directory (%d)., xrefs: 004587CC
                                                                  • Failed to delete directory (%d). Will retry later., xrefs: 0045874F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseErrorFindLast
                                                                  • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                  • API String ID: 754982922-1448842058
                                                                  • Opcode ID: 9e0d2ec67bd457e1e0f804407d411431f7077f52118391e2ea53699c802ef688
                                                                  • Instruction ID: 0ab20a68f8e75b12d5c2d8e74b017b809a378b322a213473fe43339e3f3d7088
                                                                  • Opcode Fuzzy Hash: 9e0d2ec67bd457e1e0f804407d411431f7077f52118391e2ea53699c802ef688
                                                                  • Instruction Fuzzy Hash: 75417230A042089ACB10EB6988417AF76A59B89306F61857FAC01B7393DE7C890D875E
                                                                  APIs
                                                                  • GetCapture.USER32 ref: 00422E14
                                                                  • GetCapture.USER32 ref: 00422E23
                                                                  • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422E29
                                                                  • ReleaseCapture.USER32 ref: 00422E2E
                                                                  • GetActiveWindow.USER32 ref: 00422E3D
                                                                  • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422EBC
                                                                  • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422F20
                                                                  • GetActiveWindow.USER32 ref: 00422F2F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                  • String ID:
                                                                  • API String ID: 862346643-0
                                                                  • Opcode ID: b62fffc3168ac0ebf47d1dca22d163c46a929337844de2a9f700f1622b0ba937
                                                                  • Instruction ID: 3dc7d5c5dffcbd9cfc95175fcc265abaf37585ce791e678acf2218af3f88607c
                                                                  • Opcode Fuzzy Hash: b62fffc3168ac0ebf47d1dca22d163c46a929337844de2a9f700f1622b0ba937
                                                                  • Instruction Fuzzy Hash: 19416270B00244AFDB50EBA9DA42B9E77F1EF04304F5540BAF404AB3A2D7B99E40DB18
                                                                  APIs
                                                                  • 73A1A570.USER32(00000000), ref: 004293FA
                                                                  • GetTextMetricsA.GDI32(00000000), ref: 00429403
                                                                    • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00429412
                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 0042941F
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00429426
                                                                  • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0042942E
                                                                  • GetSystemMetrics.USER32(00000006), ref: 00429453
                                                                  • GetSystemMetrics.USER32(00000006), ref: 0042946D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                                  • String ID:
                                                                  • API String ID: 361401722-0
                                                                  • Opcode ID: b2b94357b54da494d777ecf551893d0d8b047354e7f5508bf0348299275d4240
                                                                  • Instruction ID: 6143225b0a8ca3b977d6363335e7cd80f7f8ea5cda66b8f0fa851fdc2eb08b32
                                                                  • Opcode Fuzzy Hash: b2b94357b54da494d777ecf551893d0d8b047354e7f5508bf0348299275d4240
                                                                  • Instruction Fuzzy Hash: 360104917087103BF710B2769CC2F6B6188DB9435CF44003FFA469A3D3D56C8C45866A
                                                                  APIs
                                                                  • 73A1A570.USER32(00000000,?,00418FC9,00493D61), ref: 0041DD97
                                                                  • 73A24620.GDI32(00000000,0000005A,00000000,?,00418FC9,00493D61), ref: 0041DDA1
                                                                  • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00418FC9,00493D61), ref: 0041DDAE
                                                                  • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DDBD
                                                                  • GetStockObject.GDI32(00000007), ref: 0041DDCB
                                                                  • GetStockObject.GDI32(00000005), ref: 0041DDD7
                                                                  • GetStockObject.GDI32(0000000D), ref: 0041DDE3
                                                                  • LoadIconA.USER32(00000000,00007F00), ref: 0041DDF4
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectStock$A24620A480A570IconLoad
                                                                  • String ID:
                                                                  • API String ID: 3573811560-0
                                                                  • Opcode ID: 79ba34301ffdcd870fce82e69020cd4fb5d8953881da513776c9bfc891f1925d
                                                                  • Instruction ID: bf46a9fe5e63f1af167cdf0a983a4ac464f15f0dd566559e746e50b59b955e29
                                                                  • Opcode Fuzzy Hash: 79ba34301ffdcd870fce82e69020cd4fb5d8953881da513776c9bfc891f1925d
                                                                  • Instruction Fuzzy Hash: A11130706453419AE740BF655992BA63690DB64748F01813FF609AF2D2DB7A0C448B5E
                                                                  APIs
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0045FD54
                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,0045FDE9), ref: 0045FD5A
                                                                  • SetCursor.USER32(?,0045FDD1,00007F02,00000000,0045FDE9), ref: 0045FDC4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$Load
                                                                  • String ID: $ $Internal error: Item already expanding
                                                                  • API String ID: 1675784387-1948079669
                                                                  • Opcode ID: cbcaf699635bd630a72a4eac0a0a8fd949d1c77c66c52591749928b74767f1e3
                                                                  • Instruction ID: c15dcae1284b043cf062e7fbe70a6b68a16d6112b11b2fd4dc8b2ee3b250eb6b
                                                                  • Opcode Fuzzy Hash: cbcaf699635bd630a72a4eac0a0a8fd949d1c77c66c52591749928b74767f1e3
                                                                  • Instruction Fuzzy Hash: 08B19B316006449FDB20DF68C585B9ABBF1AF05305F2484BAE8459B7A3C778AD4CCB1A
                                                                  APIs
                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00452A1B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: PrivateProfileStringWrite
                                                                  • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                  • API String ID: 390214022-3304407042
                                                                  • Opcode ID: 182027291fff5e899aa86aa762805f048132cfde8caabb70ed6ea897400556cc
                                                                  • Instruction ID: ed2541dd238ae7fbfc90e8818236df2ea80c3df40bc3cac8b0221b07faaa0e68
                                                                  • Opcode Fuzzy Hash: 182027291fff5e899aa86aa762805f048132cfde8caabb70ed6ea897400556cc
                                                                  • Instruction Fuzzy Hash: 1E912534A002099BDB11EFA5C982BDEB7F5EF49309F508567E80077392D7B86E09CB58
                                                                  APIs
                                                                  • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 004729CD
                                                                  • 73A259E0.USER32(00000000,000000FC,00472928,00000000,00472C0C,?,00000000,00472C36), ref: 004729F4
                                                                  • GetACP.KERNEL32(00000000,00472C0C,?,00000000,00472C36), ref: 00472A31
                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00472A77
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A259ClassInfoMessageSend
                                                                  • String ID: COMBOBOX$Inno Setup: Language
                                                                  • API String ID: 3217714596-4234151509
                                                                  • Opcode ID: b93ba9c9bd2dccfc5da510bd1d79d83b4d9a41b54c405923ad32323a0c0928f2
                                                                  • Instruction ID: 9f4fb4c35ce0e0e7a21fc6b4426de3d05f1103b659b7499eccdb2df7d9fa603c
                                                                  • Opcode Fuzzy Hash: b93ba9c9bd2dccfc5da510bd1d79d83b4d9a41b54c405923ad32323a0c0928f2
                                                                  • Instruction Fuzzy Hash: A4813C34A042059FCB10DF69CA85AAAB7F0FB49304F1581BAE808E7762D778AD45CB58
                                                                  APIs
                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004791BC,?,?,?,?,00000000,00479311,?,00000000,?,00000000,?,00479465), ref: 00479198
                                                                  • FindClose.KERNEL32(000000FF,004791C3,004791BC,?,?,?,?,00000000,00479311,?,00000000,?,00000000,?,00479465,00000000), ref: 004791B6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileNext
                                                                  • String ID: *kF$*kF
                                                                  • API String ID: 2066263336-1075660362
                                                                  • Opcode ID: c8d8e8b8a62ee62aa2d3f46a3f80bb79bdd6e23a1a1706ee0b215bce3d42e3ae
                                                                  • Instruction ID: 2c1607e8b37fd23dc5c02d32c1da125da4c7c67d98c9cf595dd82ee7d28d14ce
                                                                  • Opcode Fuzzy Hash: c8d8e8b8a62ee62aa2d3f46a3f80bb79bdd6e23a1a1706ee0b215bce3d42e3ae
                                                                  • Instruction Fuzzy Hash: 6181603090424DAFDF11EFA5CC45ADFBBB9EB49304F4084AAE408A7291D7399E46CF58
                                                                  APIs
                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,004088D0,?,?,?,?,00000000,00000000,00000000,?,004098D7,00000000,004098EA), ref: 004086A2
                                                                    • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004964C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                                                    • Part of subcall function 0040851C: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040871E,?,?,?,00000000,004088D0), ref: 0040852F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale$DefaultSystem
                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                  • API String ID: 1044490935-665933166
                                                                  • Opcode ID: d28892a32a3756e591db26ccf56d4423c4b5dcf68a3e55eb2d1216e614db25d0
                                                                  • Instruction ID: f7723302c3cbbcbb01f246a146743d61dec29c667e41bc47a3323a0acc4546db
                                                                  • Opcode Fuzzy Hash: d28892a32a3756e591db26ccf56d4423c4b5dcf68a3e55eb2d1216e614db25d0
                                                                  • Instruction Fuzzy Hash: CB514A35B00248ABDB01FBAA8941A9F7769DB98308F50D47FA141BB3C6DE3DDA05871D
                                                                  APIs
                                                                  • GetVersion.KERNEL32(00000000,00411869), ref: 004116FC
                                                                  • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 004117BA
                                                                    • Part of subcall function 00411A1C: CreatePopupMenu.USER32 ref: 00411A36
                                                                  • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 00411846
                                                                    • Part of subcall function 00411A1C: CreateMenu.USER32 ref: 00411A40
                                                                  • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 0041182D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                  • String ID: ,$?
                                                                  • API String ID: 2359071979-2308483597
                                                                  • Opcode ID: 010854372fc0fcd25a665cda3fe7d3b7b01a6123dcc7f0b08eba14dece9f5074
                                                                  • Instruction ID: 3f3527f43cca8a4f6c45e7f3696c032b38f9f6d147acb0657ff8a7652be0e8fd
                                                                  • Opcode Fuzzy Hash: 010854372fc0fcd25a665cda3fe7d3b7b01a6123dcc7f0b08eba14dece9f5074
                                                                  • Instruction Fuzzy Hash: CC511774A001409BDB10EF6ADC81ADA7BF9BF49304B1585BBF904E73A6D738C942CB58
                                                                  APIs
                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BE98
                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BEA7
                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BEF8
                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF06
                                                                  • DeleteObject.GDI32(?), ref: 0041BF0F
                                                                  • DeleteObject.GDI32(?), ref: 0041BF18
                                                                  • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BF35
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                  • String ID:
                                                                  • API String ID: 1030595962-0
                                                                  • Opcode ID: c7b0e75b457b54f40c973da1b74c3022c367d96584a0130cfc4ac672875a8614
                                                                  • Instruction ID: 2920a3410ecffe373541ee6f53742fd475180ef7da711f6faed1b6e94a947089
                                                                  • Opcode Fuzzy Hash: c7b0e75b457b54f40c973da1b74c3022c367d96584a0130cfc4ac672875a8614
                                                                  • Instruction Fuzzy Hash: 0C510571E00219AFCB14DFA9D8819EEB7F9EF48314B11446AF914E7391D738AD81CB64
                                                                  APIs
                                                                  • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CE6E
                                                                  • 73A24620.GDI32(00000000,00000026), ref: 0041CE8D
                                                                  • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CEF3
                                                                  • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CF02
                                                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CF6C
                                                                  • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041CFAA
                                                                  • 73A18830.GDI32(?,?,00000001,0041CFDC,00000000,00000026), ref: 0041CFCF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Stretch$A18830$A122A24620BitsMode
                                                                  • String ID:
                                                                  • API String ID: 430401518-0
                                                                  • Opcode ID: 0c94fab632c6515f63448766fa34b64ada61781155f7cee300e1982171a48fb1
                                                                  • Instruction ID: 0295d75a013be80ecc2d975aeb153abe1d20fbb24d7cab5e263b7fb8805ed029
                                                                  • Opcode Fuzzy Hash: 0c94fab632c6515f63448766fa34b64ada61781155f7cee300e1982171a48fb1
                                                                  • Instruction Fuzzy Hash: 6A512970644600AFDB14DFA8C985FABBBF9AF08304F10459AF544DB292C778ED80CB58
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,?,?), ref: 004556F2
                                                                    • Part of subcall function 004241EC: GetWindowTextA.USER32(?,?,00000100), ref: 0042420C
                                                                    • Part of subcall function 0041EE14: GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                                                    • Part of subcall function 0041EE14: 73A25940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042EA14,?,00000001), ref: 0041EE69
                                                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00455759
                                                                  • TranslateMessage.USER32(?), ref: 00455777
                                                                  • DispatchMessageA.USER32(?), ref: 00455780
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                                  • String ID: [Paused]
                                                                  • API String ID: 3047529653-4230553315
                                                                  • Opcode ID: 09b92ce401aaf4d21c704b9c87b92c2373ad68ae59fc15d3723443bc50190c69
                                                                  • Instruction ID: a68f00020d28f0ce2fe800ef048375fbf5ba8330b605a25175dd7787278219b1
                                                                  • Opcode Fuzzy Hash: 09b92ce401aaf4d21c704b9c87b92c2373ad68ae59fc15d3723443bc50190c69
                                                                  • Instruction Fuzzy Hash: B831B534904644AEDB01DBB5DC51B9EBBB8EB4D314F5140BBE800E3292D73C9909CB29
                                                                  APIs
                                                                  • GetCursor.USER32(00000000,0046798F), ref: 0046790C
                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0046791A
                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046798F), ref: 00467920
                                                                  • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046798F), ref: 0046792A
                                                                  • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046798F), ref: 00467930
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$LoadSleep
                                                                  • String ID: CheckPassword
                                                                  • API String ID: 4023313301-1302249611
                                                                  • Opcode ID: 258301bf63e5269af25525ff088430cdfba590d42d048531137d3defa84d42db
                                                                  • Instruction ID: cd6282a444cc2a814528b7acde4eb1d3b26ba6ae4876a3af77a2fa4a59b9ba6f
                                                                  • Opcode Fuzzy Hash: 258301bf63e5269af25525ff088430cdfba590d42d048531137d3defa84d42db
                                                                  • Instruction Fuzzy Hash: 7031B5746442049FE701EB79C88AF9E7BE4AF49308F5580B6B844AF3A2D7789D44CB49
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 004580A3
                                                                  Strings
                                                                  • Failed to load .NET Framework DLL "%s", xrefs: 00458088
                                                                  • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 004580AE
                                                                  • .NET Framework CreateAssemblyCache function failed, xrefs: 004580C6
                                                                  • CreateAssemblyCache, xrefs: 0045809A
                                                                  • Fusion.dll, xrefs: 00458043
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                  • API String ID: 190572456-3990135632
                                                                  • Opcode ID: fc1ab06f9d00bf82fe5bbcc018fb23eb7902ba4ef3a396a7911397a5e7e127bb
                                                                  • Instruction ID: 87f49f4d96cbbed91859b05e9b999843736b61dc8f5f6f83b0dee37b45dbbca8
                                                                  • Opcode Fuzzy Hash: fc1ab06f9d00bf82fe5bbcc018fb23eb7902ba4ef3a396a7911397a5e7e127bb
                                                                  • Instruction Fuzzy Hash: 5531A671E00605ABCB10EBA5C88159FB7A4AF45715F40857FE814B7382DF389A09CB99
                                                                  APIs
                                                                    • Part of subcall function 0041BFB8: GetObjectA.GDI32(?,00000018), ref: 0041BFC5
                                                                  • GetFocus.USER32 ref: 0041C0D8
                                                                  • 73A1A570.USER32(?), ref: 0041C0E4
                                                                  • 73A18830.GDI32(?,?,00000000,00000000,0041C163,?,?), ref: 0041C105
                                                                  • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C163,?,?), ref: 0041C111
                                                                  • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C128
                                                                  • 73A18830.GDI32(?,00000000,00000000,0041C16A,?,?), ref: 0041C150
                                                                  • 73A1A480.USER32(?,?,0041C16A,?,?), ref: 0041C15D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A18830$A122A480A570BitsFocusObject
                                                                  • String ID:
                                                                  • API String ID: 2231653193-0
                                                                  • Opcode ID: 79a038cea31138c71b2ef77edfdeafaab103df7d1acda3a818e2678accba0093
                                                                  • Instruction ID: be6d8328aec04e85a436dd0cf8ae2147a44d9b66c6d411dca3268b31211d8f12
                                                                  • Opcode Fuzzy Hash: 79a038cea31138c71b2ef77edfdeafaab103df7d1acda3a818e2678accba0093
                                                                  • Instruction Fuzzy Hash: B2116A71A40618BFDB10DBA9CC86FAFB7FCEF48700F54446AB514E7281D6789D008B68
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0047ED18), ref: 0047ECFD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                  • API String ID: 47109696-2530820420
                                                                  • Opcode ID: 0055f270ad1a10450845ded1ea058324a7b1b24156a594998e1b708a00871bcc
                                                                  • Instruction ID: 341e95421366e53114c8ca6f25c4ff977ab3e2c7ea4cfefa4db1f93c8273b5db
                                                                  • Opcode Fuzzy Hash: 0055f270ad1a10450845ded1ea058324a7b1b24156a594998e1b708a00871bcc
                                                                  • Instruction Fuzzy Hash: 4C11D334714245AEDB21D7BBDC02BDA3AA8DB49314F21C5F7A905E7282E7799A01C71C
                                                                  APIs
                                                                  • 73A1A570.USER32(00000000,?,?,00000000), ref: 00490685
                                                                    • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 004906A7
                                                                  • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00490C25), ref: 004906BB
                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 004906DD
                                                                  • 73A1A480.USER32(00000000,00000000,00490707,00490700,?,00000000,?,?,00000000), ref: 004906FA
                                                                  Strings
                                                                  • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 004906B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                  • API String ID: 1435929781-222967699
                                                                  • Opcode ID: 94e413365087a897d583a7d18cf7930ea35cda37ec70d90aff6de7051d833aec
                                                                  • Instruction ID: 9a64f1c2bb30d3bf306b56aa24f1f19682fb43c7afbb8c1f5b09a534594b3a1a
                                                                  • Opcode Fuzzy Hash: 94e413365087a897d583a7d18cf7930ea35cda37ec70d90aff6de7051d833aec
                                                                  • Instruction Fuzzy Hash: 14016176A04608BFEB00DAE9CC41F5FB7ECDB49714F61047AF600E7281D678AE009B68
                                                                  APIs
                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B437
                                                                  • DeleteDC.GDI32(00000000), ref: 0041B440
                                                                  • DeleteDC.GDI32(?), ref: 0041B449
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectSelect$Delete$Stretch
                                                                  • String ID:
                                                                  • API String ID: 1458357782-0
                                                                  • Opcode ID: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                                                  • Instruction ID: 073f11bba2386bee955988a390c3df6f0cbda7ed7a331810ab0cae2060ca734e
                                                                  • Opcode Fuzzy Hash: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                                                  • Instruction Fuzzy Hash: F9114C72E40659ABDF10D6D9D985FAFB3BCEF08704F048456B614FB242C678A8418B54
                                                                  APIs
                                                                  • GetCursorPos.USER32 ref: 0042331F
                                                                  • WindowFromPoint.USER32(?,?), ref: 0042332C
                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042333A
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00423341
                                                                  • SendMessageA.USER32(00000000,00000084,?,?), ref: 0042335A
                                                                  • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423371
                                                                  • SetCursor.USER32(00000000), ref: 00423383
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                  • String ID:
                                                                  • API String ID: 1770779139-0
                                                                  • Opcode ID: 60706cbef7e7fd969e6117079794ea181f59045882c2055e97c618c29bc945ad
                                                                  • Instruction ID: 4e500bdd1cb7c406dcecfc45487f359b17b305850d12e3c552a5b3a09f906ed3
                                                                  • Opcode Fuzzy Hash: 60706cbef7e7fd969e6117079794ea181f59045882c2055e97c618c29bc945ad
                                                                  • Instruction Fuzzy Hash: EC01D4223043103AD620BB795C86E3F26A8CFC5B55F50417FB909BE283DA3D8D0163AD
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 004904A8
                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 004904B5
                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 004904C2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                  • API String ID: 667068680-2254406584
                                                                  • Opcode ID: c1cb388f18a833251ea10164337e0a4ec210805cd78a1c1cea1daf9251305321
                                                                  • Instruction ID: bf7ebddba617cbdee0a40413f71d0bc574f40d9895f93a5823e30edc8c05030a
                                                                  • Opcode Fuzzy Hash: c1cb388f18a833251ea10164337e0a4ec210805cd78a1c1cea1daf9251305321
                                                                  • Instruction Fuzzy Hash: FEF0F692B817156FDA20657A0C81E7B69CCCF85B74F050037BF44AB382E96C9D054ABD
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(023D0000,BZ2_bzDecompressInit), ref: 0045BEC5
                                                                  • GetProcAddress.KERNEL32(023D0000,BZ2_bzDecompress), ref: 0045BED5
                                                                  • GetProcAddress.KERNEL32(023D0000,BZ2_bzDecompressEnd), ref: 0045BEE5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                  • API String ID: 190572456-212574377
                                                                  • Opcode ID: dd809cf921f76bb9bcb051d5bf3bd6d10ee41af71f0ab6146759bdd998c59177
                                                                  • Instruction ID: 1717a26d7ff9e6ec21cdec1e53d59f2ff4e9db98930efb332cadb59a07a09a75
                                                                  • Opcode Fuzzy Hash: dd809cf921f76bb9bcb051d5bf3bd6d10ee41af71f0ab6146759bdd998c59177
                                                                  • Instruction Fuzzy Hash: C8F01DB2929700DADB14DF32AC8572726A5E768316F14843BD906962A2D378044CCFAC
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00494934,004555B5,00455958,0045550C,00000000,00000B06,00000000,00000000,?,00000001,00000000,00000002,00000000), ref: 0042E7A1
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E7A7
                                                                  • InterlockedExchange.KERNEL32(00496668,00000001), ref: 0042E7B8
                                                                    • Part of subcall function 0042E718: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042E7DC,00000004,00494934,004555B5,00455958,0045550C,00000000,00000B06,00000000,00000000,?,00000001,00000000), ref: 0042E72E
                                                                    • Part of subcall function 0042E718: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E734
                                                                    • Part of subcall function 0042E718: InterlockedExchange.KERNEL32(00496660,00000001), ref: 0042E745
                                                                  • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00494934,004555B5,00455958,0045550C,00000000,00000B06,00000000,00000000,?,00000001,00000000), ref: 0042E7CC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                  • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                  • API String ID: 142928637-2676053874
                                                                  • Opcode ID: 5663ba0279ef7a797ef83ec368cf053fb4365b88277676e543719bb1127ecfcf
                                                                  • Instruction ID: 1cee5d980b1c9a47755d21244efa4bf10fb7f6722dba01a1fc6581bb9a41cf17
                                                                  • Opcode Fuzzy Hash: 5663ba0279ef7a797ef83ec368cf053fb4365b88277676e543719bb1127ecfcf
                                                                  • Instruction Fuzzy Hash: CBE092B1341720AAEA1077B67CC6F9A2258C780769F55403BF500B61D1C2FE0C80CE6C
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(oleacc.dll,?,0044EBC9), ref: 0044C32B
                                                                  • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C33C
                                                                  • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C34C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoad
                                                                  • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                  • API String ID: 2238633743-1050967733
                                                                  • Opcode ID: 99b5c94386f6dc155553f3a80826bf5cf96db1d3ea4612730bbcf9dfad295514
                                                                  • Instruction ID: 166c02542ccbaaf1b8109ba038d3dbdd24cda0710811ba8b4db32db96d29080e
                                                                  • Opcode Fuzzy Hash: 99b5c94386f6dc155553f3a80826bf5cf96db1d3ea4612730bbcf9dfad295514
                                                                  • Instruction Fuzzy Hash: E3F09EB0182741DAFB50AFF5ECC572636A4E361B0DF19917BA801561A2C7BE4444CE1D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,00493DA2), ref: 00474682
                                                                  • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047468F
                                                                  • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047469F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                  • API String ID: 667068680-222143506
                                                                  • Opcode ID: 17d7d9ddc9679e46750ecb828f40119207d65bad2e21f503b1ff2f29292c9e0e
                                                                  • Instruction ID: 28acd5433f491e1cad215d47bc9d1cc185acf6ffce134010d13ac14222093bbd
                                                                  • Opcode Fuzzy Hash: 17d7d9ddc9679e46750ecb828f40119207d65bad2e21f503b1ff2f29292c9e0e
                                                                  • Instruction Fuzzy Hash: 33C0C9E0245740EA9A00BBF12C82A7A2548D581B28B20813B744869182D77C4C108E1C
                                                                  APIs
                                                                  • GetFocus.USER32 ref: 0041B6B5
                                                                  • 73A1A570.USER32(?), ref: 0041B6C1
                                                                  • 73A18830.GDI32(00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B6F6
                                                                  • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B702
                                                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B730
                                                                  • 73A18830.GDI32(00000000,00000000,00000000,0041B771,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B764
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A18830$A122A26310A570Focus
                                                                  • String ID:
                                                                  • API String ID: 3906783838-0
                                                                  • Opcode ID: d29f05eb6b29070db352309e07eb4e8bfeb24327755f0d073565eec47d644615
                                                                  • Instruction ID: 06dd750ffd38faa4806619bbf82afcbb6c92213719a6bc319da55d16d67b79f4
                                                                  • Opcode Fuzzy Hash: d29f05eb6b29070db352309e07eb4e8bfeb24327755f0d073565eec47d644615
                                                                  • Instruction Fuzzy Hash: 8E512C70A00609AFDF11DFA9C895AEEBBB8FF49704F104466F510A7390D7789981CBA9
                                                                  APIs
                                                                  • GetFocus.USER32 ref: 0041B987
                                                                  • 73A1A570.USER32(?), ref: 0041B993
                                                                  • 73A18830.GDI32(00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9CD
                                                                  • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9D9
                                                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041B9FD
                                                                  • 73A18830.GDI32(00000000,00000000,00000000,0041BA3E,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041BA31
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A18830$A122A26310A570Focus
                                                                  • String ID:
                                                                  • API String ID: 3906783838-0
                                                                  • Opcode ID: 7c51fc24fae23f99d30c86bebf47e6e5bb2fa1576662f29aaf30661c9bdccefa
                                                                  • Instruction ID: 49b1e422d63778e1935042bf56866254f806bc58ba08b8974fd4ee1451f7b7cb
                                                                  • Opcode Fuzzy Hash: 7c51fc24fae23f99d30c86bebf47e6e5bb2fa1576662f29aaf30661c9bdccefa
                                                                  • Instruction Fuzzy Hash: 4F512B74A006089FCB11DFA9C895AAEBBF9FF48700F118066F904EB750D7389D40CBA8
                                                                  APIs
                                                                  • GetFocus.USER32 ref: 0041B4EE
                                                                  • 73A1A570.USER32(?,00000000,0041B5C8,?,?,?,?), ref: 0041B4FA
                                                                  • 73A24620.GDI32(?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B516
                                                                  • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B533
                                                                  • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8), ref: 0041B54A
                                                                  • 73A1A480.USER32(?,?,0041B5A3,?,?), ref: 0041B596
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: E680$A24620A480A570Focus
                                                                  • String ID:
                                                                  • API String ID: 3709697839-0
                                                                  • Opcode ID: 1f4298d78a2f1742154d7222e83094663d7d9fd1bb92d6f88fa0bedfa030a04b
                                                                  • Instruction ID: a6e4b16520c9e4bc630ca31e265eea6a5194191570467489af8bdb357d288b52
                                                                  • Opcode Fuzzy Hash: 1f4298d78a2f1742154d7222e83094663d7d9fd1bb92d6f88fa0bedfa030a04b
                                                                  • Instruction Fuzzy Hash: 2D41C571A04254AFDF10DFA9C885AAFBBB5EF49704F1484AAE900E7351D2389D10CBA5
                                                                  APIs
                                                                  • SetLastError.KERNEL32(00000057,00000000,0045B94C,?,?,?,?,00000000), ref: 0045B8EB
                                                                  • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045B9B8,?,00000000,0045B94C,?,?,?,?,00000000), ref: 0045B92A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                  • API String ID: 1452528299-1580325520
                                                                  • Opcode ID: 861a83ba792b6ba594de6691562c1106e908fb12a5c19eb2509a206d5efdc02c
                                                                  • Instruction ID: 3e55c907eff9311c1d12beb18ec9094b15e641f00d4f416e5cb082c43bca8c6a
                                                                  • Opcode Fuzzy Hash: 861a83ba792b6ba594de6691562c1106e908fb12a5c19eb2509a206d5efdc02c
                                                                  • Instruction Fuzzy Hash: D411A875204208AFD711EA96C981BAA77ACDB84306F644077FE0056383D77C5F0A969A
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BD45
                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BD4F
                                                                  • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD59
                                                                  • 73A24620.GDI32(00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD80
                                                                  • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD8D
                                                                  • 73A1A480.USER32(00000000,00000000,0041BDD3,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDC6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A24620MetricsSystem$A480A570
                                                                  • String ID:
                                                                  • API String ID: 4042297458-0
                                                                  • Opcode ID: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                                                  • Instruction ID: 8181195c8b7ace5e518c23098daf85fccaa127339f370ed271397b7e8efdaee2
                                                                  • Opcode Fuzzy Hash: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                                                  • Instruction Fuzzy Hash: 1F212C74E046499FEB04EFA9C941BEEB7B4EB48714F10402AF514B7680D7785940CFA9
                                                                  APIs
                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00479A8E
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,00468F4C), ref: 00479AB4
                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00479AC4
                                                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 00479AE5
                                                                  • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 00479AF9
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 00479B15
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Long$Show
                                                                  • String ID:
                                                                  • API String ID: 3609083571-0
                                                                  • Opcode ID: 7c81e11c22f1129d2ada4923ae3bc2158ade820bcc2b23438ad04653436283af
                                                                  • Instruction ID: 4cdf147c88a5c2a2c1cbeb076d8654748b99a1d87f5e01f82ea68092a1fb91d2
                                                                  • Opcode Fuzzy Hash: 7c81e11c22f1129d2ada4923ae3bc2158ade820bcc2b23438ad04653436283af
                                                                  • Instruction Fuzzy Hash: D0014CB1641210ABD700DBA8DD41F263B98BB1D330F0A026AB599DB2E7C229EC048B0C
                                                                  APIs
                                                                    • Part of subcall function 0041A650: CreateBrushIndirect.GDI32 ref: 0041A6BB
                                                                  • UnrealizeObject.GDI32(00000000), ref: 0041B1EC
                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B1FE
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B221
                                                                  • SetBkMode.GDI32(?,00000002), ref: 0041B22C
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B247
                                                                  • SetBkMode.GDI32(?,00000001), ref: 0041B252
                                                                    • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                  • String ID:
                                                                  • API String ID: 3527656728-0
                                                                  • Opcode ID: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                                  • Instruction ID: 2be34f36c4bf399c8fa5e8a938e63ded300dcfd20fe04f8c9e05bbd916d2a40e
                                                                  • Opcode Fuzzy Hash: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                                                  • Instruction Fuzzy Hash: 84F0BFB1511101ABCE00FFBAD9CAE4B27A89F443097048057B944DF19BC63CDC504B3E
                                                                  APIs
                                                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                  • ShowWindow.USER32(?,00000005,00000000,00493191,?,?,00000000), ref: 00492F62
                                                                    • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                                                    • Part of subcall function 00407210: SetCurrentDirectoryA.KERNEL32(00000000,?,00492F8A,00000000,0049315D,?,?,00000005,00000000,00493191,?,?,00000000), ref: 0040721B
                                                                    • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00492F94,00000000,0049315D,?,?,00000005), ref: 0042D35D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                  • String ID: .dat$.msg$IMsg$Uninstall
                                                                  • API String ID: 3312786188-1660910688
                                                                  • Opcode ID: 1492898da546e2cc3624b2db100e9229d894c3ebcc03cf50a5e3c5cfa75d7e7a
                                                                  • Instruction ID: e577c12be5b54d78fa1077751f5523510adeee7ee6eab189c18852f993f28198
                                                                  • Opcode Fuzzy Hash: 1492898da546e2cc3624b2db100e9229d894c3ebcc03cf50a5e3c5cfa75d7e7a
                                                                  • Instruction Fuzzy Hash: 24317234A102159FCB00EF65DC5395E7FB5EB8A309B50887AF400A7366CB39AE05DB59
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00455532
                                                                  • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 004555CF
                                                                  Strings
                                                                  • 4II, xrefs: 004555A7
                                                                  • Failed to create DebugClientWnd, xrefs: 00455598
                                                                  • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045555E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID: 4II$Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                  • API String ID: 3850602802-4230653114
                                                                  • Opcode ID: fc90fbf580bda2dff7cf9f3dae6bb79bce73c74cb184ba1aa2d14171e982969d
                                                                  • Instruction ID: 992c5d21dee1e1945835a20745f4e70fe959417217851db837dfea9a8464a94b
                                                                  • Opcode Fuzzy Hash: fc90fbf580bda2dff7cf9f3dae6bb79bce73c74cb184ba1aa2d14171e982969d
                                                                  • Instruction Fuzzy Hash: C211E3B0605250AFD700AB2CDC91B6B7B989B95319F15403BF985DB3C7D3798808CBAE
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042E846
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E84C
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042E875
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                  • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                  • API String ID: 828529508-2866557904
                                                                  • Opcode ID: f6c73efc01099bd7f86a5e5242156e300a0f46a0772caa0c2eebc0c50416524e
                                                                  • Instruction ID: ac0542c787143ba22f0eab23c99be7939f1a28ededf3295516800ce376932e43
                                                                  • Opcode Fuzzy Hash: f6c73efc01099bd7f86a5e5242156e300a0f46a0772caa0c2eebc0c50416524e
                                                                  • Instruction Fuzzy Hash: 90F0F6E174072237E620B2BFACC2F6B15CC8F94766F540136B588EB2C2E96C8905426F
                                                                  APIs
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004563F0
                                                                  • GetExitCodeProcess.KERNEL32(?,00493916), ref: 00456411
                                                                  • CloseHandle.KERNEL32(?,00456444,?,?,_lE,00000000,00000000), ref: 00456437
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                  • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                  • API String ID: 2573145106-3235461205
                                                                  • Opcode ID: 2d136926e029b2eac2d052208e130ce13c9c418b312b51496831f15d5ad7fd42
                                                                  • Instruction ID: 20e2aa995b7683d6b9a251f0df5137541c2409e2968c5c9012188fb4b225f764
                                                                  • Opcode Fuzzy Hash: 2d136926e029b2eac2d052208e130ce13c9c418b312b51496831f15d5ad7fd42
                                                                  • Instruction Fuzzy Hash: C501A274604204AFDB10EB99CD02E5E77A8EB4A715FA14177F910E73D3D6789D04961C
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042E7DC,00000004,00494934,004555B5,00455958,0045550C,00000000,00000B06,00000000,00000000,?,00000001,00000000), ref: 0042E72E
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E734
                                                                  • InterlockedExchange.KERNEL32(00496660,00000001), ref: 0042E745
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                  • String ID: ChangeWindowMessageFilter$user32.dll
                                                                  • API String ID: 3478007392-2498399450
                                                                  • Opcode ID: 02598db08c4a000112c9bf799e011c77217de2df2b75849d72327629dc16e82d
                                                                  • Instruction ID: f9b1f8d33ddbbfa14159479aa9175d48cc93807d6fa788d5eb0d82f0bf51887b
                                                                  • Opcode Fuzzy Hash: 02598db08c4a000112c9bf799e011c77217de2df2b75849d72327629dc16e82d
                                                                  • Instruction Fuzzy Hash: 31E0ECB1741314EADA107B727D8AF5A2654A768715F554437F501651E2C7BD0C40C91C
                                                                  APIs
                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 004738BC
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004739B3,8pI,00000000), ref: 004738CF
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 004738D5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                  • String ID: AllowSetForegroundWindow$user32.dll
                                                                  • API String ID: 1782028327-3855017861
                                                                  • Opcode ID: 0a2f0c961153e95bed1084b4348bda1eb86aa865c75a259dceb39524d91da6e6
                                                                  • Instruction ID: 396aa1631f1aabc4b3bde9474e39fadc16a88d979ffa47118816538f616b0150
                                                                  • Opcode Fuzzy Hash: 0a2f0c961153e95bed1084b4348bda1eb86aa865c75a259dceb39524d91da6e6
                                                                  • Instruction Fuzzy Hash: 63D05ED02803016AD910BBB18C46D6B628C8984716714843B3408E3182D97DE900BA3A
                                                                  APIs
                                                                  • BeginPaint.USER32(00000000,?), ref: 00416BC2
                                                                  • SaveDC.GDI32(?), ref: 00416BF3
                                                                  • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416CB5), ref: 00416C54
                                                                  • RestoreDC.GDI32(?,?), ref: 00416C7B
                                                                  • EndPaint.USER32(00000000,?,00416CBC,00000000,00416CB5), ref: 00416CAF
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                  • String ID:
                                                                  • API String ID: 3808407030-0
                                                                  • Opcode ID: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                                                  • Instruction ID: 41fb8ea60d97978a9acdf236596d3a8a0d8a1996066437b2b943a95edf1585a8
                                                                  • Opcode Fuzzy Hash: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                                                  • Instruction Fuzzy Hash: BF414E70A042049FDB14DB99C989FAA77F9EB48304F1580AEE4459B362D778DD40CB58
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                                                  • Instruction ID: 41a7722d09b35ce9ade17cd18fdec9692d257bae8bd1aa266952c484067d5cda
                                                                  • Opcode Fuzzy Hash: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                                                  • Instruction Fuzzy Hash: D3311F746047409FC320EB69C584BABB7E8AF89714F04991EF9E5C7791D738EC818B19
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429778
                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004297A7
                                                                  • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 004297C3
                                                                  • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 004297EE
                                                                  • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042980C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: fe9210cf49636514123fe8028928f87ce2f158866a525e02be5b173165c2f537
                                                                  • Instruction ID: 5c059f72bad19c8464015bcf3ba3f3fa2ba546ca9f5ab3c2e37583cf1b766786
                                                                  • Opcode Fuzzy Hash: fe9210cf49636514123fe8028928f87ce2f158866a525e02be5b173165c2f537
                                                                  • Instruction Fuzzy Hash: 2E217F70710714BAE710ABA6DC82F5B77ACEB46708F90443EB501BB3D2DB78AD41865C
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BB3A
                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BB44
                                                                  • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BB82
                                                                  • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BCED,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BBC9
                                                                  • DeleteObject.GDI32(00000000), ref: 0041BC0A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MetricsSystem$A26310A570DeleteObject
                                                                  • String ID:
                                                                  • API String ID: 4277397052-0
                                                                  • Opcode ID: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                                                  • Instruction ID: e64c8cfb77975bfe1c5019289902123c5e37d94f13133d85ba8c481b6df62587
                                                                  • Opcode Fuzzy Hash: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                                                  • Instruction Fuzzy Hash: 91316F74E00609EFDB00DFA5C941AAEB7F4EB48700F10846AF510AB781D7389E80DB98
                                                                  APIs
                                                                    • Part of subcall function 0045B880: SetLastError.KERNEL32(00000057,00000000,0045B94C,?,?,?,?,00000000), ref: 0045B8EB
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0046F8D8,?,?,00000001,0049715C), ref: 0046F891
                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0046F8D8,?,?,00000001,0049715C), ref: 0046F8A7
                                                                  Strings
                                                                  • Failed to set permissions on registry key (%d)., xrefs: 0046F8B8
                                                                  • Could not set permissions on the registry key because it currently does not exist., xrefs: 0046F89B
                                                                  • Setting permissions on registry key: %s\%s, xrefs: 0046F856
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                  • API String ID: 1452528299-4018462623
                                                                  • Opcode ID: 33d55e991e3e756d66bcd1625225591f56e5f4d9b88ac31ea74bc8fec6d45153
                                                                  • Instruction ID: 96c1ae88e46f1053c8843c1d8370795127bea1121afffbe49a23539641cc4ae4
                                                                  • Opcode Fuzzy Hash: 33d55e991e3e756d66bcd1625225591f56e5f4d9b88ac31ea74bc8fec6d45153
                                                                  • Instruction Fuzzy Hash: 43219570A046445FCB00EBA9D8416AEBBE8EF49314F5041BBF444E7392E77C5D098B6E
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                  • String ID:
                                                                  • API String ID: 262959230-0
                                                                  • Opcode ID: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                                                  • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                  • Opcode Fuzzy Hash: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                                                  • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                  APIs
                                                                  • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414389
                                                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414391
                                                                  • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143A5
                                                                  • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143AB
                                                                  • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A122A18830$A480
                                                                  • String ID:
                                                                  • API String ID: 3325508737-0
                                                                  • Opcode ID: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                                                  • Instruction ID: 94861c3129a932f854b236b0087f7367a4de39103189020794ca85cb03cdcc47
                                                                  • Opcode Fuzzy Hash: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                                                  • Instruction Fuzzy Hash: 6F01DF7121C3806AD200B63E8C85A9F6BED8FCA314F15556EF498DB382CA7ACC018765
                                                                  APIs
                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,00477595,?,00000000,00000000,00000001,00000000,00476039,?,00000000), ref: 00475FFD
                                                                  Strings
                                                                  • X]G, xrefs: 00475E96
                                                                  • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 00475E71
                                                                  • Failed to parse "reg" constant, xrefs: 00476004
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant$X]G
                                                                  • API String ID: 3535843008-3097313723
                                                                  • Opcode ID: 806a4188fcc8c20298944ffb190329348222981e58a2f71ef820a36b582e984c
                                                                  • Instruction ID: 96cd70323cad5c6b90809f7ed0ed82a06e2339c04e7e6b9c82b053b7c270f765
                                                                  • Opcode Fuzzy Hash: 806a4188fcc8c20298944ffb190329348222981e58a2f71ef820a36b582e984c
                                                                  • Instruction Fuzzy Hash: 70814174E00548AFCB10EF95C481ADEBBF9AF48314F50816AE814BB391D778AF45CB99
                                                                  APIs
                                                                    • Part of subcall function 0041EFE4: GetActiveWindow.USER32 ref: 0041EFE7
                                                                    • Part of subcall function 0041EFE4: GetCurrentThreadId.KERNEL32 ref: 0041EFFC
                                                                    • Part of subcall function 0041EFE4: 73A25940.USER32(00000000,Function_0001EFC0), ref: 0041F002
                                                                    • Part of subcall function 00423118: GetSystemMetrics.USER32(00000000), ref: 0042311A
                                                                  • OffsetRect.USER32(?,?,?), ref: 00424D39
                                                                  • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424DFC
                                                                  • OffsetRect.USER32(?,?,?), ref: 00424E0D
                                                                    • Part of subcall function 004234D4: GetCurrentThreadId.KERNEL32 ref: 004234E9
                                                                    • Part of subcall function 004234D4: SetWindowsHookExA.USER32(00000003,00423490,00000000,00000000), ref: 004234F9
                                                                    • Part of subcall function 004234D4: CreateThread.KERNEL32(00000000,000003E8,00423440,00000000,00000000), ref: 0042351D
                                                                    • Part of subcall function 00424A9C: SetTimer.USER32(00000000,00000001,?,00423424), ref: 00424AB7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$CurrentOffsetRect$A25940ActiveCreateDrawHookMetricsSystemTextTimerWindowWindows
                                                                  • String ID: KB
                                                                  • API String ID: 1906964682-1869488878
                                                                  • Opcode ID: 4de047af277be24121bb3e07ed81c6186c428d0abd0841fa5a600d1de7d0a36e
                                                                  • Instruction ID: 8a1ca8d85bab54549b4d9d093631307a73357c8a1ef7de59c5480922928757da
                                                                  • Opcode Fuzzy Hash: 4de047af277be24121bb3e07ed81c6186c428d0abd0841fa5a600d1de7d0a36e
                                                                  • Instruction Fuzzy Hash: D6811771A002189FDB14DFA8D884ADEBBB5FF48314F5045AAE904AB296DB38AD45CF44
                                                                  APIs
                                                                  • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00406F6B
                                                                  • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00406FE5
                                                                  • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 0040703D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Enum$NameOpenResourceUniversal
                                                                  • String ID: Z
                                                                  • API String ID: 3604996873-1505515367
                                                                  • Opcode ID: f046bcecc6cc818d41960334bbdd2548401fb9237790f0402b99fbef7d520f46
                                                                  • Instruction ID: f15ffb13b1197877662b480f320dceb00dd84bb003a9336f5ebe52512d9587e7
                                                                  • Opcode Fuzzy Hash: f046bcecc6cc818d41960334bbdd2548401fb9237790f0402b99fbef7d520f46
                                                                  • Instruction Fuzzy Hash: B2515170E042099FDB11EF55C941A9EBBB9FB09304F5041BAE540BB3D1C778AE418F5A
                                                                  APIs
                                                                  • SetRectEmpty.USER32(?), ref: 0044CB8E
                                                                  • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044CBB9
                                                                  • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044CC41
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: DrawText$EmptyRect
                                                                  • String ID:
                                                                  • API String ID: 182455014-2867612384
                                                                  • Opcode ID: 6d647fb3bcc34c72dc403f6b0f96d3591bac4e07a988fdfd4992fe03d1b4b07c
                                                                  • Instruction ID: ec0871b8a56e35850cf2b8a3945ee2b2f86efa56287fb08428a7ecab21babc94
                                                                  • Opcode Fuzzy Hash: 6d647fb3bcc34c72dc403f6b0f96d3591bac4e07a988fdfd4992fe03d1b4b07c
                                                                  • Instruction Fuzzy Hash: 49516F71A00248AFDB50DFA5C8C5BDEBBF9EF48304F08447AE845EB252D738A944CB64
                                                                  APIs
                                                                  • 73A1A570.USER32(00000000,00000000,0042EC2C,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EB02
                                                                    • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                                                  • SelectObject.GDI32(?,00000000), ref: 0042EB25
                                                                  • 73A1A480.USER32(00000000,?,0042EC11,00000000,0042EC0A,?,00000000,00000000,0042EC2C,?,?,?,?,00000000,00000000,00000000), ref: 0042EC04
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: A480A570CreateFontIndirectObjectSelect
                                                                  • String ID: ...\
                                                                  • API String ID: 2998766281-983595016
                                                                  • Opcode ID: 6b0b29b1ff4c086d0b000fd4ee176f36fe805dd1f8076c8cc5877eef6e1f7d7c
                                                                  • Instruction ID: 3ea2f4fda2af0d4dbead9854f9e4c512e5c56e1bc2fe1fbb634109393928ece3
                                                                  • Opcode Fuzzy Hash: 6b0b29b1ff4c086d0b000fd4ee176f36fe805dd1f8076c8cc5877eef6e1f7d7c
                                                                  • Instruction Fuzzy Hash: 81313370B00128AFDF11EB97D841BAEBBB9EF48304F91447BF410A7291D7786D45CA69
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00491F89,_iu,?,00000000,0045271E), ref: 004526D3
                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00491F89,_iu,?,00000000,0045271E), ref: 004526E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateFileHandle
                                                                  • String ID: .tmp$_iu
                                                                  • API String ID: 3498533004-10593223
                                                                  • Opcode ID: 983d2faee30faa7d403a3928163df0719498245b46238a1f2d00d3e1bcef5d75
                                                                  • Instruction ID: 1d76945a1a57a903fe92d9463d55cd29f4c2be97d91dbec446825cc4a4bf1293
                                                                  • Opcode Fuzzy Hash: 983d2faee30faa7d403a3928163df0719498245b46238a1f2d00d3e1bcef5d75
                                                                  • Instruction Fuzzy Hash: A131C570A00249ABCB11EBA5C942B9EB7B5AF45309F60442BF800B73D2D6785F0587AD
                                                                  APIs
                                                                  • GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                                                  • UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                                                  • RegisterClassA.USER32(?), ref: 0041643E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Class$InfoRegisterUnregister
                                                                  • String ID: @
                                                                  • API String ID: 3749476976-2766056989
                                                                  • Opcode ID: 6db639d75dbc0aff73bb5e7900fb8fb9d00cae3e69b7c7eab42d34dde977a620
                                                                  • Instruction ID: e8561198b81c08f142b3a544c89b4739d35f798691a26b07e42a1fbbf62ba06a
                                                                  • Opcode Fuzzy Hash: 6db639d75dbc0aff73bb5e7900fb8fb9d00cae3e69b7c7eab42d34dde977a620
                                                                  • Instruction Fuzzy Hash: 94316E706042058BD760EF68C981B9B77E5AB88308F04447FF985DB392DB39D9448B6E
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,00493CF8,00000000,004934D6,?,?,00000000,00496628), ref: 00493450
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00493CF8,00000000,004934D6,?,?,00000000,00496628), ref: 00493479
                                                                  • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00493492
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: File$Attributes$Move
                                                                  • String ID: isRS-%.3u.tmp
                                                                  • API String ID: 3839737484-3657609586
                                                                  • Opcode ID: ac5cc282c067456e249ea33ae27a87cb8f74c3cdbbe1584bcbf229a404d17c3c
                                                                  • Instruction ID: e73a2cdb365e33afcc9ec4347b3e3d3b623f2b48e9bc75f8f4c23586a52c4cba
                                                                  • Opcode Fuzzy Hash: ac5cc282c067456e249ea33ae27a87cb8f74c3cdbbe1584bcbf229a404d17c3c
                                                                  • Instruction Fuzzy Hash: 32215270E00219AFDB01EFA9C8819AFBBB8EB45315F51453AB814B72D1D6385F018A59
                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                  • ExitProcess.KERNEL32 ref: 00404E0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ExitMessageProcess
                                                                  • String ID: Error$Runtime error at 00000000
                                                                  • API String ID: 1220098344-2970929446
                                                                  • Opcode ID: 8c8c0f2434a4a7f5450b7d1f87c82a5e4d49965682bc3ad0c70a84493f0d02f9
                                                                  • Instruction ID: 7ca15834b35bf0f9f7e67f0c6f6a322a9a8b6c98d325c36795369cb21074e1e4
                                                                  • Opcode Fuzzy Hash: 8c8c0f2434a4a7f5450b7d1f87c82a5e4d49965682bc3ad0c70a84493f0d02f9
                                                                  • Instruction Fuzzy Hash: 9221B360A442418ADB11E7B9ECC1B163F919BE5348F06817BE700B73E6C67C884587AE
                                                                  APIs
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00491CD1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window
                                                                  • String ID: ,PI$/INITPROCWND=$%x $@
                                                                  • API String ID: 2353593579-725838332
                                                                  • Opcode ID: 4f3145631ee74e3ffd20238c20037f275b4c7c2d0e9d0755eefdc0ade771780a
                                                                  • Instruction ID: 899b8af52d7b32525e6c1ca955d448a9dbe093ad269ad62ab1ae70d2d30899a0
                                                                  • Opcode Fuzzy Hash: 4f3145631ee74e3ffd20238c20037f275b4c7c2d0e9d0755eefdc0ade771780a
                                                                  • Instruction Fuzzy Hash: A911B471A0420A9FDB01EBA5E841BAEBFF8EB49314F50447BE404E7292D73CA905CB58
                                                                  APIs
                                                                    • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                  • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00455188
                                                                  • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 004551B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                  • String ID: LoadTypeLib$RegisterTypeLib
                                                                  • API String ID: 1312246647-2435364021
                                                                  • Opcode ID: e2f3463635fb6c6e0f44c9beef967b87cfc14e02ad386ede1db0d0b1acc07e49
                                                                  • Instruction ID: 093b81e23b27085b775d5841f24b50463fdb0b77fdf2656e66d641a6674dcfc7
                                                                  • Opcode Fuzzy Hash: e2f3463635fb6c6e0f44c9beef967b87cfc14e02ad386ede1db0d0b1acc07e49
                                                                  • Instruction Fuzzy Hash: 3D11B730B00A44BFDB01DFA6CD61A6EBBBDDB49701F1044B6BD04D3642DA389A04CB14
                                                                  APIs
                                                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                                                  • GetFocus.USER32 ref: 004741B3
                                                                  • GetKeyState.USER32(0000007A), ref: 004741C5
                                                                  • WaitMessage.USER32(?,00000000,004741EC,?,00000000,00474213,?,?,00000001,00000000,?,?,?,?,0047B7D3,00000000), ref: 004741CF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: FocusMessageStateTextWaitWindow
                                                                  • String ID: Wnd=$%x
                                                                  • API String ID: 1381870634-2927251529
                                                                  • Opcode ID: 67cae6dd6d3273ef7d1dfd183c20a750b9d2caf90919f89b06122c8dc7d07ee4
                                                                  • Instruction ID: 34f116606137c316833fa5ff519612bd6df224c0fb330b9a224f89f0f6831219
                                                                  • Opcode Fuzzy Hash: 67cae6dd6d3273ef7d1dfd183c20a750b9d2caf90919f89b06122c8dc7d07ee4
                                                                  • Instruction Fuzzy Hash: E711A730604204AFC711FFA5DC41AAE7BB8EB89314F9184BAF408E3681D7386E50CA69
                                                                  APIs
                                                                  • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046A934
                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046A943
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Time$File$LocalSystem
                                                                  • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                  • API String ID: 1748579591-1013271723
                                                                  • Opcode ID: daa66b2d87cb8fa43dc01f2af67a70da577481e152c1958637a10f9fe24ec333
                                                                  • Instruction ID: 2b10c23fcad2f68d61c28d8f5288bbdb6d5c49eb401cca830eca33b5aee02788
                                                                  • Opcode Fuzzy Hash: daa66b2d87cb8fa43dc01f2af67a70da577481e152c1958637a10f9fe24ec333
                                                                  • Instruction Fuzzy Hash: 0711F8A040C3919AD340DF6AC44432BBBE4AB89708F04892FF9D8D6381E779C948DB77
                                                                  APIs
                                                                  • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00452B87
                                                                    • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,004938C1,00000000,00493916,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00452BAC
                                                                    • Part of subcall function 004521C4: GetLastError.KERNEL32(00000000,00452C35,00000005,00000000,00452C6A,?,?,00000000,00496628,00000004,00000000,00000000,00000000,?,00493575,00000000), ref: 004521C7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesDeleteErrorLastMove
                                                                  • String ID: DeleteFile$MoveFile
                                                                  • API String ID: 3024442154-139070271
                                                                  • Opcode ID: 09f61a2bc4eed106fcf7c3250e83a9029fd29763ab9f59381e025cb4c01b50ae
                                                                  • Instruction ID: 0b890240c925f7cc51cf7eb9f7e2542056b56669519546eb404c8924dfa20b1f
                                                                  • Opcode Fuzzy Hash: 09f61a2bc4eed106fcf7c3250e83a9029fd29763ab9f59381e025cb4c01b50ae
                                                                  • Instruction Fuzzy Hash: 7FF012752141045BEB05FBA6DA4266F63ECEB4530AFA1443BB800B76C3DA7C9D094929
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047EBF9
                                                                  • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0047EC1C
                                                                  Strings
                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 0047EBC6
                                                                  • CSDVersion, xrefs: 0047EBF0
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                  • API String ID: 3677997916-1910633163
                                                                  • Opcode ID: 54a1c771afcc9caaaa3db47c508be36be14261b4c5fb172a546a2b80d69d2b2c
                                                                  • Instruction ID: e156d6a56ac4e40e6375683f0b74b6ac8fc694965697873446ba6e70fbfa433a
                                                                  • Opcode Fuzzy Hash: 54a1c771afcc9caaaa3db47c508be36be14261b4c5fb172a546a2b80d69d2b2c
                                                                  • Instruction Fuzzy Hash: 8BF0AE79D00209AEDF11D6D18D45BDF737C9B04704F1046A7EA14F7241E6759644C759
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00457DB2,00000000,00457EFF,?,00000000,00000000,00000000), ref: 00457CCD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                  • API String ID: 47109696-2631785700
                                                                  • Opcode ID: 6814bac3a89c07b1ab5afe3461460e723eadcf8d89f509875adf6b77509eeb59
                                                                  • Instruction ID: b4c5c728c1379e9c4b8f5c04e0ceb2aca35a0eb3f0ca00244b90be62e54131a8
                                                                  • Opcode Fuzzy Hash: 6814bac3a89c07b1ab5afe3461460e723eadcf8d89f509875adf6b77509eeb59
                                                                  • Instruction Fuzzy Hash: 91F0C2717081205FD710EB1AFC65B5A6698DB91316F10403BFA81D7263C77DDC0AC66D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00452882,00000000,00452925,?,?,00000000,00000000,00000000,00000000,00000000,?,00452BF1,00000000), ref: 0042D7E6
                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D7EC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                  • API String ID: 1646373207-4063490227
                                                                  • Opcode ID: 81f2c271396b6c6b0a6e4f0ec9d4706ead318563820e770f2fdbea2ec60f1365
                                                                  • Instruction ID: 4db8f333c9a0d948aa4d288d669557f69a64c6eaa67e0ad6c3f7b03414b73d9c
                                                                  • Opcode Fuzzy Hash: 81f2c271396b6c6b0a6e4f0ec9d4706ead318563820e770f2fdbea2ec60f1365
                                                                  • Instruction Fuzzy Hash: 23E04F61B44B1112D7107ABA9C83A5B10898B88724FA0843B79A5E72C7EDBCD94A1A7D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042E83C), ref: 0042E8CE
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E8D4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                  • API String ID: 1646373207-260599015
                                                                  • Opcode ID: 3e02ab0e8eb5e74b6c5ee16f939faf03465c100d6f2ce44c64abee54d60a0b19
                                                                  • Instruction ID: 7c69bd6c2ee87db4326f6693fa526596aa450ba62902fbcca0c83f78b45ae659
                                                                  • Opcode Fuzzy Hash: 3e02ab0e8eb5e74b6c5ee16f939faf03465c100d6f2ce44c64abee54d60a0b19
                                                                  • Instruction Fuzzy Hash: 61D0C9A2752B32AA6A2075FB3CD1AEB02CC8D106B93980477F540F7242EA9DCC4565AC
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00493D75), ref: 0044F2BF
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F2C5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: NotifyWinEvent$user32.dll
                                                                  • API String ID: 1646373207-597752486
                                                                  • Opcode ID: 704d51f198e1eaefb4b5a2532ccf6d6d303c3ad9a6296258811b0e0a6a842c2c
                                                                  • Instruction ID: 36e4e0d2698348a904f9f012ce77220534f27c55a7afc26bb15977a54a2e968b
                                                                  • Opcode Fuzzy Hash: 704d51f198e1eaefb4b5a2532ccf6d6d303c3ad9a6296258811b0e0a6a842c2c
                                                                  • Instruction Fuzzy Hash: 2DE0ECE4A417419DEB00FBF6A982B0A2AA0BB65359B1150BBB00466196C7BD44099E2D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00493DC6,00000001,00000000,00493DEA), ref: 00493B42
                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00493B48
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                  • API String ID: 1646373207-834958232
                                                                  • Opcode ID: 41a55b33c160e6dc0eff7ab56ab11d4168c3b7e84bef43fa7e71e2254c7feca5
                                                                  • Instruction ID: ca6bcf986d1e601494b8b79d872acce76b47918f704ed465f41aa35f021a0f47
                                                                  • Opcode Fuzzy Hash: 41a55b33c160e6dc0eff7ab56ab11d4168c3b7e84bef43fa7e71e2254c7feca5
                                                                  • Instruction Fuzzy Hash: 81B0928028170258AC103AF20C02E1F8908888272BB1400373405F21C3CD6CAA04183D
                                                                  APIs
                                                                    • Part of subcall function 0044B198: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F2B5,00493D75), ref: 0044B1BF
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B1D7
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B1E9
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B1FB
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B20D
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B21F
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B231
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B243
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B255
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B267
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B279
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B28B
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B29D
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B2AF
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B2C1
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B2D3
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B2E5
                                                                    • Part of subcall function 0044B198: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B2F7
                                                                  • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00493D98), ref: 00461013
                                                                  • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00461019
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoad
                                                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                  • API String ID: 2238633743-2683653824
                                                                  • Opcode ID: 74472cf46e62de120aa8b6b3746df41601e813c9490f8e295dc42f1c898779b0
                                                                  • Instruction ID: b2bf76e3bb2aebd53e925eb77e9063db760fddbda658e1bfddf48c8792bb1ca4
                                                                  • Opcode Fuzzy Hash: 74472cf46e62de120aa8b6b3746df41601e813c9490f8e295dc42f1c898779b0
                                                                  • Instruction Fuzzy Hash: EBB092A0692780A08E00B7B2198391A2054C554B8DB18007B7144B94A6EA7C40408EAE
                                                                  APIs
                                                                  • GetDesktopWindow.USER32 ref: 00413CB6
                                                                  • GetDesktopWindow.USER32 ref: 00413D6E
                                                                    • Part of subcall function 00418E30: 6F59C6F0.COMCTL32(?,00000000,00413F33,00000000,00414043,?,?,00496628), ref: 00418E4C
                                                                    • Part of subcall function 00418E30: ShowCursor.USER32(00000001,?,00000000,00413F33,00000000,00414043,?,?,00496628), ref: 00418E69
                                                                  • SetCursor.USER32(00000000,?,?,?,?,00413A63,00000000,00413A76), ref: 00413DAC
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CursorDesktopWindow$Show
                                                                  • String ID:
                                                                  • API String ID: 2074268717-0
                                                                  • Opcode ID: 86f28fd5b8e67e4ed68fb8d3243ff4e40f6b005c19925ef4854e6769390e0e23
                                                                  • Instruction ID: 370eb430aafb64f03e0c00a45e78fc31171da0b863367db60babd08861f95fe9
                                                                  • Opcode Fuzzy Hash: 86f28fd5b8e67e4ed68fb8d3243ff4e40f6b005c19925ef4854e6769390e0e23
                                                                  • Instruction Fuzzy Hash: 5C412A75600150AFCB10EF29F988B9677E1AB65325B17847FE404DB369DA38EC81CF58
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 004089DD
                                                                  • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408A4C
                                                                  • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408AE7
                                                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408B26
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: LoadString$FileMessageModuleName
                                                                  • String ID:
                                                                  • API String ID: 704749118-0
                                                                  • Opcode ID: 99751f4f979d7cbd6f64df42d399bdd9e1b5d3b0c0dc70bf067ed9d32167edd5
                                                                  • Instruction ID: d4d784650a0269eb12294142f4e6c1e51b8c8d651a7e98bb559ca79e8df8d1d5
                                                                  • Opcode Fuzzy Hash: 99751f4f979d7cbd6f64df42d399bdd9e1b5d3b0c0dc70bf067ed9d32167edd5
                                                                  • Instruction Fuzzy Hash: 8F3141706083809FD730EB65C945B9B77E89B86304F40483FB6C8EB2D1DB7999098B67
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E44D
                                                                    • Part of subcall function 0044CA90: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CAC2
                                                                  • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E4D1
                                                                    • Part of subcall function 0042BB24: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BB38
                                                                  • IsRectEmpty.USER32(?), ref: 0044E493
                                                                  • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E4B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                  • String ID:
                                                                  • API String ID: 855768636-0
                                                                  • Opcode ID: 5b0df988be9838265a1f1a0401bf5f8406b2a3c4015f812893a6c7d8083beea1
                                                                  • Instruction ID: b3093c4ebb0b7e06bed5f106317d4e3cc6a191cca0c0b9549d73345a2284dbe6
                                                                  • Opcode Fuzzy Hash: 5b0df988be9838265a1f1a0401bf5f8406b2a3c4015f812893a6c7d8083beea1
                                                                  • Instruction Fuzzy Hash: 4A114D71B0030027D210BA7E8C86B5B66C99B88748F05093FB646EB382DDBDDC054299
                                                                  APIs
                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00490AF4
                                                                  • OffsetRect.USER32(?,00000000,?), ref: 00490B0F
                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00490B29
                                                                  • OffsetRect.USER32(?,00000000,?), ref: 00490B44
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: OffsetRect
                                                                  • String ID:
                                                                  • API String ID: 177026234-0
                                                                  • Opcode ID: 4f5ef1e0d983469e0e074b1971f9d893316fa8f23c7050a0547905adaeca2830
                                                                  • Instruction ID: 18fa94cae829dc53f9c600a0c5f9fb7c1b907838cfc372d6d50c385276a760b4
                                                                  • Opcode Fuzzy Hash: 4f5ef1e0d983469e0e074b1971f9d893316fa8f23c7050a0547905adaeca2830
                                                                  • Instruction Fuzzy Hash: 40214CB6700301AFD700DE69CD85E6BB7EEEBD4304F14CA2AF654C7249D634E94487A6
                                                                  APIs
                                                                  • GetCursorPos.USER32 ref: 004171D0
                                                                  • SetCursor.USER32(00000000), ref: 00417213
                                                                  • GetLastActivePopup.USER32(?), ref: 0041723D
                                                                  • GetForegroundWindow.USER32(?), ref: 00417244
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                  • String ID:
                                                                  • API String ID: 1959210111-0
                                                                  • Opcode ID: 57867d8476d6d2e29dff31638e2989af4f337f03c70db4ce9ec7e3e156ffa51a
                                                                  • Instruction ID: 86e626badbabc243afb65fecb2564bdd41232683b3d9035b7095670fd5686afe
                                                                  • Opcode Fuzzy Hash: 57867d8476d6d2e29dff31638e2989af4f337f03c70db4ce9ec7e3e156ffa51a
                                                                  • Instruction Fuzzy Hash: BA2183313086018ACB20AB69D889AD737F1AF45714F0645ABF8589B392D73DDC86CB59
                                                                  APIs
                                                                  • MulDiv.KERNEL32(8B500000,00000008,?), ref: 0049075D
                                                                  • MulDiv.KERNEL32(50142444,00000008,?), ref: 00490771
                                                                  • MulDiv.KERNEL32(F74DDBE8,00000008,?), ref: 00490785
                                                                  • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 004907A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                                                  • Instruction ID: ffb87ba5503d93dbd8900d907168ca1ad9b8eeb6a08e6658e991ddfa8228dfd8
                                                                  • Opcode Fuzzy Hash: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                                                  • Instruction Fuzzy Hash: E8112176604204AFCB40DEA9C8C4D9B7BECEF4D334B2441AAF918DB246D674ED408BA4
                                                                  APIs
                                                                  • GetClassInfoA.USER32(00400000,0041F3E0,?), ref: 0041F411
                                                                  • UnregisterClassA.USER32(0041F3E0,00400000), ref: 0041F43A
                                                                  • RegisterClassA.USER32(00494598), ref: 0041F444
                                                                  • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F47F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                  • String ID:
                                                                  • API String ID: 4025006896-0
                                                                  • Opcode ID: d848210eac8fa203de2a57be4a09b5e70b2efef1fc89853c1c9f6bba622f69a5
                                                                  • Instruction ID: 124ae18f6ccee6cd3f50944003dafe19b4a4e3b77e192b7b2acb4d1f887b2837
                                                                  • Opcode Fuzzy Hash: d848210eac8fa203de2a57be4a09b5e70b2efef1fc89853c1c9f6bba622f69a5
                                                                  • Instruction Fuzzy Hash: 390152712401047BCB10EBE8ED81E9B379CA769314B12413BBA05E72E1D6359C164BAD
                                                                  APIs
                                                                  • WaitForInputIdle.USER32(00000001,00000032), ref: 00453ABC
                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00453ADE
                                                                  • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00453AED
                                                                  • CloseHandle.KERNEL32(00000001,00453B1A,00453B13,?,00000031,00000080,00000000,?,?,00453E6B,00000080,0000003C,00000000,00453E81), ref: 00453B0D
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                  • String ID:
                                                                  • API String ID: 4071923889-0
                                                                  • Opcode ID: bc77cc3d718e7808b1344eec404d7c81fbff08a4e78e5105e06f0a65c8a4f2f9
                                                                  • Instruction ID: 4fe20275a49a48cc97c0147f6d26159365d46054c9b57b8144838d762f7bd3bd
                                                                  • Opcode Fuzzy Hash: bc77cc3d718e7808b1344eec404d7c81fbff08a4e78e5105e06f0a65c8a4f2f9
                                                                  • Instruction Fuzzy Hash: 4901DD70A406087EEB209FAA8C06F6BBB9CDF457B1F510167F904D72D3D5B89F008668
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D187
                                                                  • LoadResource.KERNEL32(00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,0047834C,0000000A,REGDLL_EXE), ref: 0040D1A1
                                                                  • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,0047834C), ref: 0040D1BB
                                                                  • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?), ref: 0040D1C5
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                  • String ID:
                                                                  • API String ID: 3473537107-0
                                                                  • Opcode ID: b3c15c4636e7b2139434bed422b55b0694fd43cf85b07dfc26612a38abd02691
                                                                  • Instruction ID: a2e4909c1946fcd89949086e6ecb513f2c22862e5b7fa6f76d970aa484769738
                                                                  • Opcode Fuzzy Hash: b3c15c4636e7b2139434bed422b55b0694fd43cf85b07dfc26612a38abd02691
                                                                  • Instruction Fuzzy Hash: BEF0FF726056046F9754EE9DA881D5B76ECDE48264320416AF908EB246DE38DD118B78
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,00000000), ref: 0046C11D
                                                                  Strings
                                                                  • Unsetting NTFS compression on directory: %s, xrefs: 0046C103
                                                                  • Setting NTFS compression on directory: %s, xrefs: 0046C0EB
                                                                  • Failed to set NTFS compression state (%d)., xrefs: 0046C12E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                  • API String ID: 1452528299-1392080489
                                                                  • Opcode ID: 12520f28c543ee6dc8b82a22531daf9b0eb63e547a86ccbc29e1cdd4c7e5dd4c
                                                                  • Instruction ID: d1288518dae8f37a1957c453ca06be7ebe069e1f8ad9e7cbb0586ff6e1864a05
                                                                  • Opcode Fuzzy Hash: 12520f28c543ee6dc8b82a22531daf9b0eb63e547a86ccbc29e1cdd4c7e5dd4c
                                                                  • Instruction Fuzzy Hash: 3C01F430E0829856CB04E7AD54912EDBBA49F4A314F44C1EBA495E7243EB7949098B9B
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,00459FE2,?,?,?,?,?,00000000,0045A009), ref: 004548E4
                                                                  • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,00459FE2,?,?,?,?,?,00000000), ref: 004548ED
                                                                  • RemoveFontResourceA.GDI32(00000000), ref: 004548FA
                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0045490E
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                  • String ID:
                                                                  • API String ID: 4283692357-0
                                                                  • Opcode ID: 0d0dfb2564ceee41505842410b8eb5b45ad288921af2b3aaa4e8d0d82e76bf45
                                                                  • Instruction ID: a14628fa6627a55660416567d4dbc5bcd9da3b784c873aa00698b9a40c71d433
                                                                  • Opcode Fuzzy Hash: 0d0dfb2564ceee41505842410b8eb5b45ad288921af2b3aaa4e8d0d82e76bf45
                                                                  • Instruction Fuzzy Hash: 98F05EB5B4435036EA20B6B69C87F1B228C9F94749F10483BBA00EF2C3D97CD904962D
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000), ref: 0046CA0D
                                                                  Strings
                                                                  • Setting NTFS compression on file: %s, xrefs: 0046C9DB
                                                                  • Failed to set NTFS compression state (%d)., xrefs: 0046CA1E
                                                                  • Unsetting NTFS compression on file: %s, xrefs: 0046C9F3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                  • API String ID: 1452528299-3038984924
                                                                  • Opcode ID: 40cc4da06f216ca8fddc2155b0c8044364091732dabe5a2574f68253181afcfc
                                                                  • Instruction ID: f9671e3ed36caeede4aa73b9a5275056af7d69d7ede32b2fefd4c2d78c3eb765
                                                                  • Opcode Fuzzy Hash: 40cc4da06f216ca8fddc2155b0c8044364091732dabe5a2574f68253181afcfc
                                                                  • Instruction Fuzzy Hash: EF01F430E1424856CF04D7ED50813ADBBA49F49314F4481EBA495E7242EA794A09879B
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CountSleepTick
                                                                  • String ID:
                                                                  • API String ID: 2227064392-0
                                                                  • Opcode ID: 7ba95263cf607da14ed182d82f04652cfc8ea88367bf81104d4c93702afd66ac
                                                                  • Instruction ID: 73c64946fba074286b02600117ce653f2166f18cd20dcecc39388403ea812179
                                                                  • Opcode Fuzzy Hash: 7ba95263cf607da14ed182d82f04652cfc8ea88367bf81104d4c93702afd66ac
                                                                  • Instruction Fuzzy Hash: 40E02B7134950159CE2035BE18CA6FF8688CB85364B18557FF48CE6282CC1C4C06467E
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000008,?,0047BD85,?,?,00000001,00000000,00000002,00000000,0047C645,?,?,?,?,?,00493E69), ref: 00473F2D
                                                                  • OpenProcessToken.ADVAPI32(00000000,00000008,?,0047BD85,?,?,00000001,00000000,00000002,00000000,0047C645), ref: 00473F33
                                                                  • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,0047BD85,?,?,00000001,00000000,00000002,00000000,0047C645), ref: 00473F55
                                                                  • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,0047BD85,?,?,00000001,00000000,00000002,00000000), ref: 00473F66
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                  • String ID:
                                                                  • API String ID: 215268677-0
                                                                  • Opcode ID: 278ad5b173194e36c9fdf0c9a70970375a6c5fb09d12381ee4b46ff310b2b9ba
                                                                  • Instruction ID: 4253a410d9d13e694bb7938b39c3b3de8eec9a5aa890adb03660417f9487641a
                                                                  • Opcode Fuzzy Hash: 278ad5b173194e36c9fdf0c9a70970375a6c5fb09d12381ee4b46ff310b2b9ba
                                                                  • Instruction Fuzzy Hash: 60F03061644701BBD600EAB5CC82E9B77DCEB48754F04893ABE98C72C1D678DD08AB26
                                                                  APIs
                                                                  • GetLastActivePopup.USER32(?), ref: 004241BC
                                                                  • IsWindowVisible.USER32(?), ref: 004241CD
                                                                  • IsWindowEnabled.USER32(?), ref: 004241D7
                                                                  • SetForegroundWindow.USER32(?), ref: 004241E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                  • String ID:
                                                                  • API String ID: 2280970139-0
                                                                  • Opcode ID: a2e243f8372e3f0d884fb0d55d1c99da12caacded82f4d9ad5d69dcb1abac48f
                                                                  • Instruction ID: 7a261241521d5f36110480f60a41559dbc21bd8b6604a945fb8666e4bf107b55
                                                                  • Opcode Fuzzy Hash: a2e243f8372e3f0d884fb0d55d1c99da12caacded82f4d9ad5d69dcb1abac48f
                                                                  • Instruction Fuzzy Hash: 0DE08699B06531139E31FA251885ABB25ACCD54B883C60127BC04F7243DF1CCFA0C1AC
                                                                  APIs
                                                                  • GlobalHandle.KERNEL32 ref: 00406287
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                                  • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocHandleLockUnlock
                                                                  • String ID:
                                                                  • API String ID: 2167344118-0
                                                                  • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                  • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                                  • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                                  • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                                  APIs
                                                                  • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 0046743B
                                                                  • EnableMenuItem.USER32(00000000,00000000,00000000), ref: 00467441
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Menu$EnableItemSystem
                                                                  • String ID: CurPageChanged
                                                                  • API String ID: 3692539535-2490978513
                                                                  • Opcode ID: 308e5066f1201e775d53fddf4c1c8fcb09ea1609b2c3b28a9e99fe614ead29c6
                                                                  • Instruction ID: 59c8047f62e7e31c75d3b0d5bc5bcd8262b90343efebb16df874184830fa0953
                                                                  • Opcode Fuzzy Hash: 308e5066f1201e775d53fddf4c1c8fcb09ea1609b2c3b28a9e99fe614ead29c6
                                                                  • Instruction Fuzzy Hash: 16B10A34608205DFC711DB69D989EAD77F5EB45308F2541F6F8049B322EB38AE41EB49
                                                                  APIs
                                                                  • GetCursorPos.USER32(?), ref: 004248D5
                                                                  • WaitMessage.USER32(00000000,004249C9,?,?,?,?), ref: 004249A9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CursorMessageWait
                                                                  • String ID: =I
                                                                  • API String ID: 4021538199-2178491670
                                                                  • Opcode ID: c410e03292cf8d893f928d151c1b8fee47d5476c770b80aa875d8a00d2b1089f
                                                                  • Instruction ID: f5903591994a5646776cc1cabcb36018c201e103d356dd97604095ae9f7807b1
                                                                  • Opcode Fuzzy Hash: c410e03292cf8d893f928d151c1b8fee47d5476c770b80aa875d8a00d2b1089f
                                                                  • Instruction Fuzzy Hash: C831D4B07002249BCB21EF39D48179FB7B5EFC8304F96456AEC049B385DB789D80CA99
                                                                  APIs
                                                                    • Part of subcall function 0042DC54: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0047EBD7,?,00000001,?,?,0047EBD7,?,00000001,00000000), ref: 0042DC70
                                                                  • RegCloseKey.ADVAPI32(?,004749BA,?,?,00000001,00000000,00000000,004749D5), ref: 004749A3
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047492E
                                                                  • %s\%s_is1, xrefs: 0047494C
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpen
                                                                  • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                  • API String ID: 47109696-1598650737
                                                                  • Opcode ID: 758cd3b1c2f7d8369d8ae4129cecded6b857d9b598dbfcfda0686c7afbd63fc9
                                                                  • Instruction ID: 0786ff54a2fcd010540dfb1674e625b2208728f1517a46560fd25b4f32b0fc22
                                                                  • Opcode Fuzzy Hash: 758cd3b1c2f7d8369d8ae4129cecded6b857d9b598dbfcfda0686c7afbd63fc9
                                                                  • Instruction Fuzzy Hash: 7621B6B4B002045FDB01DFA5CC51AEFBBE8EB89304F50847AE508E7381D7789901CB98
                                                                  Strings
                                                                  • Failed to proceed to next wizard page; aborting., xrefs: 00468F27
                                                                  • Failed to proceed to next wizard page; showing wizard., xrefs: 00468F3B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                  • API String ID: 0-1974262853
                                                                  • Opcode ID: f145ff0ebea2de7bdee8c13d844d83a0f554879860ae0a766ef977ac6bef69a2
                                                                  • Instruction ID: daba8f70c7ac65d7d6cbbee9404172843d3e5d7b971d08ea89f613dc0779fbfc
                                                                  • Opcode Fuzzy Hash: f145ff0ebea2de7bdee8c13d844d83a0f554879860ae0a766ef977ac6bef69a2
                                                                  • Instruction Fuzzy Hash: E131AC707042049FD711EB68D886B99B7F4AB45314F1501BFF4089B392EB79AE84C71E
                                                                  APIs
                                                                  • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044FC25
                                                                  • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044FC56
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ExecuteMessageSendShell
                                                                  • String ID: open
                                                                  • API String ID: 812272486-2758837156
                                                                  • Opcode ID: 41c7b89cd367263e980fcb6b441c17f5399fb10515564ba82aac51648a240c51
                                                                  • Instruction ID: 332267fde22c5991c1a24cd309bfe1a293fd30647066df8b1f407d1f292bc6d6
                                                                  • Opcode Fuzzy Hash: 41c7b89cd367263e980fcb6b441c17f5399fb10515564ba82aac51648a240c51
                                                                  • Instruction Fuzzy Hash: 84213270E00608AFEB10DF65C881A9EBBF8EB45704F60857AF905E7391D678AA458A58
                                                                  APIs
                                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00453E38
                                                                  • GetLastError.KERNEL32(0000003C,00000000,00453E81,?,?,00000001,00000001), ref: 00453E49
                                                                    • Part of subcall function 00453A90: WaitForInputIdle.USER32(00000001,00000032), ref: 00453ABC
                                                                    • Part of subcall function 00453A90: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00453ADE
                                                                    • Part of subcall function 00453A90: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00453AED
                                                                    • Part of subcall function 00453A90: CloseHandle.KERNEL32(00000001,00453B1A,00453B13,?,00000031,00000080,00000000,?,?,00453E6B,00000080,0000003C,00000000,00453E81), ref: 00453B0D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Wait$CloseCodeErrorExecuteExitHandleIdleInputLastMultipleObjectsProcessShell
                                                                  • String ID: <
                                                                  • API String ID: 35504260-4251816714
                                                                  • Opcode ID: 97b31b66d7951a817b2d6de982649daa37ee8876151eec3c75e593a1f405ccc7
                                                                  • Instruction ID: 787fbc1d59183a0c5fb09aaf4a5bdc422dd58fb57b9d9847a8159ffb0cd34ec9
                                                                  • Opcode Fuzzy Hash: 97b31b66d7951a817b2d6de982649daa37ee8876151eec3c75e593a1f405ccc7
                                                                  • Instruction Fuzzy Hash: CF215870600209ABDB11DF65D8826DE7BF8AF04396F50443AF844E7381D7789E45CB98
                                                                  APIs
                                                                  • RtlEnterCriticalSection.KERNEL32(00496420,00000000,)), ref: 004025C7
                                                                  • RtlLeaveCriticalSection.KERNEL32(00496420,0040263D), ref: 00402630
                                                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(00496420,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,00496420,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(00496420,00401A89,00000000,00401A82,?,?,0040222E,00496460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                  • String ID: )
                                                                  • API String ID: 2227675388-1084416617
                                                                  • Opcode ID: 3eb0375ff62f3d3bcca9cc60adac25dafbf9b9e3c2e27b1e4b69ca31af3a3358
                                                                  • Instruction ID: 5893b1754cd22d93ac955961316eccc987691ebf6da7ca014f8aac44d7effe1a
                                                                  • Opcode Fuzzy Hash: 3eb0375ff62f3d3bcca9cc60adac25dafbf9b9e3c2e27b1e4b69ca31af3a3358
                                                                  • Instruction Fuzzy Hash: 851101317042046FEB25ABB99F5A62A6AD4D795758B25087FF404F32D2D9BD8C02826C
                                                                  APIs
                                                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                  • SysFreeString.OLEAUT32(?), ref: 00447006
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: String$AllocByteCharFreeMultiWide
                                                                  • String ID: NIL Interface Exception$Unknown Method
                                                                  • API String ID: 3952431833-1023667238
                                                                  • Opcode ID: 5ed8ca64df11c4283491e5fea0b4e4b59f3ec0874e832ef144c5ca8f91c22c85
                                                                  • Instruction ID: af1e206f410ba321dcc0e388bf0f2c43d0b91549fc8dbfcc01e76741634bf4e1
                                                                  • Opcode Fuzzy Hash: 5ed8ca64df11c4283491e5fea0b4e4b59f3ec0874e832ef144c5ca8f91c22c85
                                                                  • Instruction Fuzzy Hash: 4C119670A043449FDB10DFA59C52AAEBBBCEB49704F91407AF900E7681D7799D04C76A
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004915D0,?,004915C4,00000000,004915AB), ref: 00491576
                                                                  • CloseHandle.KERNEL32(00491610,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,004915D0,?,004915C4,00000000), ref: 0049158D
                                                                    • Part of subcall function 00491460: GetLastError.KERNEL32(00000000,004914F8,?,?,?,?), ref: 00491484
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateErrorHandleLastProcess
                                                                  • String ID: D
                                                                  • API String ID: 3798668922-2746444292
                                                                  • Opcode ID: cff36113eb571ffdf39757600e0db38582bb9462f3b465f1db440f76f75d6ad7
                                                                  • Instruction ID: 38782983c14ae617705f460fc8cb2d977fb0fa326e21e307fbc6215661d41f6e
                                                                  • Opcode Fuzzy Hash: cff36113eb571ffdf39757600e0db38582bb9462f3b465f1db440f76f75d6ad7
                                                                  • Instruction Fuzzy Hash: 90015EB1604248BFDB00DBA2DC42E9EBBACEB48714F52047BF505E7291D6789E048A68
                                                                  APIs
                                                                  • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DBB0
                                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DBF0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Value$EnumQuery
                                                                  • String ID: Inno Setup: No Icons
                                                                  • API String ID: 1576479698-2016326496
                                                                  • Opcode ID: 0890946b5df0c49e4954d7290b96ce305c787ba9704d15fe4295c439bd8e9102
                                                                  • Instruction ID: 08e9f6bdc79701da45a7e076aae250b208fcb3010747ef376bcb555be2d5621c
                                                                  • Opcode Fuzzy Hash: 0890946b5df0c49e4954d7290b96ce305c787ba9704d15fe4295c439bd8e9102
                                                                  • Instruction Fuzzy Hash: F5018431B8933069F73045266D41F6B558C9B85B64F65003BFA41AA3C0D6DCDC45E26A
                                                                  APIs
                                                                    • Part of subcall function 004540F0: GetCurrentProcess.KERNEL32(00000028), ref: 004540FF
                                                                    • Part of subcall function 004540F0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00454105
                                                                  • SetForegroundWindow.USER32(?), ref: 00492A0C
                                                                  Strings
                                                                  • Restarting Windows., xrefs: 004929E9
                                                                  • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00492A37
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                  • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                  • API String ID: 3179053593-4147564754
                                                                  • Opcode ID: daf7c14ca4f5471ae0214494c117dc09e8826ad141a5ca0df6ff3ec52adfd983
                                                                  • Instruction ID: 8d4b9e18113a589b989377ecb0ab93b601bd92fa09e4ea3e7ddd9a7787b5675f
                                                                  • Opcode Fuzzy Hash: daf7c14ca4f5471ae0214494c117dc09e8826ad141a5ca0df6ff3ec52adfd983
                                                                  • Instruction Fuzzy Hash: 7101B1706041807BEB10E765E942B5D2BA89B5430DF90807BF800AB6D3C6BD9D49871D
                                                                  APIs
                                                                    • Part of subcall function 00406EB8: DeleteFileA.KERNEL32(00000000,00496628,004938C1,00000000,00493916,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00471956
                                                                    • Part of subcall function 004717A8: GetLastError.KERNEL32(00000000,00471894,?,?,?,00497140,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0047191B,00000001), ref: 004717C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: File$DeleteErrorLastMove
                                                                  • String ID: DeleteFile$MoveFile
                                                                  • API String ID: 3195829115-139070271
                                                                  • Opcode ID: 6f1dd530b118ffdec8b6b992715683284b2d268c838f2fe0e703b9e756e9b43f
                                                                  • Instruction ID: a218362e0e1c618bd78d0cc462e6fccc332738145c669977fbc364c2a4d16106
                                                                  • Opcode Fuzzy Hash: 6f1dd530b118ffdec8b6b992715683284b2d268c838f2fe0e703b9e756e9b43f
                                                                  • Instruction Fuzzy Hash: 95F04FE010410057DF107A6E85936EA639C8F0135A710C17BBA886B3B6CA3D9D03C7AE
                                                                  APIs
                                                                    • Part of subcall function 00478908: FreeLibrary.KERNEL32(6FB90000,0047CD16), ref: 0047891E
                                                                    • Part of subcall function 004785DC: GetTickCount.KERNEL32 ref: 00478624
                                                                    • Part of subcall function 00455658: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 00455677
                                                                  • GetCurrentProcess.KERNEL32(?,?,?,?,?,00493B29), ref: 00493229
                                                                  • TerminateProcess.KERNEL32(00000000,?,?,?,?,?,00493B29), ref: 0049322F
                                                                  Strings
                                                                  • Detected restart. Removing temporary directory., xrefs: 004931E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                  • String ID: Detected restart. Removing temporary directory.
                                                                  • API String ID: 1717587489-3199836293
                                                                  • Opcode ID: a9ca6c26a2fe66df464c4db40c690410b5596c53738655dba60b4da802fa3ac0
                                                                  • Instruction ID: 9193214800fdf1ced63e74b88b08fdc7e56bb632d744fc38822ec3ba4b1c0f63
                                                                  • Opcode Fuzzy Hash: a9ca6c26a2fe66df464c4db40c690410b5596c53738655dba60b4da802fa3ac0
                                                                  • Instruction Fuzzy Hash: ABE0E5712486843EDA027BB6AC1692B7F5CD747B2A7A144BBF80882542C83C4814C67D
                                                                  APIs
                                                                  • SetFocus.USER32(00000000,=I,00000000,004219E4,00000000,00000000,00418568,00000000,00000001,?,?,00461DC2,00000001,00000000,00000000,0046728D), ref: 00421CBB
                                                                  • GetFocus.USER32 ref: 00421CC9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: Focus
                                                                  • String ID: =I
                                                                  • API String ID: 2734777837-2178491670
                                                                  • Opcode ID: 0172ff667e2d931fe0d7022b8c859497446a9db94986137f51e4a00515b9606a
                                                                  • Instruction ID: 6a781247274b35bf802f0d5c88fcb4425cf39f3bc7fec05fcedd95d7989a6849
                                                                  • Opcode Fuzzy Hash: 0172ff667e2d931fe0d7022b8c859497446a9db94986137f51e4a00515b9606a
                                                                  • Instruction Fuzzy Hash: ADE09A35B002205ACB1027BA6886BAB21844B64348F58957FB501EB353DD7C8C80068C
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(00000000,00493D3E), ref: 0040334B
                                                                  • GetCommandLineA.KERNEL32(00000000,00493D3E), ref: 00403356
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: CommandHandleLineModule
                                                                  • String ID: H6x
                                                                  • API String ID: 2123368496-1443523857
                                                                  • Opcode ID: eda79fed6bf77bdd4892e54620bb66f1b64b1a6600f4c5d74c4602cf322d3666
                                                                  • Instruction ID: c011565b17e2e7394f2f9db4e65d06a38ae03cc112fba3318b617fa5f9f162f2
                                                                  • Opcode Fuzzy Hash: eda79fed6bf77bdd4892e54620bb66f1b64b1a6600f4c5d74c4602cf322d3666
                                                                  • Instruction Fuzzy Hash: 66C002609012058AE750EFB6A886B152A94A751349F8244BFB104BA2E2DA7D82056FDE
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.2900975811.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.2900947405.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901054513.0000000000494000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901097662.0000000000496000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.2901122524.00000000004A6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_OFjT8HmzFJ.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastSleep
                                                                  • String ID:
                                                                  • API String ID: 1458359878-0
                                                                  • Opcode ID: 29e118db516b8e460c2a8a501917cf661acd1d551b24bbd95d61759580f5788b
                                                                  • Instruction ID: a1ef1a870660e761051f2faac47f5fa7ea61035e201e112742384e0b01a5c4e3
                                                                  • Opcode Fuzzy Hash: 29e118db516b8e460c2a8a501917cf661acd1d551b24bbd95d61759580f5788b
                                                                  • Instruction Fuzzy Hash: D4F0F072A00D14674E20E99E9C8992F72DCDAE03AE714412BEC04DF303D538CCC987A8

                                                                  Execution Graph

                                                                  Execution Coverage:12.3%
                                                                  Dynamic/Decrypted Code Coverage:72.7%
                                                                  Signature Coverage:11.1%
                                                                  Total number of Nodes:1197
                                                                  Total number of Limit Nodes:43
                                                                  execution_graph 18042 2b80979 18043 2bba4bf CreateFileA 18042->18043 18044 2b7eef1 18045 2b7eed4 18044->18045 18046 2b8af60 CreateFileA 18045->18046 18047 2b7eee2 18045->18047 18046->18047 18048 402247 lstrcmpiW 18049 40b6ee 18048->18049 18050 40b84a 18051 40b8d6 CopyFileA 18050->18051 18052 40218b 18053 4026f6 LoadLibraryExA 18052->18053 18054 4026ff 18053->18054 18055 2b41139 18060 2b4cda4 18055->18060 18057 2b41143 18074 2b533a4 18057->18074 18061 2b4cdae __EH_prolog 18060->18061 18077 2b4d367 18061->18077 18065 2b4cdd1 18071 2b4ce5c 18065->18071 18084 2b53b4c 18065->18084 18068 2b4ce24 18096 2b4dfaf 18068->18096 18071->18057 18072 2b4ce33 shared_ptr 18073 2b533a4 __cinit 68 API calls 18072->18073 18073->18071 18443 2b532a8 18074->18443 18076 2b4114f 18100 2b524d3 18077->18100 18080 2b4db7d 18081 2b4db87 __EH_prolog 18080->18081 18416 2b4d514 18081->18416 18083 2b4dbbc Mailbox 18083->18065 18086 2b53b54 18084->18086 18085 2b52fac _malloc 59 API calls 18085->18086 18086->18085 18087 2b4ce0b 18086->18087 18088 2b58204 __calloc_impl RtlDecodePointer 18086->18088 18089 2b53b72 std::exception::exception 18086->18089 18087->18068 18092 2b4d3c4 18087->18092 18088->18086 18433 2b5455a 18089->18433 18091 2b53b9c 18093 2b4d3ce __EH_prolog 18092->18093 18094 2b4d514 59 API calls 18093->18094 18095 2b4d403 18094->18095 18095->18068 18097 2b4dfb9 __EH_prolog 18096->18097 18436 2b4e8b7 18097->18436 18099 2b4dfea 18099->18072 18103 2b52599 18100->18103 18104 2b525a5 _strlen 18103->18104 18107 2b4cdc0 18103->18107 18109 2b52fac 18104->18109 18107->18080 18110 2b53027 18109->18110 18122 2b52fb8 18109->18122 18111 2b58204 __calloc_impl RtlDecodePointer 18110->18111 18112 2b5302d 18111->18112 18113 2b55e5b __tolower_l 58 API calls 18112->18113 18125 2b525b7 18113->18125 18115 2b52feb RtlAllocateHeap 18115->18122 18115->18125 18117 2b53013 18184 2b55e5b 18117->18184 18121 2b52fc3 18121->18122 18135 2b586d4 18121->18135 18144 2b58731 18121->18144 18179 2b5831d 18121->18179 18122->18115 18122->18117 18122->18121 18123 2b53011 18122->18123 18182 2b58204 RtlDecodePointer 18122->18182 18124 2b55e5b __tolower_l 58 API calls 18123->18124 18124->18125 18125->18107 18126 2b56cbc 18125->18126 18127 2b56cc7 18126->18127 18129 2b56cd5 18126->18129 18127->18129 18133 2b56ceb 18127->18133 18128 2b55e5b __tolower_l 59 API calls 18130 2b56cdc 18128->18130 18129->18128 18131 2b54ef5 __lseeki64 9 API calls 18130->18131 18132 2b56ce6 18131->18132 18132->18107 18133->18132 18134 2b55e5b __tolower_l 59 API calls 18133->18134 18134->18130 18187 2b6017e 18135->18187 18137 2b586db 18138 2b6017e __NMSG_WRITE 59 API calls 18137->18138 18141 2b586e8 18137->18141 18138->18141 18139 2b58731 __NMSG_WRITE 59 API calls 18140 2b58700 18139->18140 18143 2b58731 __NMSG_WRITE 59 API calls 18140->18143 18141->18139 18142 2b5870a 18141->18142 18142->18121 18143->18142 18145 2b5874f __NMSG_WRITE 18144->18145 18147 2b6017e __NMSG_WRITE 55 API calls 18145->18147 18178 2b58876 18145->18178 18149 2b58762 18147->18149 18148 2b588df 18148->18121 18150 2b5887b GetStdHandle 18149->18150 18151 2b6017e __NMSG_WRITE 55 API calls 18149->18151 18154 2b58889 _strlen 18150->18154 18150->18178 18152 2b58773 18151->18152 18152->18150 18153 2b58785 18152->18153 18153->18178 18209 2b5f53d 18153->18209 18156 2b588c2 WriteFile 18154->18156 18154->18178 18156->18178 18158 2b588e3 18161 2b54f05 __invoke_watson 8 API calls 18158->18161 18159 2b587b2 GetModuleFileNameW 18160 2b587d2 18159->18160 18168 2b587e2 __NMSG_WRITE 18159->18168 18162 2b5f53d __NMSG_WRITE 55 API calls 18160->18162 18163 2b588ed 18161->18163 18162->18168 18164 2b58912 RtlEnterCriticalSection 18163->18164 18268 2b58976 18163->18268 18164->18121 18165 2b58828 18165->18158 18227 2b5f4d1 18165->18227 18168->18158 18168->18165 18218 2b5f5b2 18168->18218 18170 2b58905 18170->18164 18290 2b58440 18170->18290 18172 2b5f4d1 __NMSG_WRITE 55 API calls 18174 2b5885f 18172->18174 18174->18158 18176 2b58866 18174->18176 18236 2b601be RtlEncodePointer 18176->18236 18261 2b5454b 18178->18261 18360 2b582e9 GetModuleHandleExW 18179->18360 18183 2b58217 18182->18183 18183->18122 18363 2b55c72 GetLastError 18184->18363 18186 2b55e60 18186->18123 18188 2b60188 18187->18188 18189 2b60192 18188->18189 18190 2b55e5b __tolower_l 59 API calls 18188->18190 18189->18137 18191 2b601ae 18190->18191 18194 2b54ef5 18191->18194 18197 2b54eca RtlDecodePointer 18194->18197 18198 2b54edd 18197->18198 18203 2b54f05 IsProcessorFeaturePresent 18198->18203 18201 2b54eca __lseeki64 8 API calls 18202 2b54f01 18201->18202 18202->18137 18204 2b54f10 18203->18204 18205 2b54d98 __call_reportfault 7 API calls 18204->18205 18206 2b54f25 18205->18206 18207 2b59513 ___raise_securityfailure GetCurrentProcess TerminateProcess 18206->18207 18208 2b54ef4 18207->18208 18208->18201 18210 2b5f548 18209->18210 18211 2b5f556 18209->18211 18210->18211 18214 2b5f56f 18210->18214 18212 2b55e5b __tolower_l 59 API calls 18211->18212 18213 2b5f560 18212->18213 18215 2b54ef5 __lseeki64 9 API calls 18213->18215 18216 2b587a5 18214->18216 18217 2b55e5b __tolower_l 59 API calls 18214->18217 18215->18216 18216->18158 18216->18159 18217->18213 18221 2b5f5c0 18218->18221 18219 2b5f5c4 18220 2b55e5b __tolower_l 59 API calls 18219->18220 18222 2b5f5c9 18219->18222 18226 2b5f5f4 18220->18226 18221->18219 18221->18222 18224 2b5f603 18221->18224 18222->18165 18223 2b54ef5 __lseeki64 9 API calls 18223->18222 18224->18222 18225 2b55e5b __tolower_l 59 API calls 18224->18225 18225->18226 18226->18223 18228 2b5f4eb 18227->18228 18231 2b5f4dd 18227->18231 18229 2b55e5b __tolower_l 59 API calls 18228->18229 18230 2b5f4f5 18229->18230 18232 2b54ef5 __lseeki64 9 API calls 18230->18232 18231->18228 18234 2b5f517 18231->18234 18233 2b58848 18232->18233 18233->18158 18233->18172 18234->18233 18235 2b55e5b __tolower_l 59 API calls 18234->18235 18235->18230 18237 2b601f2 ___crtIsPackagedApp 18236->18237 18238 2b602b1 IsDebuggerPresent 18237->18238 18239 2b60201 LoadLibraryExW 18237->18239 18240 2b602d6 18238->18240 18241 2b602bb 18238->18241 18242 2b6023e GetProcAddress 18239->18242 18243 2b60218 GetLastError 18239->18243 18245 2b602c9 18240->18245 18246 2b602db RtlDecodePointer 18240->18246 18244 2b602c2 OutputDebugStringW 18241->18244 18241->18245 18248 2b60252 7 API calls 18242->18248 18249 2b602ce 18242->18249 18247 2b60227 LoadLibraryExW 18243->18247 18243->18249 18244->18245 18245->18249 18254 2b60302 RtlDecodePointer RtlDecodePointer 18245->18254 18258 2b6031a 18245->18258 18246->18249 18247->18242 18247->18249 18250 2b602ae 18248->18250 18251 2b6029a GetProcAddress RtlEncodePointer 18248->18251 18252 2b5454b __setmbcp_nolock 6 API calls 18249->18252 18250->18238 18251->18250 18256 2b603a0 18252->18256 18253 2b60352 RtlDecodePointer 18257 2b60359 18253->18257 18260 2b6033e RtlDecodePointer 18253->18260 18254->18258 18256->18178 18259 2b6036a RtlDecodePointer 18257->18259 18257->18260 18258->18253 18258->18260 18259->18260 18260->18249 18262 2b54555 IsProcessorFeaturePresent 18261->18262 18263 2b54553 18261->18263 18265 2b5958f 18262->18265 18263->18148 18297 2b5953e IsDebuggerPresent 18265->18297 18269 2b58982 ___DllMainCRTStartup 18268->18269 18270 2b586d4 __FF_MSGBANNER 59 API calls 18269->18270 18283 2b589a1 18269->18283 18273 2b58990 18270->18273 18272 2b589c4 ___DllMainCRTStartup 18272->18170 18275 2b58731 __NMSG_WRITE 59 API calls 18273->18275 18278 2b58997 18275->18278 18276 2b589bf 18279 2b55e5b __tolower_l 59 API calls 18276->18279 18277 2b589ce 18310 2b588ee 18277->18310 18281 2b5831d _doexit 3 API calls 18278->18281 18279->18272 18281->18283 18282 2b589d5 18284 2b589e2 18282->18284 18285 2b589fa 18282->18285 18283->18272 18305 2b58ab5 18283->18305 18317 2b5920c 18284->18317 18320 2b52f74 18285->18320 18288 2b589ee 18326 2b58a16 18288->18326 18291 2b586d4 __FF_MSGBANNER 59 API calls 18290->18291 18292 2b58448 18291->18292 18293 2b58731 __NMSG_WRITE 59 API calls 18292->18293 18294 2b58450 18293->18294 18331 2b584ef 18294->18331 18298 2b59553 ___raise_securityfailure 18297->18298 18303 2b59528 SetUnhandledExceptionFilter UnhandledExceptionFilter 18298->18303 18300 2b5955b ___raise_securityfailure 18304 2b59513 GetCurrentProcess TerminateProcess 18300->18304 18302 2b59578 18302->18148 18303->18300 18304->18302 18308 2b58ac3 18305->18308 18306 2b52fac _malloc 59 API calls 18306->18308 18307 2b589b8 18307->18276 18307->18277 18308->18306 18308->18307 18329 2b59505 Sleep 18308->18329 18311 2b58912 RtlEnterCriticalSection 18310->18311 18312 2b588ff 18310->18312 18311->18282 18313 2b58976 __mtinitlocknum 58 API calls 18312->18313 18314 2b58905 18313->18314 18314->18311 18315 2b58440 __amsg_exit 58 API calls 18314->18315 18316 2b58911 18315->18316 18316->18311 18318 2b5921c 18317->18318 18319 2b59229 InitializeCriticalSectionAndSpinCount 18317->18319 18318->18288 18319->18288 18321 2b52f7d HeapFree 18320->18321 18325 2b52fa6 __dosmaperr 18320->18325 18322 2b52f92 18321->18322 18321->18325 18323 2b55e5b __tolower_l 57 API calls 18322->18323 18324 2b52f98 GetLastError 18323->18324 18324->18325 18325->18288 18330 2b58a58 RtlLeaveCriticalSection 18326->18330 18328 2b58a1d 18328->18272 18329->18308 18330->18328 18334 2b585a5 18331->18334 18333 2b5845b 18335 2b585b1 ___DllMainCRTStartup 18334->18335 18336 2b588ee __lock 52 API calls 18335->18336 18337 2b585b8 18336->18337 18338 2b58671 _doexit 18337->18338 18339 2b585e6 RtlDecodePointer 18337->18339 18354 2b586bf 18338->18354 18339->18338 18342 2b585fd RtlDecodePointer 18339->18342 18347 2b5860d 18342->18347 18343 2b586ce ___DllMainCRTStartup 18343->18333 18345 2b5861a RtlEncodePointer 18345->18347 18346 2b586b6 18348 2b586bf 18346->18348 18349 2b5831d _doexit 3 API calls 18346->18349 18347->18338 18347->18345 18350 2b5862a RtlDecodePointer RtlEncodePointer 18347->18350 18351 2b586cc 18348->18351 18359 2b58a58 RtlLeaveCriticalSection 18348->18359 18349->18348 18353 2b5863c RtlDecodePointer RtlDecodePointer 18350->18353 18351->18333 18353->18347 18355 2b586c5 18354->18355 18356 2b5869f 18354->18356 18357 2b58a58 _doexit RtlLeaveCriticalSection 18355->18357 18356->18343 18358 2b58a58 RtlLeaveCriticalSection 18356->18358 18357->18356 18358->18346 18359->18351 18361 2b58302 GetProcAddress 18360->18361 18362 2b58314 ExitProcess 18360->18362 18361->18362 18377 2b591cb 18363->18377 18365 2b55cd5 SetLastError 18365->18186 18366 2b55c87 18366->18365 18380 2b58a6d 18366->18380 18370 2b55cae 18371 2b55cb4 18370->18371 18372 2b55ccc 18370->18372 18389 2b55ce1 18371->18389 18374 2b52f74 _free 56 API calls 18372->18374 18376 2b55cd2 18374->18376 18375 2b55cbc GetCurrentThreadId 18375->18365 18376->18365 18378 2b591e2 TlsGetValue 18377->18378 18379 2b591de 18377->18379 18378->18366 18379->18366 18381 2b58a74 18380->18381 18383 2b55c9a 18381->18383 18385 2b58a92 18381->18385 18399 2b604b8 18381->18399 18383->18365 18386 2b591ea 18383->18386 18385->18381 18385->18383 18407 2b59505 Sleep 18385->18407 18387 2b59204 TlsSetValue 18386->18387 18388 2b59200 18386->18388 18387->18370 18388->18370 18390 2b55ced ___DllMainCRTStartup 18389->18390 18391 2b588ee __lock 59 API calls 18390->18391 18392 2b55d2a 18391->18392 18408 2b55d82 18392->18408 18395 2b588ee __lock 59 API calls 18396 2b55d4b ___addlocaleref 18395->18396 18411 2b55d8b 18396->18411 18398 2b55d76 ___DllMainCRTStartup 18398->18375 18400 2b604c3 18399->18400 18405 2b604de 18399->18405 18401 2b604cf 18400->18401 18400->18405 18402 2b55e5b __tolower_l 58 API calls 18401->18402 18404 2b604d4 18402->18404 18403 2b604ee RtlAllocateHeap 18403->18404 18403->18405 18404->18381 18405->18403 18405->18404 18406 2b58204 __calloc_impl RtlDecodePointer 18405->18406 18406->18405 18407->18385 18414 2b58a58 RtlLeaveCriticalSection 18408->18414 18410 2b55d44 18410->18395 18415 2b58a58 RtlLeaveCriticalSection 18411->18415 18413 2b55d92 18413->18398 18414->18410 18415->18413 18417 2b4d51e Mailbox __EH_prolog 18416->18417 18420 2b52513 18417->18420 18423 2b52541 18420->18423 18424 2b4d546 18423->18424 18425 2b5254f 18423->18425 18424->18083 18429 2b525d7 18425->18429 18428 2b52599 std::exception::_Copy_str 59 API calls 18428->18424 18430 2b525e0 18429->18430 18431 2b52554 18429->18431 18432 2b52f74 _free 59 API calls 18430->18432 18431->18424 18431->18428 18432->18431 18434 2b54579 RaiseException 18433->18434 18434->18091 18439 2b4ed91 18436->18439 18438 2b4e8c7 shared_ptr 18438->18099 18440 2b4ed9b __EH_prolog 18439->18440 18441 2b53b4c _Allocate 60 API calls 18440->18441 18442 2b4edb2 18441->18442 18442->18438 18444 2b532b4 ___DllMainCRTStartup 18443->18444 18451 2b58593 18444->18451 18450 2b532db ___DllMainCRTStartup 18450->18076 18452 2b588ee __lock 59 API calls 18451->18452 18453 2b532bd 18452->18453 18454 2b532ec RtlDecodePointer RtlDecodePointer 18453->18454 18455 2b53319 18454->18455 18456 2b532c9 18454->18456 18455->18456 18468 2b5915d 18455->18468 18465 2b532e6 18456->18465 18458 2b5337c RtlEncodePointer RtlEncodePointer 18458->18456 18459 2b53350 18459->18456 18462 2b58afc __realloc_crt 62 API calls 18459->18462 18463 2b5336a RtlEncodePointer 18459->18463 18460 2b5332b 18460->18458 18460->18459 18475 2b58afc 18460->18475 18464 2b53364 18462->18464 18463->18458 18464->18456 18464->18463 18502 2b5859c 18465->18502 18469 2b59166 18468->18469 18470 2b5917b RtlSizeHeap 18468->18470 18471 2b55e5b __tolower_l 59 API calls 18469->18471 18470->18460 18472 2b5916b 18471->18472 18473 2b54ef5 __lseeki64 9 API calls 18472->18473 18474 2b59176 18473->18474 18474->18460 18477 2b58b03 18475->18477 18478 2b58b40 18477->18478 18480 2b603a4 18477->18480 18501 2b59505 Sleep 18477->18501 18478->18459 18481 2b603ad 18480->18481 18482 2b603b8 18480->18482 18483 2b52fac _malloc 59 API calls 18481->18483 18484 2b603c0 18482->18484 18491 2b603cd 18482->18491 18485 2b603b5 18483->18485 18486 2b52f74 _free 59 API calls 18484->18486 18485->18477 18500 2b603c8 __dosmaperr 18486->18500 18487 2b60405 18488 2b58204 __calloc_impl RtlDecodePointer 18487->18488 18490 2b6040b 18488->18490 18489 2b603d5 RtlReAllocateHeap 18489->18491 18489->18500 18492 2b55e5b __tolower_l 59 API calls 18490->18492 18491->18487 18491->18489 18493 2b60435 18491->18493 18494 2b58204 __calloc_impl RtlDecodePointer 18491->18494 18497 2b6041d 18491->18497 18492->18500 18495 2b55e5b __tolower_l 59 API calls 18493->18495 18494->18491 18496 2b6043a GetLastError 18495->18496 18496->18500 18498 2b55e5b __tolower_l 59 API calls 18497->18498 18499 2b60422 GetLastError 18498->18499 18499->18500 18500->18477 18501->18477 18505 2b58a58 RtlLeaveCriticalSection 18502->18505 18504 2b532eb 18504->18450 18505->18504 18506 40b2d3 18507 40b1f5 VirtualAlloc 18506->18507 18508 40b2d7 18506->18508 18510 40b515 18511 40b5a1 CreateDirectoryA 18510->18511 18512 2ba76ac 18513 2bc30d4 ReadFile 18512->18513 18515 2b7e561 18516 2b7e526 18515->18516 18517 2b855cf CreateFileA 18515->18517 18516->18517 18518 2b8b5ea 18517->18518 18519 2b4f8a3 CreateFileA 18520 2b4f99f 18519->18520 18524 2b4f8d4 18519->18524 18521 2b4f8ec DeviceIoControl 18521->18524 18522 2b4f995 CloseHandle 18522->18520 18523 2b4f961 GetLastError 18523->18522 18523->18524 18524->18521 18524->18522 18524->18523 18525 2b53b4c _Allocate 60 API calls 18524->18525 18525->18524 18526 2b7f3af WriteFile 18527 402da0 GetVersion 18551 403a30 HeapCreate 18527->18551 18529 402dff 18530 402e04 18529->18530 18531 402e0c 18529->18531 18626 402ebb 18530->18626 18563 403710 18531->18563 18535 402e14 GetCommandLineA 18577 4035de 18535->18577 18539 402e2e 18609 4032d8 18539->18609 18541 402e33 18542 402e38 GetStartupInfoA 18541->18542 18622 403280 18542->18622 18544 402e4a GetModuleHandleA 18546 402e6e 18544->18546 18632 403027 18546->18632 18552 403a50 18551->18552 18553 403a86 18551->18553 18639 4038e8 18552->18639 18553->18529 18556 403a5f 18651 403e07 HeapAlloc 18556->18651 18558 403a6c 18559 403a89 18558->18559 18653 404658 18558->18653 18559->18529 18560 403a69 18560->18559 18562 403a7a HeapDestroy 18560->18562 18562->18553 18716 402edf 18563->18716 18566 40372f GetStartupInfoA 18573 403840 18566->18573 18576 40377b 18566->18576 18569 4038a7 SetHandleCount 18569->18535 18570 403867 GetStdHandle 18572 403875 GetFileType 18570->18572 18570->18573 18571 402edf 12 API calls 18571->18576 18572->18573 18573->18569 18573->18570 18574 4037ec 18574->18573 18575 40380e GetFileType 18574->18575 18575->18574 18576->18571 18576->18573 18576->18574 18578 4035f9 GetEnvironmentStringsW 18577->18578 18579 40362c 18577->18579 18580 403601 18578->18580 18581 40360d GetEnvironmentStrings 18578->18581 18579->18580 18582 40361d 18579->18582 18583 403639 GetEnvironmentStringsW 18580->18583 18588 403645 18580->18588 18581->18582 18584 402e24 18581->18584 18582->18584 18585 4036cb 18582->18585 18586 4036bf GetEnvironmentStrings 18582->18586 18583->18584 18583->18588 18600 403391 18584->18600 18591 402edf 12 API calls 18585->18591 18586->18584 18586->18585 18587 40365a WideCharToMultiByte 18589 403679 18587->18589 18590 4036ab FreeEnvironmentStringsW 18587->18590 18588->18587 18588->18588 18592 402edf 12 API calls 18589->18592 18590->18584 18598 4036e6 18591->18598 18593 40367f 18592->18593 18593->18590 18594 403688 WideCharToMultiByte 18593->18594 18596 4036a2 18594->18596 18597 403699 18594->18597 18595 4036fc FreeEnvironmentStringsA 18595->18584 18596->18590 18782 402f91 18597->18782 18598->18595 18601 4033a3 18600->18601 18602 4033a8 GetModuleFileNameA 18600->18602 18812 405082 18601->18812 18604 4033cb 18602->18604 18605 402edf 12 API calls 18604->18605 18606 4033ec 18605->18606 18607 4033fc 18606->18607 18608 402e96 7 API calls 18606->18608 18607->18539 18608->18607 18610 4032e5 18609->18610 18612 4032ea 18609->18612 18611 405082 19 API calls 18610->18611 18611->18612 18613 402edf 12 API calls 18612->18613 18614 403317 18613->18614 18615 402e96 7 API calls 18614->18615 18621 40332b 18614->18621 18615->18621 18616 40336e 18617 402f91 7 API calls 18616->18617 18618 40337a 18617->18618 18618->18541 18619 402edf 12 API calls 18619->18621 18620 402e96 7 API calls 18620->18621 18621->18616 18621->18619 18621->18620 18623 403289 18622->18623 18625 40328e 18622->18625 18624 405082 19 API calls 18623->18624 18624->18625 18625->18544 18627 402ec4 18626->18627 18628 402ec9 18626->18628 18630 403c60 7 API calls 18627->18630 18629 403c99 7 API calls 18628->18629 18631 402ed2 ExitProcess 18629->18631 18630->18628 18836 403049 18632->18836 18635 4030fc 18636 403108 18635->18636 18637 403231 UnhandledExceptionFilter 18636->18637 18638 402e88 18636->18638 18637->18638 18662 402c80 18639->18662 18642 403911 18643 40392b GetEnvironmentVariableA 18642->18643 18646 403923 18642->18646 18644 403a08 18643->18644 18647 40394a 18643->18647 18644->18646 18667 4038bb GetModuleHandleA 18644->18667 18646->18556 18646->18558 18648 40398f GetModuleFileNameA 18647->18648 18649 403987 18647->18649 18648->18649 18649->18644 18664 40509e 18649->18664 18652 403e23 18651->18652 18652->18560 18654 404665 18653->18654 18655 40466c HeapAlloc 18653->18655 18656 404689 VirtualAlloc 18654->18656 18655->18656 18657 4046c1 18655->18657 18658 4046a9 VirtualAlloc 18656->18658 18659 40477e 18656->18659 18657->18560 18658->18657 18660 404770 VirtualFree 18658->18660 18659->18657 18661 404786 HeapFree 18659->18661 18660->18659 18661->18657 18663 402c8c GetVersionExA 18662->18663 18663->18642 18663->18643 18669 4050b5 18664->18669 18668 4038d2 18667->18668 18668->18646 18671 4050cd 18669->18671 18673 4050fd 18671->18673 18676 405d79 18671->18676 18672 405d79 6 API calls 18672->18673 18673->18672 18675 4050b1 18673->18675 18680 405cad 18673->18680 18675->18644 18677 405d97 18676->18677 18679 405d8b 18676->18679 18686 405b64 18677->18686 18679->18671 18681 405cd8 18680->18681 18685 405cbb 18680->18685 18682 405cf4 18681->18682 18683 405d79 6 API calls 18681->18683 18682->18685 18698 405915 18682->18698 18683->18682 18685->18673 18687 405bad 18686->18687 18688 405b95 GetStringTypeW 18686->18688 18689 405bd8 GetStringTypeA 18687->18689 18690 405bfc 18687->18690 18688->18687 18691 405bb1 GetStringTypeA 18688->18691 18692 405c99 18689->18692 18690->18692 18694 405c12 MultiByteToWideChar 18690->18694 18691->18687 18691->18692 18692->18679 18694->18692 18695 405c36 18694->18695 18695->18692 18696 405c70 MultiByteToWideChar 18695->18696 18696->18692 18697 405c89 GetStringTypeW 18696->18697 18697->18692 18699 405945 LCMapStringW 18698->18699 18700 405961 18698->18700 18699->18700 18701 405969 LCMapStringA 18699->18701 18702 4059c7 18700->18702 18703 4059aa LCMapStringA 18700->18703 18701->18700 18704 405aa3 18701->18704 18702->18704 18705 4059dd MultiByteToWideChar 18702->18705 18703->18704 18704->18685 18705->18704 18706 405a07 18705->18706 18706->18704 18707 405a3d MultiByteToWideChar 18706->18707 18707->18704 18708 405a56 LCMapStringW 18707->18708 18708->18704 18709 405a71 18708->18709 18710 405a77 18709->18710 18712 405ab7 18709->18712 18710->18704 18711 405a85 LCMapStringW 18710->18711 18711->18704 18712->18704 18713 405aef LCMapStringW 18712->18713 18713->18704 18714 405b07 WideCharToMultiByte 18713->18714 18714->18704 18725 402ef1 18716->18725 18719 402e96 18720 402ea4 18719->18720 18721 402e9f 18719->18721 18768 403c99 18720->18768 18762 403c60 18721->18762 18726 402eee 18725->18726 18728 402ef8 18725->18728 18726->18566 18726->18719 18728->18726 18729 402f1d 18728->18729 18730 402f2c 18729->18730 18732 402f41 18729->18732 18737 402f3a 18730->18737 18738 4041a3 18730->18738 18733 402f80 HeapAlloc 18732->18733 18732->18737 18744 404950 18732->18744 18734 402f8f 18733->18734 18734->18728 18735 402f3f 18735->18728 18737->18733 18737->18734 18737->18735 18739 4041d5 18738->18739 18740 404274 18739->18740 18742 404283 18739->18742 18751 4044ac 18739->18751 18740->18742 18758 40455d 18740->18758 18742->18737 18745 40495e 18744->18745 18746 404a4a VirtualAlloc 18745->18746 18747 404b1f 18745->18747 18750 404a1b 18745->18750 18746->18750 18748 404658 5 API calls 18747->18748 18748->18750 18750->18737 18752 4044ef HeapAlloc 18751->18752 18753 4044bf HeapReAlloc 18751->18753 18755 40453f 18752->18755 18756 404515 VirtualAlloc 18752->18756 18754 4044de 18753->18754 18753->18755 18754->18752 18755->18740 18756->18755 18757 40452f HeapFree 18756->18757 18757->18755 18759 40456f VirtualAlloc 18758->18759 18761 4045b8 18759->18761 18761->18742 18763 403c6a 18762->18763 18764 403c99 7 API calls 18763->18764 18767 403c97 18763->18767 18765 403c81 18764->18765 18766 403c99 7 API calls 18765->18766 18766->18767 18767->18720 18771 403cac 18768->18771 18769 402ead 18769->18566 18770 403dc3 18774 403dd6 GetStdHandle WriteFile 18770->18774 18771->18769 18771->18770 18772 403cec 18771->18772 18772->18769 18773 403cf8 GetModuleFileNameA 18772->18773 18775 403d10 18773->18775 18774->18769 18777 405448 18775->18777 18778 405455 LoadLibraryA 18777->18778 18780 405497 18777->18780 18779 405466 GetProcAddress 18778->18779 18778->18780 18779->18780 18781 40547d GetProcAddress GetProcAddress 18779->18781 18780->18769 18781->18780 18783 402fb9 18782->18783 18784 402f9d 18782->18784 18783->18596 18785 402fa7 18784->18785 18786 402fbd 18784->18786 18788 402fe9 HeapFree 18785->18788 18789 402fb3 18785->18789 18787 402fe8 18786->18787 18791 402fd7 18786->18791 18787->18788 18788->18783 18793 403e7a 18789->18793 18799 40490b 18791->18799 18795 403eb8 18793->18795 18798 40416e 18793->18798 18794 4040b4 VirtualFree 18796 404118 18794->18796 18795->18794 18795->18798 18797 404127 VirtualFree HeapFree 18796->18797 18796->18798 18797->18798 18798->18783 18800 40494e 18799->18800 18801 404938 18799->18801 18800->18783 18801->18800 18803 4047f2 18801->18803 18806 4047ff 18803->18806 18804 4048af 18804->18800 18805 404820 VirtualFree 18805->18806 18806->18804 18806->18805 18808 40479c VirtualFree 18806->18808 18809 4047b9 18808->18809 18810 4047e9 18809->18810 18811 4047c9 HeapFree 18809->18811 18810->18806 18811->18806 18813 40508b 18812->18813 18815 405092 18812->18815 18816 404cbe 18813->18816 18815->18602 18823 404e57 18816->18823 18820 404d01 GetCPInfo 18822 404d15 18820->18822 18821 404e4b 18821->18815 18822->18821 18828 404efd GetCPInfo 18822->18828 18824 404e77 18823->18824 18825 404e67 GetOEMCP 18823->18825 18826 404ccf 18824->18826 18827 404e7c GetACP 18824->18827 18825->18824 18826->18820 18826->18821 18826->18822 18827->18826 18829 404fe8 18828->18829 18833 404f20 18828->18833 18829->18821 18830 405b64 6 API calls 18831 404f9c 18830->18831 18832 405915 9 API calls 18831->18832 18834 404fc0 18832->18834 18833->18830 18835 405915 9 API calls 18834->18835 18835->18829 18837 403055 GetCurrentProcess TerminateProcess 18836->18837 18840 403066 18836->18840 18837->18840 18838 402e77 18838->18635 18839 4030d0 ExitProcess 18840->18838 18840->18839 18841 402163 18842 402168 18841->18842 18843 40b53c GetCommandLineW CommandLineToArgvW GetLocalTime 18842->18843 18846 401f27 18843->18846 18847 401f3c 18846->18847 18850 401a1d 18847->18850 18849 401f45 18851 401a2c 18850->18851 18856 401a4f CreateFileA 18851->18856 18855 401a3e 18855->18849 18857 401a35 18856->18857 18859 401a7d 18856->18859 18864 401b4b LoadLibraryA 18857->18864 18858 401a98 DeviceIoControl 18858->18859 18859->18858 18861 401b3a CloseHandle 18859->18861 18862 401b0e GetLastError 18859->18862 18873 402be6 18859->18873 18876 402bd8 18859->18876 18861->18857 18862->18859 18862->18861 18865 401c21 18864->18865 18866 401b6e GetProcAddress 18864->18866 18865->18855 18867 401c18 FreeLibrary 18866->18867 18869 401b85 18866->18869 18867->18865 18868 401b95 GetAdaptersInfo 18868->18869 18869->18868 18870 401c15 18869->18870 18871 402be6 7 API calls 18869->18871 18872 402bd8 12 API calls 18869->18872 18870->18867 18871->18869 18872->18869 18874 402f91 7 API calls 18873->18874 18875 402bef 18874->18875 18875->18859 18877 402ef1 12 API calls 18876->18877 18878 402be3 18877->18878 18878->18859 18879 40b7a7 RegCloseKey 18880 40b7ad 18879->18880 18881 4022ec 18882 40ba08 RegSetValueExA 18881->18882 18883 4021ad RegQueryValueExA 18884 402254 RegCloseKey 18883->18884 18886 40b4ae lstrcmpiW 18887 4025f0 18888 4025f9 18887->18888 18889 40b93e Sleep 18888->18889 18890 40b5b1 18893 401f64 FindResourceA 18890->18893 18892 40b5bb 18894 401f86 GetLastError SizeofResource 18893->18894 18899 401f9f 18893->18899 18895 401fa6 LoadResource LockResource GlobalAlloc 18894->18895 18894->18899 18896 401fd2 18895->18896 18897 401ffb GetTickCount 18896->18897 18900 402005 GlobalAlloc 18897->18900 18899->18892 18900->18899 18901 40b172 Sleep 18902 40b17b 18901->18902 18903 402275 18904 402609 RegOpenKeyExA 18903->18904 18905 40225a RegCloseKey 18904->18905 18907 2b4104d 18908 2b533a4 __cinit 68 API calls 18907->18908 18909 2b41057 18908->18909 18912 2b41aa9 InterlockedIncrement 18909->18912 18913 2b41ac5 WSAStartup InterlockedExchange 18912->18913 18914 2b4105c 18912->18914 18913->18914 18915 2b53d0f 18916 2b53d1d 18915->18916 18917 2b53d18 18915->18917 18921 2b53d32 18916->18921 18929 2b5b8e1 18917->18929 18920 2b53d2b 18922 2b53d3e ___DllMainCRTStartup 18921->18922 18926 2b53d8c ___DllMainCRTStartup 18922->18926 18928 2b53de9 ___DllMainCRTStartup 18922->18928 18933 2b53b9d 18922->18933 18924 2b53dc6 18925 2b53b9d __CRT_INIT@12 138 API calls 18924->18925 18924->18928 18925->18928 18926->18924 18927 2b53b9d __CRT_INIT@12 138 API calls 18926->18927 18926->18928 18927->18924 18928->18920 18930 2b5b904 18929->18930 18931 2b5b911 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18929->18931 18930->18931 18932 2b5b908 18930->18932 18931->18932 18932->18916 18934 2b53ba9 ___DllMainCRTStartup 18933->18934 18935 2b53bb1 18934->18935 18936 2b53c2b 18934->18936 18981 2b581e7 GetProcessHeap 18935->18981 18938 2b53c94 18936->18938 18939 2b53c2f 18936->18939 18941 2b53cf7 18938->18941 18942 2b53c99 18938->18942 18944 2b53c50 18939->18944 18975 2b53bba ___DllMainCRTStartup __CRT_INIT@12 18939->18975 19082 2b5845c 18939->19082 18940 2b53bb6 18940->18975 18982 2b55d94 18940->18982 18941->18975 19113 2b55c24 18941->19113 18943 2b591cb __getptd_noexit TlsGetValue 18942->18943 18948 2b53ca4 18943->18948 19085 2b58333 RtlDecodePointer 18944->19085 18952 2b58a6d __calloc_crt 59 API calls 18948->18952 18948->18975 18950 2b53bc6 __RTC_Initialize 18958 2b53bd6 GetCommandLineA 18950->18958 18950->18975 18954 2b53cb5 18952->18954 18953 2b53c66 __CRT_INIT@12 19109 2b53c7f 18953->19109 18959 2b591ea __getptd_noexit TlsSetValue 18954->18959 18954->18975 18955 2b5b57f __ioterm 60 API calls 18957 2b53c61 18955->18957 18960 2b55e0a __mtterm 62 API calls 18957->18960 19003 2b5b97d GetEnvironmentStringsW 18958->19003 18962 2b53ccd 18959->18962 18960->18953 18964 2b53cd3 18962->18964 18965 2b53ceb 18962->18965 18967 2b55ce1 __initptd 59 API calls 18964->18967 18968 2b52f74 _free 59 API calls 18965->18968 18970 2b53cdb GetCurrentThreadId 18967->18970 18968->18975 18969 2b53bf0 18971 2b53bf4 18969->18971 19035 2b5b5d1 18969->19035 18970->18975 19068 2b55e0a 18971->19068 18975->18926 18976 2b53c14 18976->18975 19077 2b5b57f 18976->19077 18981->18940 19121 2b58503 RtlEncodePointer 18982->19121 18984 2b55d99 19126 2b58a1f 18984->19126 18987 2b55da2 18988 2b55e0a __mtterm 62 API calls 18987->18988 18990 2b55da7 18988->18990 18990->18950 18992 2b55dbf 18993 2b58a6d __calloc_crt 59 API calls 18992->18993 18994 2b55dcc 18993->18994 18995 2b55e01 18994->18995 18996 2b591ea __getptd_noexit TlsSetValue 18994->18996 18997 2b55e0a __mtterm 62 API calls 18995->18997 18998 2b55de0 18996->18998 18999 2b55e06 18997->18999 18998->18995 19000 2b55de6 18998->19000 18999->18950 19001 2b55ce1 __initptd 59 API calls 19000->19001 19002 2b55dee GetCurrentThreadId 19001->19002 19002->18950 19005 2b5b990 19003->19005 19008 2b53be6 19003->19008 19004 2b5b9a8 WideCharToMultiByte 19006 2b5b9c3 19004->19006 19007 2b5b9fa FreeEnvironmentStringsW 19004->19007 19005->19004 19005->19005 19009 2b58ab5 __malloc_crt 59 API calls 19006->19009 19007->19008 19016 2b5b2cb 19008->19016 19010 2b5b9c9 19009->19010 19010->19007 19011 2b5b9d0 WideCharToMultiByte 19010->19011 19012 2b5b9e6 19011->19012 19013 2b5b9ef FreeEnvironmentStringsW 19011->19013 19014 2b52f74 _free 59 API calls 19012->19014 19013->19008 19015 2b5b9ec 19014->19015 19015->19013 19017 2b5b2d7 ___DllMainCRTStartup 19016->19017 19018 2b588ee __lock 59 API calls 19017->19018 19019 2b5b2de 19018->19019 19020 2b58a6d __calloc_crt 59 API calls 19019->19020 19021 2b5b2ef 19020->19021 19022 2b5b35a GetStartupInfoW 19021->19022 19023 2b5b2fa ___DllMainCRTStartup @_EH4_CallFilterFunc@8 19021->19023 19029 2b5b36f 19022->19029 19032 2b5b49e 19022->19032 19023->18969 19024 2b5b566 19134 2b5b576 19024->19134 19026 2b58a6d __calloc_crt 59 API calls 19026->19029 19027 2b5b4eb GetStdHandle 19027->19032 19028 2b5b4fe GetFileType 19028->19032 19029->19026 19031 2b5b3bd 19029->19031 19029->19032 19030 2b5b3f1 GetFileType 19030->19031 19031->19030 19031->19032 19033 2b5920c __mtinitlocknum InitializeCriticalSectionAndSpinCount 19031->19033 19032->19024 19032->19027 19032->19028 19034 2b5920c __mtinitlocknum InitializeCriticalSectionAndSpinCount 19032->19034 19033->19031 19034->19032 19036 2b5b5e4 GetModuleFileNameA 19035->19036 19037 2b5b5df 19035->19037 19039 2b5b611 19036->19039 19144 2b5528a 19037->19144 19138 2b5b684 19039->19138 19042 2b58ab5 __malloc_crt 59 API calls 19043 2b5b64a 19042->19043 19044 2b5b684 _parse_cmdline 59 API calls 19043->19044 19045 2b53c00 19043->19045 19044->19045 19045->18976 19046 2b5b800 19045->19046 19047 2b5b809 19046->19047 19050 2b5b80e _strlen 19046->19050 19048 2b5528a ___initmbctable 71 API calls 19047->19048 19048->19050 19049 2b53c09 19049->18976 19062 2b5846b 19049->19062 19050->19049 19051 2b58a6d __calloc_crt 59 API calls 19050->19051 19053 2b5b844 _strlen 19051->19053 19052 2b5b896 19054 2b52f74 _free 59 API calls 19052->19054 19053->19049 19053->19052 19055 2b58a6d __calloc_crt 59 API calls 19053->19055 19056 2b5b8bd 19053->19056 19058 2b56cbc __fltout2 59 API calls 19053->19058 19059 2b5b8d4 19053->19059 19054->19049 19055->19053 19057 2b52f74 _free 59 API calls 19056->19057 19057->19049 19058->19053 19060 2b54f05 __invoke_watson 8 API calls 19059->19060 19061 2b5b8e0 19060->19061 19064 2b58477 __IsNonwritableInCurrentImage 19062->19064 19348 2b5d2df 19064->19348 19065 2b58495 __initterm_e 19066 2b533a4 __cinit 68 API calls 19065->19066 19067 2b584b4 _doexit __IsNonwritableInCurrentImage 19065->19067 19066->19067 19067->18976 19069 2b55e14 19068->19069 19070 2b55e1a 19068->19070 19351 2b591ac 19069->19351 19072 2b58938 RtlDeleteCriticalSection 19070->19072 19074 2b58954 19070->19074 19073 2b52f74 _free 59 API calls 19072->19073 19073->19070 19075 2b58960 RtlDeleteCriticalSection 19074->19075 19076 2b58973 19074->19076 19075->19074 19076->18975 19081 2b5b586 19077->19081 19078 2b5b5ce 19078->18971 19079 2b52f74 _free 59 API calls 19079->19081 19080 2b5b59f RtlDeleteCriticalSection 19080->19081 19081->19078 19081->19079 19081->19080 19083 2b585a5 _doexit 59 API calls 19082->19083 19084 2b58467 19083->19084 19084->18944 19086 2b5835f 19085->19086 19087 2b5834d 19085->19087 19088 2b52f74 _free 59 API calls 19086->19088 19087->19086 19089 2b52f74 _free 59 API calls 19087->19089 19091 2b5836c 19088->19091 19089->19087 19090 2b58390 19092 2b52f74 _free 59 API calls 19090->19092 19091->19090 19093 2b52f74 _free 59 API calls 19091->19093 19094 2b5839c 19092->19094 19093->19091 19095 2b52f74 _free 59 API calls 19094->19095 19096 2b583ad 19095->19096 19097 2b52f74 _free 59 API calls 19096->19097 19098 2b583b8 19097->19098 19099 2b583dd RtlEncodePointer 19098->19099 19102 2b52f74 _free 59 API calls 19098->19102 19100 2b583f2 19099->19100 19101 2b583f8 19099->19101 19103 2b52f74 _free 59 API calls 19100->19103 19104 2b5840e 19101->19104 19106 2b52f74 _free 59 API calls 19101->19106 19105 2b583dc 19102->19105 19103->19101 19107 2b53c55 19104->19107 19108 2b52f74 _free 59 API calls 19104->19108 19105->19099 19106->19104 19107->18953 19107->18955 19108->19107 19110 2b53c91 19109->19110 19111 2b53c83 19109->19111 19110->18975 19111->19110 19112 2b55e0a __mtterm 62 API calls 19111->19112 19112->19110 19114 2b55c57 19113->19114 19116 2b55c31 19113->19116 19114->18975 19115 2b55c3f 19118 2b591ea __getptd_noexit TlsSetValue 19115->19118 19116->19115 19117 2b591cb __getptd_noexit TlsGetValue 19116->19117 19117->19115 19119 2b55c4f 19118->19119 19354 2b55aef 19119->19354 19122 2b58514 __init_pointers __initp_misc_winsig 19121->19122 19133 2b53a07 RtlEncodePointer 19122->19133 19124 2b5852c __init_pointers 19125 2b5927a 34 API calls 19124->19125 19125->18984 19127 2b58a2b 19126->19127 19128 2b5920c __mtinitlocknum InitializeCriticalSectionAndSpinCount 19127->19128 19129 2b55d9e 19127->19129 19128->19127 19129->18987 19130 2b5918e 19129->19130 19131 2b591a5 TlsAlloc 19130->19131 19132 2b55db4 19130->19132 19132->18987 19132->18992 19133->19124 19137 2b58a58 RtlLeaveCriticalSection 19134->19137 19136 2b5b57d 19136->19023 19137->19136 19140 2b5b6a6 19138->19140 19143 2b5b70a 19140->19143 19148 2b615d6 19140->19148 19141 2b5b627 19141->19042 19141->19045 19142 2b615d6 _parse_cmdline 59 API calls 19142->19143 19143->19141 19143->19142 19145 2b5529a 19144->19145 19146 2b55293 19144->19146 19145->19036 19236 2b555e7 19146->19236 19151 2b6157c 19148->19151 19154 2b5227b 19151->19154 19155 2b5228c 19154->19155 19161 2b522d9 19154->19161 19162 2b55c5a 19155->19162 19158 2b522b9 19158->19161 19182 2b55541 19158->19182 19161->19140 19163 2b55c72 __getptd_noexit 59 API calls 19162->19163 19164 2b55c60 19163->19164 19165 2b52292 19164->19165 19166 2b58440 __amsg_exit 59 API calls 19164->19166 19165->19158 19167 2b551bf 19165->19167 19166->19165 19168 2b551cb ___DllMainCRTStartup 19167->19168 19169 2b55c5a _CallSETranslator 59 API calls 19168->19169 19170 2b551d4 19169->19170 19171 2b55203 19170->19171 19173 2b551e7 19170->19173 19172 2b588ee __lock 59 API calls 19171->19172 19174 2b5520a 19172->19174 19175 2b55c5a _CallSETranslator 59 API calls 19173->19175 19194 2b5523f 19174->19194 19177 2b551ec 19175->19177 19179 2b551fa ___DllMainCRTStartup 19177->19179 19181 2b58440 __amsg_exit 59 API calls 19177->19181 19179->19158 19181->19179 19183 2b5554d ___DllMainCRTStartup 19182->19183 19184 2b55c5a _CallSETranslator 59 API calls 19183->19184 19185 2b55557 19184->19185 19186 2b588ee __lock 59 API calls 19185->19186 19190 2b55569 19185->19190 19187 2b55587 19186->19187 19192 2b52f74 _free 59 API calls 19187->19192 19193 2b555b4 19187->19193 19189 2b58440 __amsg_exit 59 API calls 19191 2b55577 ___DllMainCRTStartup 19189->19191 19190->19189 19190->19191 19191->19161 19192->19193 19232 2b555de 19193->19232 19195 2b5521e 19194->19195 19196 2b5524a ___addlocaleref ___removelocaleref 19194->19196 19198 2b55236 19195->19198 19196->19195 19201 2b54fc5 19196->19201 19231 2b58a58 RtlLeaveCriticalSection 19198->19231 19200 2b5523d 19200->19177 19202 2b5503e 19201->19202 19205 2b54fda 19201->19205 19203 2b52f74 _free 59 API calls 19202->19203 19204 2b5508b 19202->19204 19206 2b5505f 19203->19206 19207 2b5d53d ___free_lc_time 59 API calls 19204->19207 19211 2b550b4 19204->19211 19205->19202 19208 2b5500b 19205->19208 19213 2b52f74 _free 59 API calls 19205->19213 19210 2b52f74 _free 59 API calls 19206->19210 19209 2b550a9 19207->19209 19221 2b52f74 _free 59 API calls 19208->19221 19230 2b55029 19208->19230 19212 2b52f74 _free 59 API calls 19209->19212 19215 2b55072 19210->19215 19214 2b55113 19211->19214 19220 2b52f74 59 API calls _free 19211->19220 19212->19211 19217 2b55000 19213->19217 19218 2b52f74 _free 59 API calls 19214->19218 19219 2b52f74 _free 59 API calls 19215->19219 19216 2b52f74 _free 59 API calls 19222 2b55033 19216->19222 19223 2b5d3da ___free_lconv_mon 59 API calls 19217->19223 19224 2b55119 19218->19224 19225 2b55080 19219->19225 19220->19211 19226 2b5501e 19221->19226 19227 2b52f74 _free 59 API calls 19222->19227 19223->19208 19224->19195 19228 2b52f74 _free 59 API calls 19225->19228 19229 2b5d4d6 ___free_lconv_num 59 API calls 19226->19229 19227->19202 19228->19204 19229->19230 19230->19216 19231->19200 19235 2b58a58 RtlLeaveCriticalSection 19232->19235 19234 2b555e5 19234->19190 19235->19234 19237 2b555f3 ___DllMainCRTStartup 19236->19237 19238 2b55c5a _CallSETranslator 59 API calls 19237->19238 19239 2b555fb 19238->19239 19240 2b55541 _LocaleUpdate::_LocaleUpdate 59 API calls 19239->19240 19241 2b55605 19240->19241 19261 2b552e2 19241->19261 19244 2b58ab5 __malloc_crt 59 API calls 19245 2b55627 19244->19245 19255 2b55754 ___DllMainCRTStartup 19245->19255 19268 2b5578f 19245->19268 19248 2b55764 19251 2b55777 19248->19251 19253 2b52f74 _free 59 API calls 19248->19253 19248->19255 19249 2b5565d 19250 2b5567d 19249->19250 19252 2b52f74 _free 59 API calls 19249->19252 19250->19255 19256 2b588ee __lock 59 API calls 19250->19256 19254 2b55e5b __tolower_l 59 API calls 19251->19254 19252->19250 19253->19251 19254->19255 19255->19145 19257 2b556ac 19256->19257 19258 2b5573a 19257->19258 19260 2b52f74 _free 59 API calls 19257->19260 19278 2b55759 19258->19278 19260->19258 19262 2b5227b _LocaleUpdate::_LocaleUpdate 59 API calls 19261->19262 19263 2b552f2 19262->19263 19264 2b55301 GetOEMCP 19263->19264 19265 2b55313 19263->19265 19266 2b5532a 19264->19266 19265->19266 19267 2b55318 GetACP 19265->19267 19266->19244 19266->19255 19267->19266 19269 2b552e2 getSystemCP 61 API calls 19268->19269 19270 2b557ac 19269->19270 19273 2b557fd IsValidCodePage 19270->19273 19275 2b557b3 setSBCS 19270->19275 19277 2b55822 __setmbcp_nolock 19270->19277 19271 2b5454b __setmbcp_nolock 6 API calls 19272 2b5564e 19271->19272 19272->19248 19272->19249 19274 2b5580f GetCPInfo 19273->19274 19273->19275 19274->19275 19274->19277 19275->19271 19281 2b553af GetCPInfo 19277->19281 19347 2b58a58 RtlLeaveCriticalSection 19278->19347 19280 2b55760 19280->19255 19287 2b553e7 19281->19287 19290 2b55491 19281->19290 19284 2b5454b __setmbcp_nolock 6 API calls 19286 2b5553d 19284->19286 19286->19275 19291 2b5dc1d 19287->19291 19289 2b5dac1 ___crtLCMapStringA 63 API calls 19289->19290 19290->19284 19292 2b5227b _LocaleUpdate::_LocaleUpdate 59 API calls 19291->19292 19293 2b5dc2e 19292->19293 19301 2b5db25 19293->19301 19296 2b5dac1 19297 2b5227b _LocaleUpdate::_LocaleUpdate 59 API calls 19296->19297 19298 2b5dad2 19297->19298 19318 2b5d8bd 19298->19318 19302 2b5db4c MultiByteToWideChar 19301->19302 19303 2b5db3f 19301->19303 19304 2b5db71 19302->19304 19307 2b5db78 19302->19307 19303->19302 19305 2b5454b __setmbcp_nolock 6 API calls 19304->19305 19306 2b55448 19305->19306 19306->19296 19308 2b52fac _malloc 59 API calls 19307->19308 19310 2b5db9a __setmbcp_nolock 19307->19310 19308->19310 19309 2b5dbd6 MultiByteToWideChar 19311 2b5dc00 19309->19311 19312 2b5dbf0 GetStringTypeW 19309->19312 19310->19304 19310->19309 19314 2b5db07 19311->19314 19312->19311 19315 2b5db11 19314->19315 19316 2b5db22 19314->19316 19315->19316 19317 2b52f74 _free 59 API calls 19315->19317 19316->19304 19317->19316 19320 2b5d8d6 MultiByteToWideChar 19318->19320 19321 2b5d935 19320->19321 19325 2b5d93c 19320->19325 19322 2b5454b __setmbcp_nolock 6 API calls 19321->19322 19323 2b55469 19322->19323 19323->19289 19324 2b5d99b MultiByteToWideChar 19326 2b5d9b4 19324->19326 19335 2b5da02 19324->19335 19327 2b5d964 19325->19327 19328 2b52fac _malloc 59 API calls 19325->19328 19343 2b5f6e8 19326->19343 19327->19321 19327->19324 19328->19327 19330 2b5db07 __freea 59 API calls 19330->19321 19331 2b5d9c8 19332 2b5d9de 19331->19332 19334 2b5da0a 19331->19334 19331->19335 19333 2b5f6e8 __crtLCMapStringA_stat LCMapStringW 19332->19333 19332->19335 19333->19335 19338 2b52fac _malloc 59 API calls 19334->19338 19341 2b5da32 19334->19341 19335->19330 19336 2b5f6e8 __crtLCMapStringA_stat LCMapStringW 19337 2b5da75 19336->19337 19339 2b5da9d 19337->19339 19342 2b5da8f WideCharToMultiByte 19337->19342 19338->19341 19340 2b5db07 __freea 59 API calls 19339->19340 19340->19335 19341->19335 19341->19336 19342->19339 19344 2b5f713 __crtLCMapStringA_stat 19343->19344 19345 2b5f6f8 19343->19345 19346 2b5f72a LCMapStringW 19344->19346 19345->19331 19346->19331 19347->19280 19349 2b5d2e2 RtlEncodePointer 19348->19349 19349->19349 19350 2b5d2fc 19349->19350 19350->19065 19352 2b591c3 TlsFree 19351->19352 19353 2b591bf 19351->19353 19352->19070 19353->19070 19356 2b55afb ___DllMainCRTStartup 19354->19356 19355 2b55b14 19359 2b55b23 19355->19359 19360 2b52f74 _free 59 API calls 19355->19360 19356->19355 19357 2b55c03 ___DllMainCRTStartup 19356->19357 19358 2b52f74 _free 59 API calls 19356->19358 19357->19114 19358->19355 19361 2b55b32 19359->19361 19363 2b52f74 _free 59 API calls 19359->19363 19360->19359 19362 2b55b41 19361->19362 19364 2b52f74 _free 59 API calls 19361->19364 19365 2b55b50 19362->19365 19366 2b52f74 _free 59 API calls 19362->19366 19363->19361 19364->19362 19367 2b55b5f 19365->19367 19368 2b52f74 _free 59 API calls 19365->19368 19366->19365 19369 2b55b6e 19367->19369 19371 2b52f74 _free 59 API calls 19367->19371 19368->19367 19370 2b55b80 19369->19370 19372 2b52f74 _free 59 API calls 19369->19372 19373 2b588ee __lock 59 API calls 19370->19373 19371->19369 19372->19370 19374 2b55b88 19373->19374 19378 2b52f74 _free 59 API calls 19374->19378 19379 2b55bab 19374->19379 19377 2b588ee __lock 59 API calls 19384 2b55bbf ___removelocaleref 19377->19384 19378->19379 19386 2b55c0f 19379->19386 19380 2b55bf0 19389 2b55c1b 19380->19389 19383 2b52f74 _free 59 API calls 19383->19357 19384->19380 19385 2b54fc5 ___freetlocinfo 59 API calls 19384->19385 19385->19380 19392 2b58a58 RtlLeaveCriticalSection 19386->19392 19388 2b55bb8 19388->19377 19393 2b58a58 RtlLeaveCriticalSection 19389->19393 19391 2b55bfd 19391->19383 19392->19388 19393->19391 19394 4027fb 19395 40275c OpenSCManagerA 19394->19395 19397 40b1bf 19395->19397 19398 4022fc 19399 40223a RegCreateKeyExA 19398->19399 19400 40b314 19398->19400 19399->19400 19401 2b7f5ca 19404 2b4f9a7 LoadLibraryA 19401->19404 19405 2b4f9d0 GetProcAddress 19404->19405 19406 2b4fa8a 19404->19406 19407 2b4fa83 FreeLibrary 19405->19407 19409 2b4f9e4 19405->19409 19407->19406 19408 2b4f9f6 GetAdaptersInfo 19408->19409 19409->19408 19410 2b4fa7e 19409->19410 19411 2b53b4c _Allocate 60 API calls 19409->19411 19410->19407 19411->19409 19412 2b4648b RtlInitializeCriticalSection 19413 2b464c6 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19412->19413 19491 2b442c7 19413->19491 19415 2b464f3 GetTickCount 19416 2b4605a 59 API calls 19415->19416 19417 2b46508 GetVersionExA 19416->19417 19418 2b46549 __setmbcp_nolock 19417->19418 19419 2b52fac _malloc 59 API calls 19418->19419 19420 2b46556 19419->19420 19421 2b52fac _malloc 59 API calls 19420->19421 19422 2b46566 19421->19422 19423 2b52fac _malloc 59 API calls 19422->19423 19424 2b46571 19423->19424 19425 2b52fac _malloc 59 API calls 19424->19425 19426 2b4657c 19425->19426 19427 2b52fac _malloc 59 API calls 19426->19427 19428 2b46587 19427->19428 19429 2b52fac _malloc 59 API calls 19428->19429 19430 2b46592 19429->19430 19431 2b52fac _malloc 59 API calls 19430->19431 19432 2b4659d 19431->19432 19433 2b52fac _malloc 59 API calls 19432->19433 19434 2b465ac 6 API calls 19433->19434 19435 2b465ff __setmbcp_nolock 19434->19435 19436 2b46618 RtlEnterCriticalSection RtlLeaveCriticalSection 19435->19436 19437 2b52fac _malloc 59 API calls 19436->19437 19438 2b46657 19437->19438 19439 2b52fac _malloc 59 API calls 19438->19439 19440 2b46665 19439->19440 19441 2b52fac _malloc 59 API calls 19440->19441 19442 2b4666c 19441->19442 19443 2b52fac _malloc 59 API calls 19442->19443 19444 2b46692 QueryPerformanceCounter Sleep 19443->19444 19445 2b52fac _malloc 59 API calls 19444->19445 19446 2b466bf 19445->19446 19447 2b52fac _malloc 59 API calls 19446->19447 19482 2b466cc __setmbcp_nolock 19447->19482 19448 2b4670e RtlEnterCriticalSection RtlLeaveCriticalSection 19448->19482 19449 2b46708 Sleep 19449->19448 19450 2b472ab InternetOpenA 19451 2b472c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19450->19451 19450->19482 19456 2b47342 __setmbcp_nolock 19451->19456 19452 2b47322 InternetOpenUrlA 19453 2b47382 InternetCloseHandle 19452->19453 19452->19456 19453->19482 19454 2b47346 InternetReadFile 19455 2b47377 InternetCloseHandle 19454->19455 19454->19456 19455->19453 19456->19452 19456->19454 19457 2b473e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19458 2b5233c 66 API calls 19457->19458 19458->19482 19459 2b5233c 66 API calls 19459->19482 19460 2b52fac _malloc 59 API calls 19461 2b4749d RtlEnterCriticalSection RtlLeaveCriticalSection 19460->19461 19461->19482 19462 2b4776a RtlEnterCriticalSection RtlLeaveCriticalSection 19462->19482 19463 2b461f5 59 API calls 19463->19482 19464 2b52418 _sprintf 79 API calls 19464->19482 19465 2b41ba7 279 API calls 19465->19482 19466 2b478e2 RtlEnterCriticalSection 19467 2b4790f RtlLeaveCriticalSection 19466->19467 19466->19482 19468 2b43c67 72 API calls 19467->19468 19468->19482 19469 2b4534d 93 API calls 19469->19482 19470 2b52fac 59 API calls _malloc 19470->19482 19471 2b52f74 59 API calls _free 19471->19482 19472 2b43d7e 64 API calls 19472->19482 19473 2b4833b 89 API calls 19473->19482 19474 2b535e6 60 API calls _strtok 19474->19482 19475 2b49003 88 API calls 19475->19482 19476 2b53b4c _Allocate 60 API calls 19476->19482 19477 2b483ea 71 API calls 19477->19482 19478 2b52850 _swscanf 59 API calls 19478->19482 19479 2b433b2 86 API calls 19479->19482 19480 2b49737 279 API calls 19480->19482 19481 2b4a84f 60 API calls 19481->19482 19482->19448 19482->19449 19482->19450 19482->19457 19482->19459 19482->19460 19482->19462 19482->19463 19482->19464 19482->19465 19482->19466 19482->19467 19482->19469 19482->19470 19482->19471 19482->19472 19482->19473 19482->19474 19482->19475 19482->19476 19482->19477 19482->19478 19482->19479 19482->19480 19482->19481 19482->19482 19483 2b4a725 73 API calls 19482->19483 19484 2b45119 103 API calls 19482->19484 19485 2b4d117 73 API calls 19482->19485 19486 2b4ac0f 279 API calls 19482->19486 19487 2b476e7 shared_ptr 19482->19487 19488 2b476ec Sleep 19482->19488 19483->19482 19484->19482 19485->19482 19486->19482 19487->19482 19487->19488 19490 2b44100 GetProcessHeap HeapFree 19487->19490 19489 2b518f0 GetProcessHeap HeapFree 19488->19489 19489->19487 19490->19487

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 2b472ab-2b472c3 InternetOpenA 1 2b47389-2b4738f 0->1 2 2b472c9-2b47340 InternetSetOptionA * 3 call 2b54af0 InternetOpenUrlA 0->2 3 2b47391-2b47397 1->3 4 2b473ab-2b473b9 1->4 15 2b47382-2b47383 InternetCloseHandle 2->15 16 2b47342 2->16 6 2b4739d-2b473aa call 2b453ec 3->6 7 2b47399-2b4739b 3->7 8 2b466f4-2b466f6 4->8 9 2b473bf-2b473e3 call 2b54af0 call 2b4439c 4->9 6->4 7->4 13 2b466ff-2b46701 8->13 14 2b466f8-2b466fd 8->14 9->8 33 2b473e9-2b47417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2b5233c 9->33 19 2b46703 13->19 20 2b4670e-2b46742 RtlEnterCriticalSection RtlLeaveCriticalSection 13->20 21 2b46708 Sleep 14->21 15->1 22 2b47346-2b4736c InternetReadFile 16->22 19->21 23 2b46744-2b46750 20->23 24 2b46792 20->24 21->20 26 2b47377-2b4737e InternetCloseHandle 22->26 27 2b4736e-2b47375 22->27 23->24 28 2b46752-2b4675f 23->28 29 2b46796 24->29 26->15 27->22 31 2b46767-2b46768 28->31 32 2b46761-2b46765 28->32 29->0 34 2b4676c-2b46790 call 2b54af0 * 2 31->34 32->34 38 2b4746d-2b47488 call 2b5233c 33->38 39 2b47419-2b4742b call 2b5233c 33->39 34->29 47 2b47742-2b47754 call 2b5233c 38->47 48 2b4748e-2b47490 38->48 39->38 49 2b4742d-2b4743f call 2b5233c 39->49 56 2b47756-2b47758 47->56 57 2b4779d-2b477af call 2b5233c 47->57 48->47 51 2b47496-2b47548 call 2b52fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2b54af0 * 5 call 2b4439c * 2 48->51 49->38 59 2b47441-2b47453 call 2b5233c 49->59 112 2b47585 51->112 113 2b4754a-2b4754c 51->113 56->57 60 2b4775a-2b47798 call 2b54af0 RtlEnterCriticalSection RtlLeaveCriticalSection 56->60 70 2b477d0-2b477e2 call 2b5233c 57->70 71 2b477b1-2b477cb call 2b461f5 call 2b46303 call 2b4640e 57->71 59->38 72 2b47455-2b47467 call 2b5233c 59->72 60->8 81 2b47b00-2b47b12 call 2b5233c 70->81 82 2b477e8-2b477ea 70->82 71->8 72->8 72->38 81->8 94 2b47b18-2b47b46 call 2b52fac call 2b54af0 call 2b4439c 81->94 82->81 86 2b477f0-2b47807 call 2b4439c 82->86 86->8 98 2b4780d-2b478db call 2b52418 call 2b41ba7 86->98 120 2b47b4f-2b47b56 call 2b52f74 94->120 121 2b47b48-2b47b4a call 2b4534d 94->121 115 2b478e2-2b47903 RtlEnterCriticalSection 98->115 116 2b478dd call 2b4143f 98->116 122 2b47589-2b475b7 call 2b52fac call 2b54af0 call 2b4439c 112->122 113->112 119 2b4754e-2b47560 call 2b5233c 113->119 117 2b47905-2b4790c 115->117 118 2b4790f-2b47973 RtlLeaveCriticalSection call 2b43c67 call 2b43d7e call 2b4833b 115->118 116->115 117->118 146 2b47ae7-2b47afb call 2b49003 118->146 147 2b47979-2b479c1 call 2b4a725 118->147 119->112 134 2b47562-2b47583 call 2b4439c 119->134 120->8 121->120 144 2b475f8-2b47601 call 2b52f74 122->144 145 2b475b9-2b475c8 call 2b535e6 122->145 134->122 159 2b47607-2b4761f call 2b53b4c 144->159 160 2b47738-2b4773b 144->160 145->144 156 2b475ca 145->156 146->8 157 2b479c7-2b479ce 147->157 158 2b47ab1-2b47ae2 call 2b483ea call 2b433b2 147->158 162 2b475cf-2b475e1 call 2b52850 156->162 164 2b479d1-2b479d6 157->164 158->146 169 2b47621-2b47629 call 2b49737 159->169 170 2b4762b 159->170 160->47 176 2b475e6-2b475f6 call 2b535e6 162->176 177 2b475e3 162->177 164->164 168 2b479d8-2b47a23 call 2b4a725 164->168 168->158 179 2b47a29-2b47a2f 168->179 175 2b4762d-2b476e5 call 2b4a84f call 2b43863 call 2b45119 call 2b43863 call 2b4aaf5 call 2b4ac0f 169->175 170->175 202 2b476e7 call 2b4380b 175->202 203 2b476ec-2b47717 Sleep call 2b518f0 175->203 176->144 176->162 177->176 183 2b47a32-2b47a37 179->183 183->183 186 2b47a39-2b47a74 call 2b4a725 183->186 186->158 192 2b47a76-2b47ab0 call 2b4d117 186->192 192->158 202->203 207 2b47723-2b47731 203->207 208 2b47719-2b47722 call 2b44100 203->208 207->160 210 2b47733 call 2b4380b 207->210 208->207 210->160
                                                                  APIs
                                                                  • Sleep.KERNEL32(0000EA60), ref: 02B46708
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B46713
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B46724
                                                                  • InternetOpenA.WININET(?), ref: 02B472B5
                                                                  • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02B472DD
                                                                  • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02B472F5
                                                                  • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02B4730D
                                                                  • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02B47336
                                                                  • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02B47358
                                                                  • InternetCloseHandle.WININET(00000000), ref: 02B47378
                                                                  • InternetCloseHandle.WININET(00000000), ref: 02B47383
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B473EE
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B473FF
                                                                  • _malloc.LIBCMT ref: 02B47498
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B474AA
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B474B6
                                                                  • _malloc.LIBCMT ref: 02B4758E
                                                                  • _strtok.LIBCMT ref: 02B475BF
                                                                  • _swscanf.LIBCMT ref: 02B475D6
                                                                  • _strtok.LIBCMT ref: 02B475ED
                                                                  • _free.LIBCMT ref: 02B475F9
                                                                  • Sleep.KERNEL32(000007D0), ref: 02B476F1
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B47772
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B47784
                                                                  • _sprintf.LIBCMT ref: 02B47822
                                                                  • RtlEnterCriticalSection.NTDLL(00000020), ref: 02B478E6
                                                                  • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02B4791A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                  • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                  • API String ID: 1657546717-1839899575
                                                                  • Opcode ID: 9359c1e8cb69eada12a19329ff7ce0fb49ffc5f7e4e1e378c033a0d7d17937c6
                                                                  • Instruction ID: fee6fd98006ccbbb8d7eca65d8443df4321cf9ab13c35d56b467db51eb883b83
                                                                  • Opcode Fuzzy Hash: 9359c1e8cb69eada12a19329ff7ce0fb49ffc5f7e4e1e378c033a0d7d17937c6
                                                                  • Instruction Fuzzy Hash: 55326632648381AFE734AB24DC84BAFB7E5EF85304F14489DF9898B291DF749444EB52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 213 2b4648b-2b466f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2b442c7 GetTickCount call 2b4605a GetVersionExA call 2b54af0 call 2b52fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2b54af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2b52fac * 4 QueryPerformanceCounter Sleep call 2b52fac * 2 call 2b54af0 * 2 259 2b466f4-2b466f6 213->259 260 2b466ff-2b46701 259->260 261 2b466f8-2b466fd 259->261 262 2b46703 260->262 263 2b4670e-2b46742 RtlEnterCriticalSection RtlLeaveCriticalSection 260->263 264 2b46708 Sleep 261->264 262->264 265 2b46744-2b46750 263->265 266 2b46792 263->266 264->263 265->266 267 2b46752-2b4675f 265->267 268 2b46796-2b472c3 InternetOpenA 266->268 269 2b46767-2b46768 267->269 270 2b46761-2b46765 267->270 273 2b47389-2b4738f 268->273 274 2b472c9-2b47340 InternetSetOptionA * 3 call 2b54af0 InternetOpenUrlA 268->274 272 2b4676c-2b46790 call 2b54af0 * 2 269->272 270->272 272->268 275 2b47391-2b47397 273->275 276 2b473ab-2b473b9 273->276 287 2b47382-2b47383 InternetCloseHandle 274->287 288 2b47342 274->288 279 2b4739d-2b473aa call 2b453ec 275->279 280 2b47399-2b4739b 275->280 276->259 282 2b473bf-2b473e3 call 2b54af0 call 2b4439c 276->282 279->276 280->276 282->259 297 2b473e9-2b47417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2b5233c 282->297 287->273 292 2b47346-2b4736c InternetReadFile 288->292 294 2b47377-2b4737e InternetCloseHandle 292->294 295 2b4736e-2b47375 292->295 294->287 295->292 300 2b4746d-2b47488 call 2b5233c 297->300 301 2b47419-2b4742b call 2b5233c 297->301 306 2b47742-2b47754 call 2b5233c 300->306 307 2b4748e-2b47490 300->307 301->300 308 2b4742d-2b4743f call 2b5233c 301->308 315 2b47756-2b47758 306->315 316 2b4779d-2b477af call 2b5233c 306->316 307->306 310 2b47496-2b47548 call 2b52fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2b54af0 * 5 call 2b4439c * 2 307->310 308->300 318 2b47441-2b47453 call 2b5233c 308->318 371 2b47585 310->371 372 2b4754a-2b4754c 310->372 315->316 319 2b4775a-2b47798 call 2b54af0 RtlEnterCriticalSection RtlLeaveCriticalSection 315->319 329 2b477d0-2b477e2 call 2b5233c 316->329 330 2b477b1-2b477bf call 2b461f5 call 2b46303 316->330 318->300 331 2b47455-2b47467 call 2b5233c 318->331 319->259 340 2b47b00-2b47b12 call 2b5233c 329->340 341 2b477e8-2b477ea 329->341 347 2b477c4-2b477cb call 2b4640e 330->347 331->259 331->300 340->259 353 2b47b18-2b47b46 call 2b52fac call 2b54af0 call 2b4439c 340->353 341->340 345 2b477f0-2b47807 call 2b4439c 341->345 345->259 357 2b4780d-2b478db call 2b52418 call 2b41ba7 345->357 347->259 379 2b47b4f-2b47b56 call 2b52f74 353->379 380 2b47b48-2b47b4a call 2b4534d 353->380 374 2b478e2-2b47903 RtlEnterCriticalSection 357->374 375 2b478dd call 2b4143f 357->375 381 2b47589-2b475b7 call 2b52fac call 2b54af0 call 2b4439c 371->381 372->371 378 2b4754e-2b47560 call 2b5233c 372->378 376 2b47905-2b4790c 374->376 377 2b4790f-2b47973 RtlLeaveCriticalSection call 2b43c67 call 2b43d7e call 2b4833b 374->377 375->374 376->377 405 2b47ae7-2b47afb call 2b49003 377->405 406 2b47979-2b479c1 call 2b4a725 377->406 378->371 393 2b47562-2b47583 call 2b4439c 378->393 379->259 380->379 403 2b475f8-2b47601 call 2b52f74 381->403 404 2b475b9-2b475c8 call 2b535e6 381->404 393->381 418 2b47607-2b4761f call 2b53b4c 403->418 419 2b47738-2b4773b 403->419 404->403 415 2b475ca 404->415 405->259 416 2b479c7-2b479ce 406->416 417 2b47ab1-2b47ae2 call 2b483ea call 2b433b2 406->417 421 2b475cf-2b475e1 call 2b52850 415->421 423 2b479d1-2b479d6 416->423 417->405 428 2b47621-2b47629 call 2b49737 418->428 429 2b4762b 418->429 419->306 435 2b475e6-2b475f6 call 2b535e6 421->435 436 2b475e3 421->436 423->423 427 2b479d8-2b47a23 call 2b4a725 423->427 427->417 438 2b47a29-2b47a2f 427->438 434 2b4762d-2b476cf call 2b4a84f call 2b43863 call 2b45119 call 2b43863 call 2b4aaf5 call 2b4ac0f 428->434 429->434 460 2b476d4-2b476e5 434->460 435->403 435->421 436->435 442 2b47a32-2b47a37 438->442 442->442 445 2b47a39-2b47a74 call 2b4a725 442->445 445->417 451 2b47a76-2b47aaa call 2b4d117 445->451 455 2b47aaf-2b47ab0 451->455 455->417 461 2b476e7 call 2b4380b 460->461 462 2b476ec-2b47717 Sleep call 2b518f0 460->462 461->462 466 2b47723-2b47731 462->466 467 2b47719-2b47722 call 2b44100 462->467 466->419 469 2b47733 call 2b4380b 466->469 467->466 469->419
                                                                  APIs
                                                                  • RtlInitializeCriticalSection.NTDLL(02B771E0), ref: 02B464BA
                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02B464D1
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02B464DA
                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02B464E9
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02B464EC
                                                                  • GetTickCount.KERNEL32 ref: 02B464F8
                                                                    • Part of subcall function 02B4605A: _malloc.LIBCMT ref: 02B46068
                                                                  • GetVersionExA.KERNEL32(02B77038), ref: 02B46525
                                                                  • _malloc.LIBCMT ref: 02B46551
                                                                    • Part of subcall function 02B52FAC: __FF_MSGBANNER.LIBCMT ref: 02B52FC3
                                                                    • Part of subcall function 02B52FAC: __NMSG_WRITE.LIBCMT ref: 02B52FCA
                                                                    • Part of subcall function 02B52FAC: RtlAllocateHeap.NTDLL(009E0000,00000000,00000001), ref: 02B52FEF
                                                                  • _malloc.LIBCMT ref: 02B46561
                                                                  • _malloc.LIBCMT ref: 02B4656C
                                                                  • _malloc.LIBCMT ref: 02B46577
                                                                  • _malloc.LIBCMT ref: 02B46582
                                                                  • _malloc.LIBCMT ref: 02B4658D
                                                                  • _malloc.LIBCMT ref: 02B46598
                                                                  • _malloc.LIBCMT ref: 02B465A7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02B465BE
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02B465C7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B465D6
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02B465D9
                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B465E4
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02B465E7
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B46621
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B4662E
                                                                  • _malloc.LIBCMT ref: 02B46652
                                                                  • _malloc.LIBCMT ref: 02B46660
                                                                  • _malloc.LIBCMT ref: 02B46667
                                                                  • _malloc.LIBCMT ref: 02B4668D
                                                                  • QueryPerformanceCounter.KERNEL32(00000200), ref: 02B466A0
                                                                  • Sleep.KERNEL32 ref: 02B466AE
                                                                  • _malloc.LIBCMT ref: 02B466BA
                                                                  • _malloc.LIBCMT ref: 02B466C7
                                                                  • Sleep.KERNEL32(0000EA60), ref: 02B46708
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B46713
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B46724
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                  • API String ID: 4273019447-2678694477
                                                                  • Opcode ID: de035b9effc3d549c8781877c5a20f139e5462c8b54d196c958cc87b547b3ae2
                                                                  • Instruction ID: 87870525aa61d042968e00c61c2b42a7c515c11a1a1309951389b14b94f15b2e
                                                                  • Opcode Fuzzy Hash: de035b9effc3d549c8781877c5a20f139e5462c8b54d196c958cc87b547b3ae2
                                                                  • Instruction Fuzzy Hash: F871C571D49350AFE3106F30AC49B1BBBE8EF85354F140899F9959B280DFB85850DFA6

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 970 401b4b-401b68 LoadLibraryA 971 401c21-401c25 970->971 972 401b6e-401b7f GetProcAddress 970->972 973 401b85-401b8e 972->973 974 401c18-401c1b FreeLibrary 972->974 975 401b95-401ba5 GetAdaptersInfo 973->975 974->971 976 401ba7-401bb0 975->976 977 401bdb-401be3 975->977 978 401bc1-401bd7 call 402c00 call 4018cc 976->978 979 401bb2-401bb6 976->979 980 401be5-401beb call 402be6 977->980 981 401bec-401bf0 977->981 978->977 979->977 984 401bb8-401bbf 979->984 980->981 982 401bf2-401bf6 981->982 983 401c15-401c17 981->983 982->983 987 401bf8-401bfb 982->987 983->974 984->978 984->979 990 401c06-401c13 call 402bd8 987->990 991 401bfd-401c03 987->991 990->975 990->983 991->990
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00401B5D
                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                  • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                  • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                  • API String ID: 514930453-3667123677
                                                                  • Opcode ID: 3cd57b5b5f7382286250fec5c445be60da6c6eb2f88f5899d85352d98f18f140
                                                                  • Instruction ID: 744dc4a2c61c30a7a6d7e8a73864704848065a578bcb68ef5ad54dac6e152950
                                                                  • Opcode Fuzzy Hash: 3cd57b5b5f7382286250fec5c445be60da6c6eb2f88f5899d85352d98f18f140
                                                                  • Instruction Fuzzy Hash: FB21A770944109AEEF11DF65CD447EF7BB8EF41344F1440BAE504B22E1E778A985CB69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1288 2b4f9a7-2b4f9ca LoadLibraryA 1289 2b4f9d0-2b4f9de GetProcAddress 1288->1289 1290 2b4fa8a-2b4fa91 1288->1290 1291 2b4f9e4-2b4f9f4 1289->1291 1292 2b4fa83-2b4fa84 FreeLibrary 1289->1292 1293 2b4f9f6-2b4fa02 GetAdaptersInfo 1291->1293 1292->1290 1294 2b4fa04 1293->1294 1295 2b4fa3a-2b4fa42 1293->1295 1296 2b4fa06-2b4fa0d 1294->1296 1297 2b4fa44-2b4fa4a call 2b537a8 1295->1297 1298 2b4fa4b-2b4fa50 1295->1298 1302 2b4fa17-2b4fa1f 1296->1302 1303 2b4fa0f-2b4fa13 1296->1303 1297->1298 1300 2b4fa52-2b4fa55 1298->1300 1301 2b4fa7e-2b4fa82 1298->1301 1300->1301 1305 2b4fa57-2b4fa5c 1300->1305 1301->1292 1307 2b4fa22-2b4fa27 1302->1307 1303->1296 1306 2b4fa15 1303->1306 1308 2b4fa5e-2b4fa66 1305->1308 1309 2b4fa69-2b4fa74 call 2b53b4c 1305->1309 1306->1295 1307->1307 1310 2b4fa29-2b4fa36 call 2b4f6f6 1307->1310 1308->1309 1309->1301 1315 2b4fa76-2b4fa79 1309->1315 1310->1295 1315->1293
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02B4F9BD
                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02B4F9D6
                                                                  • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02B4F9FB
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 02B4FA84
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                  • API String ID: 514930453-3114217049
                                                                  • Opcode ID: d016bef5605291d5922acd621c9090edad92e12575a7723a060d77685f979378
                                                                  • Instruction ID: f399ab87749bbed080509d1c4672e2a5684a238b7669c0cd6803694746999b1f
                                                                  • Opcode Fuzzy Hash: d016bef5605291d5922acd621c9090edad92e12575a7723a060d77685f979378
                                                                  • Instruction Fuzzy Hash: 0121D231E00209ABDB10DBA8D8C4AFEBBF8EF08344F1441EAD954E7650DF348A45DBA0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1373 2b4f8a3-2b4f8ce CreateFileA 1374 2b4f8d4-2b4f8e9 1373->1374 1375 2b4f99f-2b4f9a6 1373->1375 1376 2b4f8ec-2b4f90e DeviceIoControl 1374->1376 1377 2b4f947-2b4f94f 1376->1377 1378 2b4f910-2b4f918 1376->1378 1381 2b4f951-2b4f957 call 2b537a8 1377->1381 1382 2b4f958-2b4f95a 1377->1382 1379 2b4f921-2b4f926 1378->1379 1380 2b4f91a-2b4f91f 1378->1380 1379->1377 1386 2b4f928-2b4f930 1379->1386 1380->1377 1381->1382 1384 2b4f995-2b4f99e CloseHandle 1382->1384 1385 2b4f95c-2b4f95f 1382->1385 1384->1375 1388 2b4f961-2b4f96a GetLastError 1385->1388 1389 2b4f97b-2b4f988 call 2b53b4c 1385->1389 1390 2b4f933-2b4f938 1386->1390 1388->1384 1391 2b4f96c-2b4f96f 1388->1391 1389->1384 1397 2b4f98a-2b4f990 1389->1397 1390->1390 1393 2b4f93a-2b4f946 call 2b4f6f6 1390->1393 1391->1389 1394 2b4f971-2b4f978 1391->1394 1393->1377 1394->1389 1397->1376
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02B4F8C2
                                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02B4F900
                                                                  • GetLastError.KERNEL32 ref: 02B4F961
                                                                  • CloseHandle.KERNEL32(?), ref: 02B4F998
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                  • String ID: \\.\PhysicalDrive0
                                                                  • API String ID: 4026078076-1180397377
                                                                  • Opcode ID: 4625b40f0c57f7f400dfa8e0e6fd714208b7d7e5efda21619a968d6c4df25193
                                                                  • Instruction ID: 247970050d7661a6dccbd20d2b9efdf81add174b003909c4a33f4398e1baab1f
                                                                  • Opcode Fuzzy Hash: 4625b40f0c57f7f400dfa8e0e6fd714208b7d7e5efda21619a968d6c4df25193
                                                                  • Instruction Fuzzy Hash: 5831A371D00219BBDF14DF94D888BBEBBB9FF05754F2041A9E604A7680DB709A00DB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1399 401a4f-401a77 CreateFileA 1400 401b45-401b4a 1399->1400 1401 401a7d-401a91 1399->1401 1402 401a98-401ac0 DeviceIoControl 1401->1402 1403 401ac2-401aca 1402->1403 1404 401af3-401afb 1402->1404 1407 401ad4-401ad9 1403->1407 1408 401acc-401ad2 1403->1408 1405 401b04-401b07 1404->1405 1406 401afd-401b03 call 402be6 1404->1406 1411 401b09-401b0c 1405->1411 1412 401b3a-401b44 CloseHandle 1405->1412 1406->1405 1407->1404 1409 401adb-401af1 call 402c00 call 4018cc 1407->1409 1408->1404 1409->1404 1415 401b27-401b34 call 402bd8 1411->1415 1416 401b0e-401b17 GetLastError 1411->1416 1412->1400 1415->1402 1415->1412 1416->1412 1418 401b19-401b1c 1416->1418 1418->1415 1422 401b1e-401b24 1418->1422 1422->1415
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                  • DeviceIoControl.KERNEL32(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                  • GetLastError.KERNEL32 ref: 00401B0E
                                                                  • CloseHandle.KERNEL32(?), ref: 00401B3D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                  • String ID: \\.\PhysicalDrive0
                                                                  • API String ID: 4026078076-1180397377
                                                                  • Opcode ID: fd3d7e55200b9048e553272cc6cf421996b3d61c1706a42d5402815c35150978
                                                                  • Instruction ID: fc5459d69a5e6c49bca5cc78d3dc221f071340c211699d49f4a7d64a8e61b194
                                                                  • Opcode Fuzzy Hash: fd3d7e55200b9048e553272cc6cf421996b3d61c1706a42d5402815c35150978
                                                                  • Instruction Fuzzy Hash: 0D318D71D00118EACB21EFA5CD849EFBBB9FF41750F20407AE514B22A0E3786E45CB98

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 472 2b4643f-2b46458 473 2b464c6-2b466f1 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2b442c7 GetTickCount call 2b4605a GetVersionExA call 2b54af0 call 2b52fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2b54af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2b52fac * 4 QueryPerformanceCounter Sleep call 2b52fac * 2 call 2b54af0 * 2 472->473 474 2b4645a-2b4648a 472->474 519 2b466f4-2b466f6 473->519 474->473 520 2b466ff-2b46701 519->520 521 2b466f8-2b466fd 519->521 522 2b46703 520->522 523 2b4670e-2b46742 RtlEnterCriticalSection RtlLeaveCriticalSection 520->523 524 2b46708 Sleep 521->524 522->524 525 2b46744-2b46750 523->525 526 2b46792 523->526 524->523 525->526 527 2b46752-2b4675f 525->527 528 2b46796-2b472c3 InternetOpenA 526->528 529 2b46767-2b46768 527->529 530 2b46761-2b46765 527->530 533 2b47389-2b4738f 528->533 534 2b472c9-2b47340 InternetSetOptionA * 3 call 2b54af0 InternetOpenUrlA 528->534 532 2b4676c-2b46790 call 2b54af0 * 2 529->532 530->532 532->528 535 2b47391-2b47397 533->535 536 2b473ab-2b473b9 533->536 547 2b47382-2b47383 InternetCloseHandle 534->547 548 2b47342 534->548 539 2b4739d-2b473aa call 2b453ec 535->539 540 2b47399-2b4739b 535->540 536->519 542 2b473bf-2b473e3 call 2b54af0 call 2b4439c 536->542 539->536 540->536 542->519 557 2b473e9-2b47417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2b5233c 542->557 547->533 552 2b47346-2b4736c InternetReadFile 548->552 554 2b47377-2b4737e InternetCloseHandle 552->554 555 2b4736e-2b47375 552->555 554->547 555->552 560 2b4746d-2b47488 call 2b5233c 557->560 561 2b47419-2b4742b call 2b5233c 557->561 566 2b47742-2b47754 call 2b5233c 560->566 567 2b4748e-2b47490 560->567 561->560 568 2b4742d-2b4743f call 2b5233c 561->568 575 2b47756-2b47758 566->575 576 2b4779d-2b477af call 2b5233c 566->576 567->566 570 2b47496-2b47548 call 2b52fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2b54af0 * 5 call 2b4439c * 2 567->570 568->560 578 2b47441-2b47453 call 2b5233c 568->578 631 2b47585 570->631 632 2b4754a-2b4754c 570->632 575->576 579 2b4775a-2b47798 call 2b54af0 RtlEnterCriticalSection RtlLeaveCriticalSection 575->579 589 2b477d0-2b477e2 call 2b5233c 576->589 590 2b477b1-2b477cb call 2b461f5 call 2b46303 call 2b4640e 576->590 578->560 591 2b47455-2b47467 call 2b5233c 578->591 579->519 600 2b47b00-2b47b12 call 2b5233c 589->600 601 2b477e8-2b477ea 589->601 590->519 591->519 591->560 600->519 613 2b47b18-2b47b46 call 2b52fac call 2b54af0 call 2b4439c 600->613 601->600 605 2b477f0-2b47807 call 2b4439c 601->605 605->519 617 2b4780d-2b478db call 2b52418 call 2b41ba7 605->617 639 2b47b4f-2b47b56 call 2b52f74 613->639 640 2b47b48-2b47b4a call 2b4534d 613->640 634 2b478e2-2b47903 RtlEnterCriticalSection 617->634 635 2b478dd call 2b4143f 617->635 641 2b47589-2b475b7 call 2b52fac call 2b54af0 call 2b4439c 631->641 632->631 638 2b4754e-2b47560 call 2b5233c 632->638 636 2b47905-2b4790c 634->636 637 2b4790f-2b47973 RtlLeaveCriticalSection call 2b43c67 call 2b43d7e call 2b4833b 634->637 635->634 636->637 665 2b47ae7-2b47afb call 2b49003 637->665 666 2b47979-2b479c1 call 2b4a725 637->666 638->631 653 2b47562-2b47583 call 2b4439c 638->653 639->519 640->639 663 2b475f8-2b47601 call 2b52f74 641->663 664 2b475b9-2b475c8 call 2b535e6 641->664 653->641 678 2b47607-2b4761f call 2b53b4c 663->678 679 2b47738-2b4773b 663->679 664->663 675 2b475ca 664->675 665->519 676 2b479c7-2b479ce 666->676 677 2b47ab1-2b47ae2 call 2b483ea call 2b433b2 666->677 681 2b475cf-2b475e1 call 2b52850 675->681 683 2b479d1-2b479d6 676->683 677->665 688 2b47621-2b47629 call 2b49737 678->688 689 2b4762b 678->689 679->566 695 2b475e6-2b475f6 call 2b535e6 681->695 696 2b475e3 681->696 683->683 687 2b479d8-2b47a23 call 2b4a725 683->687 687->677 698 2b47a29-2b47a2f 687->698 694 2b4762d-2b476e5 call 2b4a84f call 2b43863 call 2b45119 call 2b43863 call 2b4aaf5 call 2b4ac0f 688->694 689->694 721 2b476e7 call 2b4380b 694->721 722 2b476ec-2b47717 Sleep call 2b518f0 694->722 695->663 695->681 696->695 702 2b47a32-2b47a37 698->702 702->702 705 2b47a39-2b47a74 call 2b4a725 702->705 705->677 711 2b47a76-2b47ab0 call 2b4d117 705->711 711->677 721->722 726 2b47723-2b47731 722->726 727 2b47719-2b47722 call 2b44100 722->727 726->679 729 2b47733 call 2b4380b 726->729 727->726 729->679
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02B464D1
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02B464DA
                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02B464E9
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02B464EC
                                                                  • GetTickCount.KERNEL32 ref: 02B464F8
                                                                  • GetVersionExA.KERNEL32(02B77038), ref: 02B46525
                                                                  • _malloc.LIBCMT ref: 02B46551
                                                                  • _malloc.LIBCMT ref: 02B46561
                                                                  • _malloc.LIBCMT ref: 02B4656C
                                                                  • _malloc.LIBCMT ref: 02B46577
                                                                  • _malloc.LIBCMT ref: 02B46582
                                                                  • _malloc.LIBCMT ref: 02B4658D
                                                                  • _malloc.LIBCMT ref: 02B46598
                                                                  • _malloc.LIBCMT ref: 02B465A7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02B465BE
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02B465C7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B465D6
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02B465D9
                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02B465E4
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02B465E7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _malloc$Heap$AllocateProcess$AddressHandleModuleProc$CountTickVersion
                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                  • API String ID: 239751247-2678694477
                                                                  • Opcode ID: 351c9c91c1b0274297adc051a357ff69d01f3d69d29ee31db6dc21df0344d5be
                                                                  • Instruction ID: a5e667018f8429581a0783d6bd66d3bc722220658109cda80020c2ad21ecf39b
                                                                  • Opcode Fuzzy Hash: 351c9c91c1b0274297adc051a357ff69d01f3d69d29ee31db6dc21df0344d5be
                                                                  • Instruction Fuzzy Hash: 15711872D49350AFE310AF34AC48B5BBBE9EF85354F1408ADF9949B280DFB88440DB56

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02B41D11
                                                                  • GetLastError.KERNEL32 ref: 02B41D23
                                                                    • Part of subcall function 02B41712: __EH_prolog.LIBCMT ref: 02B41717
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02B41D59
                                                                  • GetLastError.KERNEL32 ref: 02B41D6B
                                                                  • __beginthreadex.LIBCMT ref: 02B41DB1
                                                                  • GetLastError.KERNEL32 ref: 02B41DC6
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B41DDD
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B41DEC
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02B41E14
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B41E1B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                  • String ID: thread$thread.entry_event$thread.exit_event
                                                                  • API String ID: 831262434-3017686385
                                                                  • Opcode ID: 5260646d98875149015e47ebc835c466ceb9f7c208a648b86804344517da7d09
                                                                  • Instruction ID: 27028f680864cb55d63164915e2ec0c241b091c187c1b570d5998b300d725535
                                                                  • Opcode Fuzzy Hash: 5260646d98875149015e47ebc835c466ceb9f7c208a648b86804344517da7d09
                                                                  • Instruction Fuzzy Hash: 91318D71A103119FD700EF24C888B2BBBA5EB84754F1049ADF9598B290DB749889DFA2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 761 2b44603-2b4463b call 2b653f0 call 2b50b10 call 2b53b4c 768 2b44647 761->768 769 2b4463d-2b44645 call 2b49737 761->769 771 2b44649-2b4465c call 2b4a84f 768->771 769->771 775 2b44661-2b44664 771->775 776 2b44666-2b44672 htons 775->776 777 2b44683-2b44687 775->777 778 2b448ae-2b448c1 call 2b53b4c 776->778 779 2b44678-2b44681 776->779 780 2b446f1-2b447f8 call 2b41ba7 call 2b4def3 htons call 2b52418 call 2b47d24 call 2b47cfe * 2 call 2b4898c call 2b484b1 777->780 781 2b44689-2b446e4 htonl * 2 htons call 2b43d7e call 2b4833b 777->781 788 2b448c3-2b448cb call 2b49737 778->788 789 2b448cd 778->789 779->775 779->777 833 2b44871-2b4487a 780->833 834 2b447fa-2b44805 780->834 781->778 797 2b446ea-2b446ec 781->797 794 2b448cf-2b44917 call 2b4a84f call 2b43c67 call 2b43d7e call 2b4833b 788->794 789->794 815 2b4491d-2b4494a call 2b4a725 794->815 816 2b44b38-2b44b43 794->816 797->778 815->816 826 2b44950-2b4495a 815->826 819 2b44b45 call 2b4380b 816->819 820 2b44b4a-2b44b53 816->820 819->820 822 2b44b55 call 2b4380b 820->822 823 2b44b5a-2b44b76 call 2b4898c 820->823 822->823 830 2b44a07-2b44a09 826->830 831 2b44960-2b44977 call 2b483b1 826->831 839 2b44a0a-2b44a33 call 2b4a725 830->839 847 2b4499f-2b449b7 831->847 848 2b44979-2b4499d htonl * 2 831->848 836 2b44881-2b448a5 call 2b4898c * 2 833->836 837 2b4487c call 2b4143f 833->837 838 2b44809-2b44813 834->838 836->778 863 2b448a7-2b448a9 call 2b4143f 836->863 837->836 842 2b44815-2b44838 call 2b4833b 838->842 843 2b4486e 838->843 839->816 851 2b44a39-2b44a5e call 2b4a725 839->851 853 2b4483d-2b44841 842->853 843->833 852 2b449ba-2b449e2 call 2b43bd3 htonl * 2 call 2b483b1 847->852 848->852 851->816 864 2b44a64-2b44a8d call 2b4a725 851->864 869 2b449e7-2b44a05 htons * 2 852->869 857 2b44843-2b44863 call 2b482b5 call 2b48509 853->857 858 2b4486c 853->858 857->838 873 2b44865-2b4486a call 2b4143f 857->873 858->843 863->778 864->816 874 2b44a93-2b44b11 call 2b43863 * 2 call 2b4a8ac call 2b4a94b call 2b44bad call 2b43863 * 2 call 2b444ab 864->874 869->839 873->838 892 2b44b16-2b44b2d call 2b518f0 874->892 892->816 895 2b44b2f-2b44b37 call 2b44100 892->895 895->816
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B44608
                                                                    • Part of subcall function 02B53B4C: _malloc.LIBCMT ref: 02B53B64
                                                                  • htons.WS2_32(?), ref: 02B44669
                                                                  • htonl.WS2_32(?), ref: 02B4468C
                                                                  • htonl.WS2_32(00000000), ref: 02B44693
                                                                  • htons.WS2_32(00000000), ref: 02B44747
                                                                  • _sprintf.LIBCMT ref: 02B4475D
                                                                    • Part of subcall function 02B4898C: _memmove.LIBCMT ref: 02B489AC
                                                                  • htons.WS2_32(?), ref: 02B446B0
                                                                    • Part of subcall function 02B49737: __EH_prolog.LIBCMT ref: 02B4973C
                                                                    • Part of subcall function 02B49737: RtlEnterCriticalSection.NTDLL(00000020), ref: 02B497B7
                                                                    • Part of subcall function 02B49737: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02B497D5
                                                                    • Part of subcall function 02B41BA7: __EH_prolog.LIBCMT ref: 02B41BAC
                                                                    • Part of subcall function 02B41BA7: RtlEnterCriticalSection.NTDLL ref: 02B41BBC
                                                                    • Part of subcall function 02B41BA7: RtlLeaveCriticalSection.NTDLL ref: 02B41BEA
                                                                    • Part of subcall function 02B41BA7: RtlEnterCriticalSection.NTDLL ref: 02B41C13
                                                                    • Part of subcall function 02B41BA7: RtlLeaveCriticalSection.NTDLL ref: 02B41C56
                                                                    • Part of subcall function 02B4DEF3: __EH_prolog.LIBCMT ref: 02B4DEF8
                                                                  • htonl.WS2_32(?), ref: 02B4497C
                                                                  • htonl.WS2_32(00000000), ref: 02B44983
                                                                  • htonl.WS2_32(00000000), ref: 02B449C8
                                                                  • htonl.WS2_32(00000000), ref: 02B449CF
                                                                  • htons.WS2_32(?), ref: 02B449EF
                                                                  • htons.WS2_32(?), ref: 02B449F9
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                  • String ID:
                                                                  • API String ID: 1645262487-0
                                                                  • Opcode ID: 586b106507dd224438213029f0028ff034246ce8106fbdc29ddc0df92f572dc9
                                                                  • Instruction ID: c2e74fb968b0324ea0f89af147d2401936a27b2b6d6057c976fae1102e7deb87
                                                                  • Opcode Fuzzy Hash: 586b106507dd224438213029f0028ff034246ce8106fbdc29ddc0df92f572dc9
                                                                  • Instruction Fuzzy Hash: 06023871D00259EEDF15DFA4C884BEEBBB9AF08304F14419AE545B7280DB746A88DFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 898 2b44d86-2b44dcb call 2b653f0 call 2b50b10 RtlEnterCriticalSection RtlLeaveCriticalSection 903 2b450d4-2b450dd 898->903 904 2b44dd1 898->904 905 2b450e4-2b450f4 903->905 906 2b450df call 2b4380b 903->906 907 2b44dd6-2b44e00 call 2b43863 call 2b44bed 904->907 906->905 913 2b44e06-2b44e0b 907->913 914 2b450a1-2b450ad RtlEnterCriticalSection RtlLeaveCriticalSection 907->914 915 2b44e11-2b44e3a call 2b4ced9 913->915 916 2b4506e-2b45070 913->916 917 2b450b3-2b450ce RtlEnterCriticalSection RtlLeaveCriticalSection 914->917 915->914 922 2b44e40-2b44e5c call 2b47d24 915->922 916->914 919 2b45072-2b4509f call 2b4a725 916->919 917->903 917->907 919->914 919->917 926 2b44ec4-2b44ec8 922->926 927 2b44e5e-2b44e87 call 2b4ced9 922->927 928 2b44e8d-2b44e99 RtlEnterCriticalSection RtlLeaveCriticalSection 926->928 929 2b44eca-2b44eee call 2b4ced9 926->929 927->928 935 2b44f98-2b44fc1 call 2b4ced9 927->935 933 2b44e9f-2b44ea6 RtlEnterCriticalSection RtlLeaveCriticalSection 928->933 934 2b44ef3-2b44ef9 929->934 936 2b44eac-2b44ebf call 2b4898c 933->936 934->928 938 2b44efb-2b44f2c call 2b4ced9 934->938 943 2b45064-2b45069 935->943 944 2b44fc7-2b44ff0 call 2b4ced9 935->944 936->917 938->928 947 2b44f32-2b44f93 call 2b4d00b call 2b4898c call 2b48701 call 2b4898c 938->947 943->933 944->943 950 2b44ff2-2b45028 call 2b47cfe call 2b4a9b2 call 2b4aa8a 944->950 947->935 962 2b4502d-2b45050 call 2b4898c call 2b518f0 950->962 962->936 967 2b45056-2b4505f call 2b44100 962->967 967->936
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B44D8B
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B44DB7
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B44DC3
                                                                    • Part of subcall function 02B44BED: __EH_prolog.LIBCMT ref: 02B44BF2
                                                                    • Part of subcall function 02B44BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02B44CF2
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B44E93
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B44E99
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B44EA0
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B44EA6
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B450A7
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B450AD
                                                                  • RtlEnterCriticalSection.NTDLL(02B771E0), ref: 02B450B8
                                                                  • RtlLeaveCriticalSection.NTDLL(02B771E0), ref: 02B450C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                  • String ID:
                                                                  • API String ID: 2062355503-0
                                                                  • Opcode ID: 94b84d27925f6ae88f5594d91b54ead5dd3e6b86f297b72941d1aff824c2d50e
                                                                  • Instruction ID: 2b3f3c27bc064a0b4acca079ef4303acf782d9ba90736ac0a314a5ac1d1e3575
                                                                  • Opcode Fuzzy Hash: 94b84d27925f6ae88f5594d91b54ead5dd3e6b86f297b72941d1aff824c2d50e
                                                                  • Instruction Fuzzy Hash: DDB13971D0025EAFDF25DF90C894BEEBBB5AF04314F24409AE40567280DFB46A49DFA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 996 401f64-401f84 FindResourceA 997 401f86-401f9d GetLastError SizeofResource 996->997 998 401f9f-401fa1 996->998 997->998 999 401fa6-401fec LoadResource LockResource GlobalAlloc call 402840 * 2 997->999 1000 402096-40209a 998->1000 1005 401fee-401ff9 999->1005 1005->1005 1006 401ffb-402003 GetTickCount 1005->1006 1007 402032-402038 1006->1007 1008 402005-402007 1006->1008 1009 402053-402083 GlobalAlloc call 401c26 1007->1009 1010 40203a-40204a 1007->1010 1008->1009 1011 402009-40200f 1008->1011 1018 402088-402093 1009->1018 1012 40204c 1010->1012 1013 40204e-402051 1010->1013 1011->1009 1015 402011-402023 1011->1015 1012->1013 1013->1009 1013->1010 1016 402025 1015->1016 1017 402027-40202a 1015->1017 1016->1017 1017->1015 1019 40202c-40202e 1017->1019 1018->1000 1019->1011 1020 402030 1019->1020 1020->1009
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                  • GetLastError.KERNEL32 ref: 00401F86
                                                                  • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                  • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                  • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                  • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401FBF
                                                                  • GetTickCount.KERNEL32 ref: 00401FFB
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00402061
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                  • String ID:
                                                                  • API String ID: 564119183-0
                                                                  • Opcode ID: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                  • Instruction ID: 796ee674081a33e1eca3e8dafd4cf7228c54fde160adeeae20eb912a95efe89d
                                                                  • Opcode Fuzzy Hash: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                  • Instruction Fuzzy Hash: 5F314C32A402516FDB14DFB99E489AF7FB8EF45344B10807AFA46F7291D6748841C7A8

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1021 2b47b88-2b47b8a 1022 2b47ba3-2b47ba6 1021->1022 1023 2b47b8c 1021->1023 1024 2b47ba8-2b47bab 1022->1024 1025 2b47b3a-2b47b46 1022->1025 1030 2b47b9a-2b47ba1 1023->1030 1026 2b47c0d-2b47c14 1024->1026 1027 2b47bad-2b47bbb 1024->1027 1028 2b47b4f-2b47b56 call 2b52f74 1025->1028 1029 2b47b48-2b47b4a call 2b4534d 1025->1029 1033 2b47bd6 1026->1033 1034 2b47c17-2b47c22 1026->1034 1027->1030 1031 2b47bbd-2b47bc5 1027->1031 1047 2b466f4-2b466f6 1028->1047 1029->1028 1030->1022 1036 2b47bca 1031->1036 1037 2b47c43-2b47c62 1033->1037 1038 2b47bd8-2b47bf5 1033->1038 1039 2b47c24-2b47c25 1034->1039 1040 2b47c7f-2b47c81 1034->1040 1036->1033 1042 2b47c64-2b47c7b 1037->1042 1043 2b47c8e-2b47ca2 1037->1043 1038->1036 1045 2b47bf7-2b47bfe 1038->1045 1046 2b47c3b 1039->1046 1044 2b47c82 1040->1044 1042->1040 1050 2b47ca4 1043->1050 1051 2b47d13-2b47d21 call 2b488f8 1043->1051 1048 2b47cb1-2b47cc6 1044->1048 1049 2b47c83-2b47c8a 1044->1049 1045->1046 1052 2b47c00-2b47c02 1045->1052 1046->1044 1055 2b47c3d-2b47c40 1046->1055 1053 2b466ff-2b46701 1047->1053 1054 2b466f8-2b466fd 1047->1054 1056 2b47ca5-2b47cae 1048->1056 1057 2b47cc8-2b47cfb 1048->1057 1049->1043 1050->1056 1052->1026 1059 2b46703 1053->1059 1060 2b4670e-2b46742 RtlEnterCriticalSection RtlLeaveCriticalSection 1053->1060 1061 2b46708 Sleep 1054->1061 1055->1037 1056->1048 1059->1061 1062 2b46744-2b46750 1060->1062 1063 2b46792 1060->1063 1061->1060 1062->1063 1065 2b46752-2b4675f 1062->1065 1066 2b46796-2b472c3 InternetOpenA 1063->1066 1067 2b46767-2b46768 1065->1067 1068 2b46761-2b46765 1065->1068 1071 2b47389-2b4738f 1066->1071 1072 2b472c9-2b47340 InternetSetOptionA * 3 call 2b54af0 InternetOpenUrlA 1066->1072 1070 2b4676c-2b46790 call 2b54af0 * 2 1067->1070 1068->1070 1070->1066 1073 2b47391-2b47397 1071->1073 1074 2b473ab-2b473b9 1071->1074 1085 2b47382-2b47383 InternetCloseHandle 1072->1085 1086 2b47342 1072->1086 1077 2b4739d-2b473aa call 2b453ec 1073->1077 1078 2b47399-2b4739b 1073->1078 1074->1047 1080 2b473bf-2b473e3 call 2b54af0 call 2b4439c 1074->1080 1077->1074 1078->1074 1080->1047 1095 2b473e9-2b47417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2b5233c 1080->1095 1085->1071 1090 2b47346-2b4736c InternetReadFile 1086->1090 1092 2b47377-2b4737e InternetCloseHandle 1090->1092 1093 2b4736e-2b47375 1090->1093 1092->1085 1093->1090 1098 2b4746d-2b47488 call 2b5233c 1095->1098 1099 2b47419-2b4742b call 2b5233c 1095->1099 1104 2b47742-2b47754 call 2b5233c 1098->1104 1105 2b4748e-2b47490 1098->1105 1099->1098 1106 2b4742d-2b4743f call 2b5233c 1099->1106 1113 2b47756-2b47758 1104->1113 1114 2b4779d-2b477af call 2b5233c 1104->1114 1105->1104 1108 2b47496-2b47548 call 2b52fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2b54af0 * 5 call 2b4439c * 2 1105->1108 1106->1098 1116 2b47441-2b47453 call 2b5233c 1106->1116 1169 2b47585 1108->1169 1170 2b4754a-2b4754c 1108->1170 1113->1114 1117 2b4775a-2b47798 call 2b54af0 RtlEnterCriticalSection RtlLeaveCriticalSection 1113->1117 1127 2b477d0-2b477e2 call 2b5233c 1114->1127 1128 2b477b1-2b477cb call 2b461f5 call 2b46303 call 2b4640e 1114->1128 1116->1098 1129 2b47455-2b47467 call 2b5233c 1116->1129 1117->1047 1138 2b47b00-2b47b12 call 2b5233c 1127->1138 1139 2b477e8-2b477ea 1127->1139 1128->1047 1129->1047 1129->1098 1138->1047 1151 2b47b18-2b47b46 call 2b52fac call 2b54af0 call 2b4439c 1138->1151 1139->1138 1143 2b477f0-2b47807 call 2b4439c 1139->1143 1143->1047 1155 2b4780d-2b478db call 2b52418 call 2b41ba7 1143->1155 1151->1028 1151->1029 1172 2b478e2-2b47903 RtlEnterCriticalSection 1155->1172 1173 2b478dd call 2b4143f 1155->1173 1177 2b47589-2b475b7 call 2b52fac call 2b54af0 call 2b4439c 1169->1177 1170->1169 1176 2b4754e-2b47560 call 2b5233c 1170->1176 1174 2b47905-2b4790c 1172->1174 1175 2b4790f-2b47973 RtlLeaveCriticalSection call 2b43c67 call 2b43d7e call 2b4833b 1172->1175 1173->1172 1174->1175 1198 2b47ae7-2b47afb call 2b49003 1175->1198 1199 2b47979-2b479c1 call 2b4a725 1175->1199 1176->1169 1186 2b47562-2b47583 call 2b4439c 1176->1186 1196 2b475f8-2b47601 call 2b52f74 1177->1196 1197 2b475b9-2b475c8 call 2b535e6 1177->1197 1186->1177 1211 2b47607-2b4761f call 2b53b4c 1196->1211 1212 2b47738-2b4773b 1196->1212 1197->1196 1208 2b475ca 1197->1208 1198->1047 1209 2b479c7-2b479ce 1199->1209 1210 2b47ab1-2b47ae2 call 2b483ea call 2b433b2 1199->1210 1214 2b475cf-2b475e1 call 2b52850 1208->1214 1216 2b479d1-2b479d6 1209->1216 1210->1198 1221 2b47621-2b47629 call 2b49737 1211->1221 1222 2b4762b 1211->1222 1212->1104 1228 2b475e6-2b475f6 call 2b535e6 1214->1228 1229 2b475e3 1214->1229 1216->1216 1220 2b479d8-2b47a23 call 2b4a725 1216->1220 1220->1210 1231 2b47a29-2b47a2f 1220->1231 1227 2b4762d-2b476e5 call 2b4a84f call 2b43863 call 2b45119 call 2b43863 call 2b4aaf5 call 2b4ac0f 1221->1227 1222->1227 1254 2b476e7 call 2b4380b 1227->1254 1255 2b476ec-2b47717 Sleep call 2b518f0 1227->1255 1228->1196 1228->1214 1229->1228 1235 2b47a32-2b47a37 1231->1235 1235->1235 1238 2b47a39-2b47a74 call 2b4a725 1235->1238 1238->1210 1244 2b47a76-2b47ab0 call 2b4d117 1238->1244 1244->1210 1254->1255 1259 2b47723-2b47731 1255->1259 1260 2b47719-2b47722 call 2b44100 1255->1260 1259->1212 1262 2b47733 call 2b4380b 1259->1262 1260->1259 1262->1212
                                                                  Strings
                                                                  • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02B46739
                                                                  • TxZ4, xrefs: 02B47BC5
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$TxZ4
                                                                  • API String ID: 0-2294826057
                                                                  • Opcode ID: 3f9f2b4d820cc8ecb9f0b640b94c204e7a3a3b42443278fb712b7fd5e6a05844
                                                                  • Instruction ID: 64250922cbbe0964663f5c6f9ea2c24cd071da856037d258836efcbb6d3ce1e4
                                                                  • Opcode Fuzzy Hash: 3f9f2b4d820cc8ecb9f0b640b94c204e7a3a3b42443278fb712b7fd5e6a05844
                                                                  • Instruction Fuzzy Hash: 4751EC72A083409FD7219E38A8947DAFBE1EF87724F5809DCE9818B242DF218506F7C5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1265 2b426db-2b42726 RtlEnterCriticalSection 1266 2b4277e-2b42781 1265->1266 1267 2b42728-2b42736 CreateWaitableTimerA 1265->1267 1270 2b427d5-2b427f0 RtlLeaveCriticalSection 1266->1270 1271 2b42783-2b42798 call 2b53b4c 1266->1271 1268 2b42738-2b42756 GetLastError call 2b50b10 call 2b41712 1267->1268 1269 2b4275b-2b42778 SetWaitableTimer 1267->1269 1268->1269 1269->1266 1276 2b427ca 1271->1276 1277 2b4279a-2b427ac call 2b53b4c 1271->1277 1280 2b427cc-2b427d0 call 2b47e03 1276->1280 1283 2b427ae-2b427b7 1277->1283 1284 2b427b9 1277->1284 1280->1270 1285 2b427bb-2b427c3 call 2b41cf8 1283->1285 1284->1285 1287 2b427c8 1285->1287 1287->1280
                                                                  APIs
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02B42706
                                                                  • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02B4272B
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02B65B53), ref: 02B42738
                                                                    • Part of subcall function 02B41712: __EH_prolog.LIBCMT ref: 02B41717
                                                                  • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02B42778
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02B427D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                  • String ID: timer
                                                                  • API String ID: 4293676635-1792073242
                                                                  • Opcode ID: b5ecc5393eb6d12c4f91470713d903494f8d5179488828b3ea90b4fc1b19f875
                                                                  • Instruction ID: 2c403bd8f305d4a4b623849dfc7ee7fab91b1716bca499663b02049d84a98365
                                                                  • Opcode Fuzzy Hash: b5ecc5393eb6d12c4f91470713d903494f8d5179488828b3ea90b4fc1b19f875
                                                                  • Instruction Fuzzy Hash: B331D4B1904705AFD310DF25C988B26FBE8FB48754F004AAEF95587680DB74E810DFA5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1316 2b42b95-2b42baf 1317 2b42bc7-2b42bcb 1316->1317 1318 2b42bb1-2b42bb9 call 2b50b10 1316->1318 1320 2b42bcd-2b42bd0 1317->1320 1321 2b42bdf 1317->1321 1326 2b42bbf-2b42bc2 1318->1326 1320->1321 1324 2b42bd2-2b42bdd call 2b50b10 1320->1324 1322 2b42be2-2b42c11 WSASetLastError WSARecv call 2b4a509 1321->1322 1329 2b42c16-2b42c1d 1322->1329 1324->1326 1330 2b42d30 1326->1330 1331 2b42c2c-2b42c32 1329->1331 1332 2b42c1f-2b42c2a call 2b50b10 1329->1332 1333 2b42d32-2b42d38 1330->1333 1335 2b42c34-2b42c39 call 2b50b10 1331->1335 1336 2b42c46-2b42c48 1331->1336 1342 2b42c3f-2b42c42 1332->1342 1335->1342 1339 2b42c4f-2b42c60 call 2b50b10 1336->1339 1340 2b42c4a-2b42c4d 1336->1340 1339->1333 1344 2b42c66-2b42c69 1339->1344 1340->1344 1342->1336 1346 2b42c73-2b42c76 1344->1346 1347 2b42c6b-2b42c6d 1344->1347 1346->1330 1349 2b42c7c-2b42c9a call 2b50b10 call 2b4166f 1346->1349 1347->1346 1348 2b42d22-2b42d2d call 2b41996 1347->1348 1348->1330 1356 2b42cbc-2b42cfa WSASetLastError select call 2b4a509 1349->1356 1357 2b42c9c-2b42cba call 2b50b10 call 2b4166f 1349->1357 1362 2b42cfc-2b42d06 call 2b50b10 1356->1362 1363 2b42d08 1356->1363 1357->1330 1357->1356 1371 2b42d19-2b42d1d 1362->1371 1366 2b42d15-2b42d17 1363->1366 1367 2b42d0a-2b42d12 call 2b50b10 1363->1367 1366->1330 1366->1371 1367->1366 1371->1322
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B42BE4
                                                                  • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02B42C07
                                                                    • Part of subcall function 02B4A509: WSAGetLastError.WS2_32(00000000,?,?,02B42A51), ref: 02B4A517
                                                                  • WSASetLastError.WS2_32 ref: 02B42CD3
                                                                  • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02B42CE7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$Recvselect
                                                                  • String ID: 3'
                                                                  • API String ID: 886190287-280543908
                                                                  • Opcode ID: 82fe2ee66163c791dbf3039b3f092744ff9ead8ef4b4e0a72a50f6a725fe8273
                                                                  • Instruction ID: bfb6b951776c65ed27318edf44e8db057e3ba838debdb7887503d2c77c7633e6
                                                                  • Opcode Fuzzy Hash: 82fe2ee66163c791dbf3039b3f092744ff9ead8ef4b4e0a72a50f6a725fe8273
                                                                  • Instruction Fuzzy Hash: 3B414CB19143059FD710AF64C59476BBBE9EF88358F100D9EFC9987280EFB4D540AB92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1424 2b429ee-2b42a06 1425 2b42ab3-2b42abb call 2b50b10 1424->1425 1426 2b42a0c-2b42a10 1424->1426 1434 2b42abe-2b42ac6 1425->1434 1427 2b42a12-2b42a15 1426->1427 1428 2b42a39-2b42a4c WSASetLastError closesocket call 2b4a509 1426->1428 1427->1428 1432 2b42a17-2b42a36 call 2b50b10 call 2b42f50 1427->1432 1433 2b42a51-2b42a55 1428->1433 1432->1428 1433->1425 1436 2b42a57-2b42a5f call 2b50b10 1433->1436 1442 2b42a61-2b42a67 1436->1442 1443 2b42a69-2b42a71 call 2b50b10 1436->1443 1442->1443 1444 2b42a7b-2b42aad ioctlsocket WSASetLastError closesocket call 2b4a509 1442->1444 1448 2b42a73-2b42a79 1443->1448 1449 2b42aaf-2b42ab1 1443->1449 1444->1449 1448->1444 1448->1449 1449->1425 1449->1434
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B42A3B
                                                                  • closesocket.WS2_32 ref: 02B42A42
                                                                  • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02B42A89
                                                                  • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02B42A97
                                                                  • closesocket.WS2_32 ref: 02B42A9E
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastclosesocket$ioctlsocket
                                                                  • String ID:
                                                                  • API String ID: 1561005644-0
                                                                  • Opcode ID: 7ab5fc758abda09ed34026084f5fd1dd9bc3fbacc768125c2e8492ffb990464b
                                                                  • Instruction ID: 0090a4513af69eaf142215af2ae5912a9b9880c4c874de4fbb9725039d3a5e08
                                                                  • Opcode Fuzzy Hash: 7ab5fc758abda09ed34026084f5fd1dd9bc3fbacc768125c2e8492ffb990464b
                                                                  • Instruction Fuzzy Hash: 7A212D75A002059BEB20ABB89988769B7E9EF48319F1049EBFD65C3181FF74C940EB50
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B41BAC
                                                                  • RtlEnterCriticalSection.NTDLL ref: 02B41BBC
                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02B41BEA
                                                                  • RtlEnterCriticalSection.NTDLL ref: 02B41C13
                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02B41C56
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$H_prolog
                                                                  • String ID:
                                                                  • API String ID: 1633115879-0
                                                                  • Opcode ID: 8e55de2150b82c294f6b56f76b896d6639f4e23ef32f171c659e97d33cbf00a9
                                                                  • Instruction ID: 4074efb19f6ad95dc073f3778d3b61048662fa8994f0a994d849dd2b967928da
                                                                  • Opcode Fuzzy Hash: 8e55de2150b82c294f6b56f76b896d6639f4e23ef32f171c659e97d33cbf00a9
                                                                  • Instruction Fuzzy Hash: CC21BF75900214EFCB14CF6CC8887AABBB5FF48714F108589E8599B302DB74EA51DBE0
                                                                  APIs
                                                                  • GetVersion.KERNEL32 ref: 00402DC6
                                                                    • Part of subcall function 00403A30: HeapCreate.KERNEL32(00000000,00001000,00000000,00402DFF,00000000), ref: 00403A41
                                                                    • Part of subcall function 00403A30: HeapDestroy.KERNEL32 ref: 00403A80
                                                                  • GetCommandLineA.KERNEL32 ref: 00402E14
                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00402E3F
                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402E62
                                                                    • Part of subcall function 00402EBB: ExitProcess.KERNEL32 ref: 00402ED8
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                  • String ID:
                                                                  • API String ID: 2057626494-0
                                                                  • Opcode ID: 37c0014e2e2a3cc91b0f97f7efc6e89b0e41cada37b13d3a5b3b7a3bfedef6b6
                                                                  • Instruction ID: 9427651bd7d4147f18cf1345822f920b193015e9f721fff9bbe2dec0a96979c1
                                                                  • Opcode Fuzzy Hash: 37c0014e2e2a3cc91b0f97f7efc6e89b0e41cada37b13d3a5b3b7a3bfedef6b6
                                                                  • Instruction Fuzzy Hash: 252191B0840715ABD714EFA5DD49A6E7BA8EB04705F10413FF506B72D1DB384500C799
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B42EEE
                                                                  • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02B42EFD
                                                                  • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02B42F0C
                                                                  • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02B42F36
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$Socketsetsockopt
                                                                  • String ID:
                                                                  • API String ID: 2093263913-0
                                                                  • Opcode ID: 2091e403e8aad69169574c223185c1885f817941cea6d9ec1cd4ec1b9d7206ad
                                                                  • Instruction ID: 69a55afdf1e7c667bac42f8a61921569c3cc02137afc9539df44f7e21019470b
                                                                  • Opcode Fuzzy Hash: 2091e403e8aad69169574c223185c1885f817941cea6d9ec1cd4ec1b9d7206ad
                                                                  • Instruction Fuzzy Hash: 5A018D71650214BBDB205F65DC88F5ABBA9EF89775F008955F918CB181DB74C8009B70
                                                                  APIs
                                                                    • Part of subcall function 02B42D39: WSASetLastError.WS2_32(00000000), ref: 02B42D47
                                                                    • Part of subcall function 02B42D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02B42D5C
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B42E6D
                                                                  • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02B42E83
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$Sendselect
                                                                  • String ID: 3'
                                                                  • API String ID: 2958345159-280543908
                                                                  • Opcode ID: cca60c1966c0aa839ed1d10aeae5d8e46a99be12db40ef25eb1e7ca71ad45e48
                                                                  • Instruction ID: 617fce322b015e662af786a91ad94a28fcd54fc7c8c195aa5e2a1fe995690f19
                                                                  • Opcode Fuzzy Hash: cca60c1966c0aa839ed1d10aeae5d8e46a99be12db40ef25eb1e7ca71ad45e48
                                                                  • Instruction Fuzzy Hash: 62319271E102199FDF10EF64D8947EE7BA5EF09358F0049DAEC0597240EFB59550AFA0
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02B483D3,?,?,00000000), ref: 02B496D0
                                                                  • getsockname.WS2_32(?,?,?), ref: 02B496E6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastgetsockname
                                                                  • String ID: &'
                                                                  • API String ID: 566540725-655172784
                                                                  • Opcode ID: b330d66e9c91d8d008c0beebd90707f79eadd39afdb2123c5e33fdc0499da0ff
                                                                  • Instruction ID: 8491375293c5bcba6f04e51cf4d77f91e1f6d61a7410268d568417600c0504e2
                                                                  • Opcode Fuzzy Hash: b330d66e9c91d8d008c0beebd90707f79eadd39afdb2123c5e33fdc0499da0ff
                                                                  • Instruction Fuzzy Hash: A4216571A10648DBDB10DF68D884BCEB7F5FF4C314F10856AE918EB280EB34E9459B50
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4CDA9
                                                                    • Part of subcall function 02B4D367: std::exception::exception.LIBCMT ref: 02B4D394
                                                                    • Part of subcall function 02B4DB7D: __EH_prolog.LIBCMT ref: 02B4DB82
                                                                    • Part of subcall function 02B53B4C: _malloc.LIBCMT ref: 02B53B64
                                                                    • Part of subcall function 02B4D3C4: __EH_prolog.LIBCMT ref: 02B4D3C9
                                                                  Strings
                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02B4CDE6
                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02B4CDDF
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                  • API String ID: 1953324306-412195191
                                                                  • Opcode ID: 3215bc239e2400e9b06daf8d79536ffda25ecf241b746bc8814a05d3ced16871
                                                                  • Instruction ID: aff35f1f269585b69a27d93d9eff6007c6fed86333cd15c4d238ee9a7118d2a3
                                                                  • Opcode Fuzzy Hash: 3215bc239e2400e9b06daf8d79536ffda25ecf241b746bc8814a05d3ced16871
                                                                  • Instruction Fuzzy Hash: 9521AD71E002189BDB14EFE8D484BAEFBB5EF54704F0445DDE845AB280CF74AA04EB90
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B42AEA
                                                                  • connect.WS2_32(?,?,?), ref: 02B42AF5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastconnect
                                                                  • String ID: 3'
                                                                  • API String ID: 374722065-280543908
                                                                  • Opcode ID: b037de90bf70b62bbcb1e5bd22ee4ab549564ccc408dc5e42eff244a594d7821
                                                                  • Instruction ID: dc1416fad3f98ac04e0b5fdd17e9e6cbe1d16f93f145dfd3086cfd5af47d2435
                                                                  • Opcode Fuzzy Hash: b037de90bf70b62bbcb1e5bd22ee4ab549564ccc408dc5e42eff244a594d7821
                                                                  • Instruction Fuzzy Hash: FD21AA70E10214ABCF10AF74C4947BDBBBAEF48324F1045D9ED1897280EFB45501AF91
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B49874
                                                                  • getaddrinfo.WS2_32(00000000,00000000,?,?), ref: 02B49882
                                                                  • FreeAddrInfoW.WS2_32(?), ref: 02B499B6
                                                                    • Part of subcall function 02B49F55: __EH_prolog.LIBCMT ref: 02B49F5A
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddrErrorFreeH_prologInfoLastgetaddrinfo
                                                                  • String ID:
                                                                  • API String ID: 927184805-0
                                                                  • Opcode ID: 737a1c15b9da3e92329098cc6eeca773fbe12691fc3c207b147211c6e2c66e15
                                                                  • Instruction ID: 000ef25f6ebb9cc41e00b7bd345e73760704f5f08d85cf7f645d6a9bbbed12b4
                                                                  • Opcode Fuzzy Hash: 737a1c15b9da3e92329098cc6eeca773fbe12691fc3c207b147211c6e2c66e15
                                                                  • Instruction Fuzzy Hash: 9751AE31508B419FE720DF28C885B9BBBE5EF84714F440A5DFA99832C0DB74A845CB92
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 3cf81884fd83c3fede2da371491dce256ddda7482400e134ed6221c497f050d4
                                                                  • Instruction ID: 29193764b1d65de805439ef79a071872acc7b98b21edaef7921b2822db3d71bd
                                                                  • Opcode Fuzzy Hash: 3cf81884fd83c3fede2da371491dce256ddda7482400e134ed6221c497f050d4
                                                                  • Instruction Fuzzy Hash: C6514071905216DFCB04DF58C48076ABBF1FF08314F24859DE8299B380DB749910DFA1
                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(?), ref: 02B436A7
                                                                    • Part of subcall function 02B42420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B42432
                                                                    • Part of subcall function 02B42420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B42445
                                                                    • Part of subcall function 02B42420: RtlEnterCriticalSection.NTDLL(?), ref: 02B42454
                                                                    • Part of subcall function 02B42420: InterlockedExchange.KERNEL32(?,00000001), ref: 02B42469
                                                                    • Part of subcall function 02B42420: RtlLeaveCriticalSection.NTDLL(?), ref: 02B42470
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 1601054111-0
                                                                  • Opcode ID: 114a19db66d6c8048e42f0a581e7cac51f607dc83171aa486fc2940b571662d5
                                                                  • Instruction ID: 8b9ef510ffe986ab33b7c13b9c36259ca39f1248b1dee9f3948a11926c2002be
                                                                  • Opcode Fuzzy Hash: 114a19db66d6c8048e42f0a581e7cac51f607dc83171aa486fc2940b571662d5
                                                                  • Instruction Fuzzy Hash: EC11C4B5104209ABDF218E14CCC5FAA3BA5EF40364F284496FE96C72D0CF34D860EB95
                                                                  APIs
                                                                  • __beginthreadex.LIBCMT ref: 02B52106
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02B4A989,00000000), ref: 02B52137
                                                                  • ResumeThread.KERNEL32(?,?,?,?,?,00000002,02B4A989,00000000), ref: 02B52145
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandleResumeThread__beginthreadex
                                                                  • String ID:
                                                                  • API String ID: 1685284544-0
                                                                  • Opcode ID: acc6c8cff89370bf8327bfd0e296d0670ece8ce743600a3cad71b139d9abc5ad
                                                                  • Instruction ID: a9311ac118c44b3de217d0142790c015d579852bc3b79df482536e795538c2c3
                                                                  • Opcode Fuzzy Hash: acc6c8cff89370bf8327bfd0e296d0670ece8ce743600a3cad71b139d9abc5ad
                                                                  • Instruction Fuzzy Hash: C2F0C8702412105BE7209E58DC84F96B3D8EF48364F14059AFA54CB280C771A8929A90
                                                                  APIs
                                                                  • GetCommandLineW.KERNEL32(?), ref: 0040B53C
                                                                  • CommandLineToArgvW.SHELL32(00000000), ref: 0040B543
                                                                  • GetLocalTime.KERNEL32(00409F90), ref: 0040B550
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CommandLine$ArgvLocalTime
                                                                  • String ID:
                                                                  • API String ID: 3768950922-0
                                                                  • Opcode ID: ad128f1624ef447dc643f0808f2951519bb98c3c218d88db454617214f5db541
                                                                  • Instruction ID: 437d10c531d1013be9252fb5d0eaf3ade2209f3be019ff3571b1e1271c624ccb
                                                                  • Opcode Fuzzy Hash: ad128f1624ef447dc643f0808f2951519bb98c3c218d88db454617214f5db541
                                                                  • Instruction Fuzzy Hash: BEE0EC71808202EFCB046BA1AA0D45A37E49604749721847BE513F61D1DB7C84569F5E
                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(02B772B4), ref: 02B41ABA
                                                                  • WSAStartup.WS2_32(00000002,00000000), ref: 02B41ACB
                                                                  • InterlockedExchange.KERNEL32(02B772B8,00000000), ref: 02B41AD7
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$ExchangeIncrementStartup
                                                                  • String ID:
                                                                  • API String ID: 1856147945-0
                                                                  • Opcode ID: 3b8f3e1caff559892543851b609479c231df03f0084edb777503fec664f6acd5
                                                                  • Instruction ID: e95d1a49484a282432897516be491699f0a604812141b95ea1367dada6e67c74
                                                                  • Opcode Fuzzy Hash: 3b8f3e1caff559892543851b609479c231df03f0084edb777503fec664f6acd5
                                                                  • Instruction Fuzzy Hash: ADD05E31DA42145BE21066A4AC4EA78F72CE706669F00069AFDBAC20D0EE545520B5B6
                                                                  APIs
                                                                  • __getptd_noexit.LIBCMT ref: 02B53497
                                                                    • Part of subcall function 02B55C72: GetLastError.KERNEL32(74DF0A60,74DEF550,02B55E60,02B53033,74DEF550,?,02B4606D,00000104,74DF0A60,74DEF550,ntdll.dll,?,?,?,02B46508), ref: 02B55C74
                                                                    • Part of subcall function 02B55C72: __calloc_crt.LIBCMT ref: 02B55C95
                                                                    • Part of subcall function 02B55C72: __initptd.LIBCMT ref: 02B55CB7
                                                                    • Part of subcall function 02B55C72: GetCurrentThreadId.KERNEL32 ref: 02B55CBE
                                                                    • Part of subcall function 02B55C72: SetLastError.KERNEL32(00000000,02B4606D,00000104,74DF0A60,74DEF550,ntdll.dll,?,?,?,02B46508), ref: 02B55CD6
                                                                  • __freeptd.LIBCMT ref: 02B534B1
                                                                    • Part of subcall function 02B53596: LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02B534B0), ref: 02B535B0
                                                                    • Part of subcall function 02B53596: GetProcAddress.KERNEL32(00000000), ref: 02B535B7
                                                                    • Part of subcall function 02B53596: RtlEncodePointer.NTDLL(00000000), ref: 02B535C2
                                                                    • Part of subcall function 02B53596: RtlDecodePointer.NTDLL(02B534B0), ref: 02B535DD
                                                                  • RtlExitUserThread.NTDLL(?,00000000,?,02B53473,00000000), ref: 02B534BA
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastPointerThread$AddressCurrentDecodeEncodeExitLibraryLoadProcUser__calloc_crt__freeptd__getptd_noexit__initptd
                                                                  • String ID:
                                                                  • API String ID: 2811226776-0
                                                                  • Opcode ID: 97e0c10f222f646ffd8d4ddb14fe5888521be54a99052b0514d898c4ea829542
                                                                  • Instruction ID: 4035ae72283d29925785ce45248f195a241fdc0f4462f41de0847bdde173384d
                                                                  • Opcode Fuzzy Hash: 97e0c10f222f646ffd8d4ddb14fe5888521be54a99052b0514d898c4ea829542
                                                                  • Instruction Fuzzy Hash: 4ED0A73140163467C6337764D41875F75DDDF013DAF0804D8DD000D2548F7C5A84CAD5
                                                                  APIs
                                                                  • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 0040B1AE
                                                                  Strings
                                                                  • C:\ProgramData\EC SyncPlayer 11.4.45\EC SyncPlayer 11.4.45.exe, xrefs: 0040BAD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: ManagerOpen
                                                                  • String ID: C:\ProgramData\EC SyncPlayer 11.4.45\EC SyncPlayer 11.4.45.exe
                                                                  • API String ID: 1889721586-2519366810
                                                                  • Opcode ID: 09a3a2ae7c866a7ff0d309efd99684e939659f57ef074a9b3d0a0c3aaf919c47
                                                                  • Instruction ID: ead5f04eae9c12aa71c6200a61fd031c3c269de48af210f7d526ca3bef3e2db5
                                                                  • Opcode Fuzzy Hash: 09a3a2ae7c866a7ff0d309efd99684e939659f57ef074a9b3d0a0c3aaf919c47
                                                                  • Instruction Fuzzy Hash: 66F046B050A346BEC3035A700E98AA73E58CE4138436001BFA543FF1C3C27A0803A3EE
                                                                  APIs
                                                                  • RegCreateKeyExA.KERNEL32(80000002,Software\BetaTour), ref: 0040223A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID: Software\BetaTour
                                                                  • API String ID: 2289755597-3894993710
                                                                  • Opcode ID: a3c8759c41739ac5fe73f2e51a46d3d8363c021b0fe3add05782281675a43611
                                                                  • Instruction ID: 8083c30cecf6f906b573fdc3c74ab4df853bb30dd0a5a836f400770e500e9216
                                                                  • Opcode Fuzzy Hash: a3c8759c41739ac5fe73f2e51a46d3d8363c021b0fe3add05782281675a43611
                                                                  • Instruction Fuzzy Hash: C1D05EA1948104FAE1100A104E8DFB7212CC308B8CF3008BBB94BB02C2D3BC5D2254AF
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 00402609
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00402275
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                  • API String ID: 71445658-2036018995
                                                                  • Opcode ID: 0e290c990734ed7bcf6d14c01621f5448df6d1c6667318dba588d78558630742
                                                                  • Instruction ID: 93f0ee0e51846fcb197cd57104fc37df88b001e43c715f9f4513bb38d53dad80
                                                                  • Opcode Fuzzy Hash: 0e290c990734ed7bcf6d14c01621f5448df6d1c6667318dba588d78558630742
                                                                  • Instruction Fuzzy Hash: D8D05E30A0C105E9E7248A90894C7AB3AB4E700700F304977E803B10C2D3BD554A666F
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B44BF2
                                                                    • Part of subcall function 02B41BA7: __EH_prolog.LIBCMT ref: 02B41BAC
                                                                    • Part of subcall function 02B41BA7: RtlEnterCriticalSection.NTDLL ref: 02B41BBC
                                                                    • Part of subcall function 02B41BA7: RtlLeaveCriticalSection.NTDLL ref: 02B41BEA
                                                                    • Part of subcall function 02B41BA7: RtlEnterCriticalSection.NTDLL ref: 02B41C13
                                                                    • Part of subcall function 02B41BA7: RtlLeaveCriticalSection.NTDLL ref: 02B41C56
                                                                    • Part of subcall function 02B4E0F8: __EH_prolog.LIBCMT ref: 02B4E0FD
                                                                    • Part of subcall function 02B4E0F8: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B4E17C
                                                                  • InterlockedExchange.KERNEL32(?,00000000), ref: 02B44CF2
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                  • String ID:
                                                                  • API String ID: 1927618982-0
                                                                  • Opcode ID: 3c86ffbc5db8aade5e432c40b07503c76afb056bcc09fe0de0575130d7e6ae70
                                                                  • Instruction ID: 2f3353cab7daf009ae19af2668dd750a08389df16e4a5d776f04bd09bc653d2a
                                                                  • Opcode Fuzzy Hash: 3c86ffbc5db8aade5e432c40b07503c76afb056bcc09fe0de0575130d7e6ae70
                                                                  • Instruction Fuzzy Hash: 455106B1D042489FDB15DFA8C884AEEBBB5FF08314F1481AAE905AB351DB709A44DF61
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B42D47
                                                                  • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02B42D5C
                                                                    • Part of subcall function 02B4A509: WSAGetLastError.WS2_32(00000000,?,?,02B42A51), ref: 02B4A517
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$Send
                                                                  • String ID:
                                                                  • API String ID: 1282938840-0
                                                                  • Opcode ID: 0a7c53c4249983bb9ca3dc4e42d265a610eeef51fbfeb2975c92cf090a948ca9
                                                                  • Instruction ID: 9b68348eb4a9c07a10212e9e102dee3e096c85dc8753d44177e7531ce18a70d1
                                                                  • Opcode Fuzzy Hash: 0a7c53c4249983bb9ca3dc4e42d265a610eeef51fbfeb2975c92cf090a948ca9
                                                                  • Instruction Fuzzy Hash: E50175B5500209AFD7206F5488C496BBAEDFB493A4B1009AEFC5997240EF749D00AB61
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B48407
                                                                  • shutdown.WS2_32(?,00000002), ref: 02B48410
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastshutdown
                                                                  • String ID:
                                                                  • API String ID: 1920494066-0
                                                                  • Opcode ID: 59ebc7de9faed2d772a791863735498285e1408f9d03421dab6415cca975730c
                                                                  • Instruction ID: 8b9b86d1b0fd16c434b980eb4c53c04f8bce4bc519067e877c91573828328e8f
                                                                  • Opcode Fuzzy Hash: 59ebc7de9faed2d772a791863735498285e1408f9d03421dab6415cca975730c
                                                                  • Instruction Fuzzy Hash: 16F09071A043148FC710AF14D854B5AB7E5FF09364F05489CEDA597380DB70A810DBA1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prologstd::exception::exception
                                                                  • String ID:
                                                                  • API String ID: 2619619420-0
                                                                  • Opcode ID: e0df5ccf79dccd97f689c3211528c66292198383912b5ef7b758c849e86e7ed9
                                                                  • Instruction ID: 7430366dd4cf0bf2c18d2c30a2caa20508b67c634ada8b40414041cbc068fe97
                                                                  • Opcode Fuzzy Hash: e0df5ccf79dccd97f689c3211528c66292198383912b5ef7b758c849e86e7ed9
                                                                  • Instruction Fuzzy Hash: 7AF08272A11526ABCB109F5CD9146AEF7F9EF49700B1001DE9944D7600DBB4AD548BA4
                                                                  APIs
                                                                  • HeapCreate.KERNEL32(00000000,00001000,00000000,00402DFF,00000000), ref: 00403A41
                                                                    • Part of subcall function 004038E8: GetVersionExA.KERNEL32 ref: 00403907
                                                                  • HeapDestroy.KERNEL32 ref: 00403A80
                                                                    • Part of subcall function 00403E07: HeapAlloc.KERNEL32(00000000,00000140,00403A69,000003F8), ref: 00403E14
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocCreateDestroyVersion
                                                                  • String ID:
                                                                  • API String ID: 2507506473-0
                                                                  • Opcode ID: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                  • Instruction ID: 596bfb85164c6976a77478b8582bc927b5356513505c978a27be6da88daf8786
                                                                  • Opcode Fuzzy Hash: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                  • Instruction Fuzzy Hash: 34F06D70744301AEEB24EF70AE4676B3D98AB40757F10493FF941F81E0EB7986909A0A
                                                                  APIs
                                                                  • std::exception::_Tidy.LIBCMT ref: 02B5254F
                                                                    • Part of subcall function 02B525D7: _free.LIBCMT ref: 02B525E3
                                                                  • std::exception::_Copy_str.LIBCMT ref: 02B5255F
                                                                    • Part of subcall function 02B52599: _strlen.LIBCMT ref: 02B525A9
                                                                    • Part of subcall function 02B52599: _malloc.LIBCMT ref: 02B525B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::exception::_$Copy_strTidy_free_malloc_strlen
                                                                  • String ID:
                                                                  • API String ID: 3422279883-0
                                                                  • Opcode ID: f78214edd59480ba882a159d0ce45a951396e972e38eae400245d38577db43ce
                                                                  • Instruction ID: 9ba9557bee6da9935b975e8bbcb310a262dbb82a2a16e10a6854768470aa283c
                                                                  • Opcode Fuzzy Hash: f78214edd59480ba882a159d0ce45a951396e972e38eae400245d38577db43ce
                                                                  • Instruction Fuzzy Hash: 24E0C2B26026346BC321EA5DE534759FB99EF40A60B0482A7ED188B702D760FD51CBD1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CloseQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3356406503-0
                                                                  • Opcode ID: 63bec783eec20621dc7f8888a8c8a26c432bd5e78771106443a7b66b0245abf5
                                                                  • Instruction ID: 807f80de05fed95f0f5f9dac4a493b60b869dc5a5ca613a53334e19cb5e3a715
                                                                  • Opcode Fuzzy Hash: 63bec783eec20621dc7f8888a8c8a26c432bd5e78771106443a7b66b0245abf5
                                                                  • Instruction Fuzzy Hash: 07C0123094C001FAC2245FB04F0D5272960E60434033188B7A923B00D1C77D9613795F
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4511E
                                                                    • Part of subcall function 02B43D7E: htons.WS2_32(?), ref: 02B43DA2
                                                                    • Part of subcall function 02B43D7E: htonl.WS2_32(00000000), ref: 02B43DB9
                                                                    • Part of subcall function 02B43D7E: htonl.WS2_32(00000000), ref: 02B43DC0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: htonl$H_prologhtons
                                                                  • String ID:
                                                                  • API String ID: 4039807196-0
                                                                  • Opcode ID: f45ebcf2bfdd09b9227863165c5c96e685fc4c164caaa20f9565a7c550e14775
                                                                  • Instruction ID: 854a95d68e4d1bd5c051478a74e4a65240f100ce255ce3f4d805bb2dd2013401
                                                                  • Opcode Fuzzy Hash: f45ebcf2bfdd09b9227863165c5c96e685fc4c164caaa20f9565a7c550e14775
                                                                  • Instruction Fuzzy Hash: AF8157B2D0424E8FCF15DFA8D490AEEBBB5EF48314F20819AD851B7240EB355A45DFA1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B7A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b7a000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: FileRead
                                                                  • String ID:
                                                                  • API String ID: 2738559852-0
                                                                  • Opcode ID: 53472cb331192b01f6b8321615e4b94a8f1517e64c0f4e01ba2e48c323b22422
                                                                  • Instruction ID: c32a8ff3fdcc84782e8176f90995207eba6cb115b041345245cbabfa82ce84ab
                                                                  • Opcode Fuzzy Hash: 53472cb331192b01f6b8321615e4b94a8f1517e64c0f4e01ba2e48c323b22422
                                                                  • Instruction Fuzzy Hash: 94416EB250C7049FE715BF19EC85779FBE5EF94320F02892DD6C083644EA3564448B8B
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 82d3029a53cfea18d63493d45a1e19bcc626b615f5707e39df2c0459c90e15d5
                                                                  • Instruction ID: 748b1f7a88585578b6c7b04dacfe577f5cf2e48d553a705622398615d8d134d1
                                                                  • Opcode Fuzzy Hash: 82d3029a53cfea18d63493d45a1e19bcc626b615f5707e39df2c0459c90e15d5
                                                                  • Instruction Fuzzy Hash: 3041097190120AAFCF14DF99C8D0EEEBBF9FF88314F1441AAE505A7241DB749A45DBA0
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(1F063376), ref: 02B8AF60
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B7A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b7a000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: dc95f067f83cac514d844ed651ea804623dff6e2ff262952ecc6029f1f11d6cd
                                                                  • Instruction ID: d7439a6cbed63cc63fc1bad779a896b9ad991bb05c9a3bb7046fee8c208dc8f6
                                                                  • Opcode Fuzzy Hash: dc95f067f83cac514d844ed651ea804623dff6e2ff262952ecc6029f1f11d6cd
                                                                  • Instruction Fuzzy Hash: A13125B240C200DFE752AA28DC857BABBE4EB54324F114D9EE9D9C7280D3308811DB93
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4E9C6
                                                                    • Part of subcall function 02B41A01: TlsGetValue.KERNEL32 ref: 02B41A0A
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prologValue
                                                                  • String ID:
                                                                  • API String ID: 3700342317-0
                                                                  • Opcode ID: 1358d9ed5b4e1aefe64b4fd5c4629b5b29499c26ed402e31929277ab8c94f651
                                                                  • Instruction ID: 93dc9500773c1d697cd01f846eacf126e5307ec82e46dae20e8ecb984c1e46f2
                                                                  • Opcode Fuzzy Hash: 1358d9ed5b4e1aefe64b4fd5c4629b5b29499c26ed402e31929277ab8c94f651
                                                                  • Instruction Fuzzy Hash: 9A214FB1904209AFDB00DFA8D480AFEBBF9FF48310F14416AE415A3240DB74E900DBA1
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(1F063376), ref: 02B8AF60
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B7A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b7a000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 294627706c7aefcbc365b90441cb7eae433672277b2f7d783ccdcb0a486007df
                                                                  • Instruction ID: fa9e039b86f8170898f219f489a3027f5dedc4d035a8e3ce1f032f364e7674d3
                                                                  • Opcode Fuzzy Hash: 294627706c7aefcbc365b90441cb7eae433672277b2f7d783ccdcb0a486007df
                                                                  • Instruction Fuzzy Hash: 7201B1B258D204FFE3012F14ED846BEFBA4FB88668F55861EF5D682A90D73548009652
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02B433CC
                                                                    • Part of subcall function 02B432AB: __EH_prolog.LIBCMT ref: 02B432B0
                                                                    • Part of subcall function 02B432AB: RtlEnterCriticalSection.NTDLL(?), ref: 02B432C3
                                                                    • Part of subcall function 02B432AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02B432EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                  • String ID:
                                                                  • API String ID: 1518410164-0
                                                                  • Opcode ID: e7ffb43f3445cb5cfb209dc2f5828338ae9bd67bce8d6893be34a607916df263
                                                                  • Instruction ID: 59323d5ad73cffcc61b19b36ffae72d3f61d48f097fd5300250fe2662712ddfa
                                                                  • Opcode Fuzzy Hash: e7ffb43f3445cb5cfb209dc2f5828338ae9bd67bce8d6893be34a607916df263
                                                                  • Instruction Fuzzy Hash: 8C018071614606AFD704DF59D8C5F55BBA9FF44324B24839AE828872C0EF30E821DBA0
                                                                  APIs
                                                                    • Part of subcall function 02B4D3C4: __EH_prolog.LIBCMT ref: 02B4D3C9
                                                                  • __CxxThrowException@8.LIBCMT ref: 02B4DCAE
                                                                    • Part of subcall function 02B5455A: RaiseException.KERNEL32(?,?,02B4FB5F,?,?,?,?,?,?,?,02B4FB5F,?,02B70F98,?), ref: 02B545AF
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionException@8H_prologRaiseThrow
                                                                  • String ID:
                                                                  • API String ID: 1681477883-0
                                                                  • Opcode ID: 505087f604e6cf58e21b645bfda9d992bbf3887c9249ed24b8a8f733005f5acf
                                                                  • Instruction ID: aea6b42d9881c317bf037bca2b325be2405a018ca1a98ece5742248bb4c9ce33
                                                                  • Opcode Fuzzy Hash: 505087f604e6cf58e21b645bfda9d992bbf3887c9249ed24b8a8f733005f5acf
                                                                  • Instruction Fuzzy Hash: BDF0C2719102086FD718ABEDD885CEBB3FCDB08714B00059DFA0693600EAA1F8458BB1
                                                                  APIs
                                                                  • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 0040B1AE
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: ManagerOpen
                                                                  • String ID:
                                                                  • API String ID: 1889721586-0
                                                                  • Opcode ID: 394ced41875a99436215af7cfd5f73b612e011b1b40104ffd94ea4b38b7fcff9
                                                                  • Instruction ID: 5f46f93e14b7c8104a42baafcfae3df429e4688ce35f2937ffdaec8928b1534e
                                                                  • Opcode Fuzzy Hash: 394ced41875a99436215af7cfd5f73b612e011b1b40104ffd94ea4b38b7fcff9
                                                                  • Instruction Fuzzy Hash: D0F0C8B144D21ADFCB818F108EA847A77A8EA15344730087BD602FB5C0C3BE8406E69E
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4E556
                                                                    • Part of subcall function 02B426DB: RtlEnterCriticalSection.NTDLL(?), ref: 02B42706
                                                                    • Part of subcall function 02B426DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02B4272B
                                                                    • Part of subcall function 02B426DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02B65B53), ref: 02B42738
                                                                    • Part of subcall function 02B426DB: SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02B42778
                                                                    • Part of subcall function 02B426DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02B427D9
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                  • String ID:
                                                                  • API String ID: 4293676635-0
                                                                  • Opcode ID: 9092908f157f1ea284cc9b4cdba3cda743cfcf44bbfd520e02a64d171baad2f6
                                                                  • Instruction ID: 4922e0ce88a682397bceba6dced86f3624d6eeb4069997ba634cbe3270c8d905
                                                                  • Opcode Fuzzy Hash: 9092908f157f1ea284cc9b4cdba3cda743cfcf44bbfd520e02a64d171baad2f6
                                                                  • Instruction Fuzzy Hash: 7401D0B1A10B048FC318CF1AC5449A6FBF4EF88300B05C6EE94498B321E774AA40CF90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 3fa6c8248313c28312f776ab418873255e9721a82773d8658be840db27e4e8d7
                                                                  • Instruction ID: 9acf4d32c1da2f08da62e8ff89ec65bcf5b40902a3e9e8f2e789375f33fe9e2e
                                                                  • Opcode Fuzzy Hash: 3fa6c8248313c28312f776ab418873255e9721a82773d8658be840db27e4e8d7
                                                                  • Instruction Fuzzy Hash: 8A01E872A106159FDB20CF48D548B6AB7F4FB08719F04868DE4899B701C778EA08CF94
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B7A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b7a000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: f07adb648409aaccb27c882b31833f38ac170da8364c2eb065a0998ebb051510
                                                                  • Instruction ID: 8951ade686430a4069c66aacef6313556d7eed07444766b83abd017c7e1fea1f
                                                                  • Opcode Fuzzy Hash: f07adb648409aaccb27c882b31833f38ac170da8364c2eb065a0998ebb051510
                                                                  • Instruction Fuzzy Hash: 01E086B350C104EFE3422604EC45BFEB7A8FB54225F080429E795C2340E635D810C597
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B7A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b7a000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: c7f0de763f360e388eadfeea71ffd40204681bbcbd66d81d7cd133b489f28564
                                                                  • Instruction ID: 7281210c0925aeb76c589ecb5ef893b579f0b819fb7f1a8bc3b68aa2c2f0432b
                                                                  • Opcode Fuzzy Hash: c7f0de763f360e388eadfeea71ffd40204681bbcbd66d81d7cd133b489f28564
                                                                  • Instruction Fuzzy Hash: 42E086B381C705DBD1183A24A8242F477D0FB41268F06065DD1A2866C1F9320800C397
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4E335
                                                                    • Part of subcall function 02B53B4C: _malloc.LIBCMT ref: 02B53B64
                                                                    • Part of subcall function 02B4E551: __EH_prolog.LIBCMT ref: 02B4E556
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$_malloc
                                                                  • String ID:
                                                                  • API String ID: 4254904621-0
                                                                  • Opcode ID: f7ef7d03455a16549ad7c93ce332a2a98d1bf7ddb8d70d88ef3b3ae6ee2f5292
                                                                  • Instruction ID: 1f8f74c5261d53f9aedf6512fe916b6c4432b91493aa6af3004c24a77c9fb07c
                                                                  • Opcode Fuzzy Hash: f7ef7d03455a16549ad7c93ce332a2a98d1bf7ddb8d70d88ef3b3ae6ee2f5292
                                                                  • Instruction Fuzzy Hash: 67E08C71A01609ABCB09AF68D80573EB7A6EB04700F0082EEB80AD6340EF74C9009B04
                                                                  APIs
                                                                    • Part of subcall function 02B55C5A: __getptd_noexit.LIBCMT ref: 02B55C5B
                                                                    • Part of subcall function 02B55C5A: __amsg_exit.LIBCMT ref: 02B55C68
                                                                    • Part of subcall function 02B53493: __getptd_noexit.LIBCMT ref: 02B53497
                                                                    • Part of subcall function 02B53493: __freeptd.LIBCMT ref: 02B534B1
                                                                    • Part of subcall function 02B53493: RtlExitUserThread.NTDLL(?,00000000,?,02B53473,00000000), ref: 02B534BA
                                                                  • __XcptFilter.LIBCMT ref: 02B5347F
                                                                    • Part of subcall function 02B58D94: __getptd_noexit.LIBCMT ref: 02B58D98
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                  • String ID:
                                                                  • API String ID: 1405322794-0
                                                                  • Opcode ID: b4c5186a2ec95c7dd76a31974a594c2ae4a6ea2f7bed89b51e933613bc9a6e31
                                                                  • Instruction ID: 4f3e26a49f0b796b0dea5504e64e3748e705515fdb716f83d0223c9868b506f0
                                                                  • Opcode Fuzzy Hash: b4c5186a2ec95c7dd76a31974a594c2ae4a6ea2f7bed89b51e933613bc9a6e31
                                                                  • Instruction Fuzzy Hash: 87E0ECB19006109FEB08ABE4D849F2D77A6AF04701F2000D8E502AF2A1CA75A9409F20
                                                                  APIs
                                                                  • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 0040B1AE
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: ManagerOpen
                                                                  • String ID:
                                                                  • API String ID: 1889721586-0
                                                                  • Opcode ID: cf02874c91136b65af9bd825d1381e977544c6f19db623b2ee5f13e18966f16a
                                                                  • Instruction ID: 10f8f75b7a5b984e447f2145cc5bc855778ec6c053f869de84572faec0d0a7fd
                                                                  • Opcode Fuzzy Hash: cf02874c91136b65af9bd825d1381e977544c6f19db623b2ee5f13e18966f16a
                                                                  • Instruction Fuzzy Hash: 7FD0C9B0188207AED6415A145EE9A6B6A9D9700389B610077A703FA0D2C77C4913A56E
                                                                  APIs
                                                                  • LoadLibraryExA.KERNEL32(?), ref: 004026F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: 2ffefd193c90f92843d900ae7330acfb58593e384b9b8f8cb04d9a15729fff3b
                                                                  • Instruction ID: 55da86a7c22177fb9da8a741819d44dacaf13f9e8be777b109144a2e47aab9ed
                                                                  • Opcode Fuzzy Hash: 2ffefd193c90f92843d900ae7330acfb58593e384b9b8f8cb04d9a15729fff3b
                                                                  • Instruction Fuzzy Hash: 73C08C30204225DBDF809F68CD0845A7BB0BB09390B20443AA802E6190C37AD546FA6A
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B7A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B7A000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b7a000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 00fda21aa4f6999b1973ee98266424329fe882cbed75b6e160fb1869c6f4db92
                                                                  • Instruction ID: 5074ca38ea3061d0b07b6d9aedac918fdbe649dbdeb16093f07291f22f66216d
                                                                  • Opcode Fuzzy Hash: 00fda21aa4f6999b1973ee98266424329fe882cbed75b6e160fb1869c6f4db92
                                                                  • Instruction Fuzzy Hash: B7C08CB2C0CA00CB82202A2000342F872D4FF003B8B0207E0D8BB970C1F6204801C762
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CopyFile
                                                                  • String ID:
                                                                  • API String ID: 1304948518-0
                                                                  • Opcode ID: d5a3fef82cecfca98db9aba2d8c584e4ae6fa9098fd7d698bfa279117e310313
                                                                  • Instruction ID: 27b55a9f479c15cebb526eb568bd9ea3016fd92b45f578236ba450c513afd059
                                                                  • Opcode Fuzzy Hash: d5a3fef82cecfca98db9aba2d8c584e4ae6fa9098fd7d698bfa279117e310313
                                                                  • Instruction Fuzzy Hash: 5AA01220108011A9C20017210E4CA132B1CA8042D13104432600BF0090D2344001B17E
                                                                  APIs
                                                                  • RegSetValueExA.KERNEL32(?), ref: 0040BA08
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Value
                                                                  • String ID:
                                                                  • API String ID: 3702945584-0
                                                                  • Opcode ID: 1685f7c456d3d7887bc01c2fe76020513d77641223809071ceb0ed41a957b4e2
                                                                  • Instruction ID: 944dab8ff0565964d74a122081c590851967a83f6e2dc0eec7852cf0a04d5f88
                                                                  • Opcode Fuzzy Hash: 1685f7c456d3d7887bc01c2fe76020513d77641223809071ceb0ed41a957b4e2
                                                                  • Instruction Fuzzy Hash: E3B00235554444EBDF495BD49D0456C7E31FB84305F150065D10371460C73D1961BF5E
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectory
                                                                  • String ID:
                                                                  • API String ID: 4241100979-0
                                                                  • Opcode ID: ffc4156f4625b7330c2c93eec9769fdc55d30a559b91697e3db6804761c21309
                                                                  • Instruction ID: 793a130eaca3266a2f1c00059c7ae23f2cef2ef9cd4948159e0a6ae6d704bc34
                                                                  • Opcode Fuzzy Hash: ffc4156f4625b7330c2c93eec9769fdc55d30a559b91697e3db6804761c21309
                                                                  • Instruction Fuzzy Hash: 89A011280AA020E2C00023800E0882A2828AB0A30233080B32303B00C002BE200222BF
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Close
                                                                  • String ID:
                                                                  • API String ID: 3535843008-0
                                                                  • Opcode ID: 2f0c0ee7b93b816afec65687230915d1bc6eeac997074f0fddbeeaaeb13b03ca
                                                                  • Instruction ID: 132241704f2cbcee585da161d3a163a158114c8ee8dc4bba32472dba3306d5aa
                                                                  • Opcode Fuzzy Hash: 2f0c0ee7b93b816afec65687230915d1bc6eeac997074f0fddbeeaaeb13b03ca
                                                                  • Instruction Fuzzy Hash: A5A0023184C011DBC6058B60FF0C4143EB1A7093053114131F30B745F9C7756565AB0E
                                                                  APIs
                                                                    • Part of subcall function 02B51610: OpenEventA.KERNEL32(00100002,00000000,00000000,114A922B), ref: 02B516B0
                                                                    • Part of subcall function 02B51610: CloseHandle.KERNEL32(00000000), ref: 02B516C5
                                                                    • Part of subcall function 02B51610: ResetEvent.KERNEL32(00000000,114A922B), ref: 02B516CF
                                                                    • Part of subcall function 02B51610: CloseHandle.KERNEL32(00000000,114A922B), ref: 02B51704
                                                                  • TlsSetValue.KERNEL32(00000029,?), ref: 02B521AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEventHandle$OpenResetValue
                                                                  • String ID:
                                                                  • API String ID: 1556185888-0
                                                                  • Opcode ID: e9cc1a342d52284c39f8de160e7b60388ee78a5e57bd8f4786e3f5881d8ae662
                                                                  • Instruction ID: f780c4481d59e7fb98e81ada290c4636acb5967359ebe8032cf84885e10b2a2c
                                                                  • Opcode Fuzzy Hash: e9cc1a342d52284c39f8de160e7b60388ee78a5e57bd8f4786e3f5881d8ae662
                                                                  • Instruction Fuzzy Hash: 4501A271A54614AFD710CF69DC49B5ABBE8FB056B0F104BAAF825D7380D73569108BA0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: c335043b519f2b7277d5842a893cee35beae00b72767f8ea11296971a4b78269
                                                                  • Instruction ID: 79585b8f341685c68b0e75d4489d2e542e5d1b4f03319b621c85242959596837
                                                                  • Opcode Fuzzy Hash: c335043b519f2b7277d5842a893cee35beae00b72767f8ea11296971a4b78269
                                                                  • Instruction Fuzzy Hash: 4AE08CB4448A02AAC3010760AA187343670BB05700F25047BEA02B21E287BC0802A78F
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 1586166983-0
                                                                  • Opcode ID: bfd32e8bebaf4738c04e136f569557cb02e4688712b64a1060ec01c40fd57dfd
                                                                  • Instruction ID: e07d2102fba6444aa55bc0a7879b2a1ecf55d77455f7471e3be8c1f9681d9c54
                                                                  • Opcode Fuzzy Hash: bfd32e8bebaf4738c04e136f569557cb02e4688712b64a1060ec01c40fd57dfd
                                                                  • Instruction Fuzzy Hash: 84D0C930908005EAD714DB619A48ABB36B8EA44300B704473E813F16D1D73EDE46AA9F
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 682526c0c53ba6acc547c1bdcedabad2b60da86fe09904c3499cf70290685139
                                                                  • Instruction ID: 2782af7457ad241782e5169fc804e2becae23a1994249feb63baa776145ba201
                                                                  • Opcode Fuzzy Hash: 682526c0c53ba6acc547c1bdcedabad2b60da86fe09904c3499cf70290685139
                                                                  • Instruction Fuzzy Hash: 61C04CA158870199D2002BB06A46B782520B705B05F24113BB643744E58ABD1447965F
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000), ref: 0040B260
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 367dd195deafc3b886d2342e0733c4b0975a9da48394fd82849ff99efdd45b3f
                                                                  • Instruction ID: 5ead19ffc53d7ebbd026c2da0249c553de8f3b5c399c0c92b75fbb43df237dc5
                                                                  • Opcode Fuzzy Hash: 367dd195deafc3b886d2342e0733c4b0975a9da48394fd82849ff99efdd45b3f
                                                                  • Instruction Fuzzy Hash: FBC04C71448116EAC6104BA1899966B7E65E704794F210066A60775190D3390455F6EE
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 6c2b882dcdb7a1abf5e8527242581c468366344255ea5e0c2e87ef9d24219f61
                                                                  • Instruction ID: 74068045256470f3dd3a554cd5d3f0a6b0424d4603797d1e90b4fc6c33a71604
                                                                  • Opcode Fuzzy Hash: 6c2b882dcdb7a1abf5e8527242581c468366344255ea5e0c2e87ef9d24219f61
                                                                  • Instruction Fuzzy Hash: 06B09260088600F6C2050E20A908F6AB621F704304F210033A203304D083790223B6CF
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 1586166983-0
                                                                  • Opcode ID: 58518032dce7e08399cfbf633ec0c1ad6fa6c0c7b9169ebf8e670fd16a8bf198
                                                                  • Instruction ID: 626df6a65ccca3d51b9a7a97a2b85cf4dd9eb484785059a454c979b0bf256277
                                                                  • Opcode Fuzzy Hash: 58518032dce7e08399cfbf633ec0c1ad6fa6c0c7b9169ebf8e670fd16a8bf198
                                                                  • Instruction Fuzzy Hash: A0900270245105DAE2105B72591C2152554A50C78131184355803E4251D7398011556D
                                                                  APIs
                                                                    • Part of subcall function 02B49AD9: __EH_prolog.LIBCMT ref: 02B49ADE
                                                                    • Part of subcall function 02B49AD9: _Allocate.LIBCPMT ref: 02B49B35
                                                                    • Part of subcall function 02B49AD9: _memmove.LIBCMT ref: 02B49B8C
                                                                  • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02B509A2
                                                                  • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02B509AA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                                  • String ID: Unknown error$invalid string position
                                                                  • API String ID: 1017912131-1837348584
                                                                  • Opcode ID: 590959b49f6d2f480518a87d52fd10140c4d2fa0abcc9dceb17a0e76439df9b8
                                                                  • Instruction ID: edd059261db0a2cc5bd8bf2cf3bcf63befad36835965bed5c26ab98065011467
                                                                  • Opcode Fuzzy Hash: 590959b49f6d2f480518a87d52fd10140c4d2fa0abcc9dceb17a0e76439df9b8
                                                                  • Instruction Fuzzy Hash: E7518B716083419FE714EF24C890B2EBBE4EB98744F500DADF8929B691D771E588CB52
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02B54E96,?,?,?,00000001), ref: 02B5952D
                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02B59536
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: b96facdca6b65925c9fca32f216ef8c280479fa442eda5c97cca6e6bc984d4e4
                                                                  • Instruction ID: 1738433b1c08ecc58f7f90c012ec2d8014f5de3906763f7ccebdea2b287250ba
                                                                  • Opcode Fuzzy Hash: b96facdca6b65925c9fca32f216ef8c280479fa442eda5c97cca6e6bc984d4e4
                                                                  • Instruction Fuzzy Hash: E6B09231498208EBCB012BD1EC0DB89BF28EB046AAF004810F60D46090CF665430AAB1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CreateService
                                                                  • String ID:
                                                                  • API String ID: 1592570254-0
                                                                  • Opcode ID: 4a5a075c31a5565f47885ef3262e2ae0e986f27cea8cae0c57d077f8a0bf62d8
                                                                  • Instruction ID: 0d72f299e3292f0dbb6d7f02471d5fcbb0e6c25bfe3a29601b0c5ca38fa06da3
                                                                  • Opcode Fuzzy Hash: 4a5a075c31a5565f47885ef3262e2ae0e986f27cea8cae0c57d077f8a0bf62d8
                                                                  • Instruction Fuzzy Hash: 6EA02220088002CFC2003F800C8C02A200CC0003C03308832C003F00E0C338008ABCFF
                                                                  APIs
                                                                  • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00402774
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: CtrlDispatcherServiceStart
                                                                  • String ID:
                                                                  • API String ID: 3789849863-0
                                                                  • Opcode ID: d897ad30ca74ad1159156f350e90eed3a975547678c72712f9971f2cea4a1484
                                                                  • Instruction ID: ecce91628b5bb0d88f311c4f8897261eaba8f6d2253593edf78e6da11db3912e
                                                                  • Opcode Fuzzy Hash: d897ad30ca74ad1159156f350e90eed3a975547678c72712f9971f2cea4a1484
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B424E6
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02B424FC
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02B4250E
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02B4256D
                                                                  • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02B4257F
                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02B42599
                                                                  • GetLastError.KERNEL32(?,74DEDFB0), ref: 02B425A2
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B425F0
                                                                  • InterlockedDecrement.KERNEL32(00000002), ref: 02B4262F
                                                                  • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02B4268E
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B42699
                                                                  • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02B426AD
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02B426BD
                                                                  • GetLastError.KERNEL32(?,74DEDFB0), ref: 02B426C7
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                  • String ID:
                                                                  • API String ID: 1213838671-0
                                                                  • Opcode ID: a872eb9c62305e54641ea959de5d6f0421177e63c6f49c0f900df070c59b72bb
                                                                  • Instruction ID: f611275481fd6cbdac00973ef5e3b18199361ab1a3011fd1ed686bcd58b7a17d
                                                                  • Opcode Fuzzy Hash: a872eb9c62305e54641ea959de5d6f0421177e63c6f49c0f900df070c59b72bb
                                                                  • Instruction Fuzzy Hash: 6F610D71900209AFCB10DFA4D988AAEFBB9FF08354F1449A9F956E7240DB349954EF60
                                                                  APIs
                                                                  • RegisterServiceCtrlHandlerA.ADVAPI32(EC SyncPlayer 11.4.45,Function_0000235E), ref: 004023C1
                                                                  • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402420
                                                                  • GetLastError.KERNEL32 ref: 00402422
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                  • GetLastError.KERNEL32 ref: 00402450
                                                                  • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402480
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                  • CloseHandle.KERNEL32 ref: 004024A1
                                                                  • SetServiceStatus.ADVAPI32(0040A0E0), ref: 004024CA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                  • String ID: EC SyncPlayer 11.4.45
                                                                  • API String ID: 3346042915-1070465486
                                                                  • Opcode ID: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                                  • Instruction ID: 1a4fa667c52d7ff4d8feb8687d6354091a6dd8a48d2d3221dc43f066c35bd2fd
                                                                  • Opcode Fuzzy Hash: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                                  • Instruction Fuzzy Hash: B5210A70841309EBD210DF16EF49E567FB8EB85754B11C03BE606B22B0D7BA0064EB6E
                                                                  APIs
                                                                  • RtlDecodePointer.NTDLL(?), ref: 02B5833B
                                                                  • _free.LIBCMT ref: 02B58354
                                                                    • Part of subcall function 02B52F74: HeapFree.KERNEL32(00000000,00000000,?,02B55CD2,00000000,00000104,74DF0A60), ref: 02B52F88
                                                                    • Part of subcall function 02B52F74: GetLastError.KERNEL32(00000000,?,02B55CD2,00000000,00000104,74DF0A60), ref: 02B52F9A
                                                                  • _free.LIBCMT ref: 02B58367
                                                                  • _free.LIBCMT ref: 02B58385
                                                                  • _free.LIBCMT ref: 02B58397
                                                                  • _free.LIBCMT ref: 02B583A8
                                                                  • _free.LIBCMT ref: 02B583B3
                                                                  • _free.LIBCMT ref: 02B583D7
                                                                  • RtlEncodePointer.NTDLL(00A7C128), ref: 02B583DE
                                                                  • _free.LIBCMT ref: 02B583F3
                                                                  • _free.LIBCMT ref: 02B58409
                                                                  • _free.LIBCMT ref: 02B58431
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 3064303923-0
                                                                  • Opcode ID: a47abe3c2b147ea6cdb07f91f7b7db425253dda7838dba529f52027edeb1930a
                                                                  • Instruction ID: 11e0c74bc5ca965cdb7d8018bc38dbe47f23f8f2bd7668a7e4d7bcb0622b69ff
                                                                  • Opcode Fuzzy Hash: a47abe3c2b147ea6cdb07f91f7b7db425253dda7838dba529f52027edeb1930a
                                                                  • Instruction Fuzzy Hash: C7216D32D42631CBCB256F14F88475977B9FB057A431D49BAEC089B290DB74A8ACDF90
                                                                  APIs
                                                                  • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,004051E5,00200020,00000000,?,00000000,00000000), ref: 00405957
                                                                  • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,004051E5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405973
                                                                  • LCMapStringA.KERNEL32(?,?,?,?,Q@ ,?,00000103,00000001,00000000,?,004051E5,00200020,00000000,?,00000000,00000000), ref: 004059BC
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004051E5,00200020,00000000,?,00000000,00000000), ref: 004059F4
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051E5,00200020,00000000,?,00000000), ref: 00405A4C
                                                                  • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051E5,00200020,00000000,?,00000000), ref: 00405A62
                                                                  • LCMapStringW.KERNEL32(?,?,?,00000000,Q@ ,?,?,004051E5,00200020,00000000,?,00000000), ref: 00405A95
                                                                  • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051E5,00200020,00000000,?,00000000), ref: 00405AFD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: String$ByteCharMultiWide
                                                                  • String ID: Q@
                                                                  • API String ID: 352835431-2369137212
                                                                  • Opcode ID: 07b02d0a0acee1d5bbf31b0bc0cbaa283d04d5fe1166f65728fa58cb4cf8732b
                                                                  • Instruction ID: dd8baff0e0c604ca78d82b0097404a494c432aabdc696b9a15c75a658a11cf3a
                                                                  • Opcode Fuzzy Hash: 07b02d0a0acee1d5bbf31b0bc0cbaa283d04d5fe1166f65728fa58cb4cf8732b
                                                                  • Instruction Fuzzy Hash: 90516B71A00609EFDF218F55DD85AAF7FB5FB48750F10422AF911B22A0C3399921DFA9
                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402E24), ref: 004035F9
                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402E24), ref: 0040360D
                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402E24), ref: 00403639
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402E24), ref: 00403671
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402E24), ref: 00403693
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402E24), ref: 004036AC
                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402E24), ref: 004036BF
                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004036FD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                  • String ID: $.@
                                                                  • API String ID: 1823725401-3185475474
                                                                  • Opcode ID: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                  • Instruction ID: bef4a5686f707a23519390f62e72ec8722b60112a6af60976956f1fb3d5a3ba4
                                                                  • Opcode Fuzzy Hash: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                  • Instruction Fuzzy Hash: 823122B25042647FDB307FB49C8483B7E9CE64534A712093BF542F3381E67A9E8186AD
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B43428
                                                                  • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02B4346B
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02B43472
                                                                  • GetLastError.KERNEL32 ref: 02B43486
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02B434D7
                                                                  • RtlEnterCriticalSection.NTDLL(00000018), ref: 02B434ED
                                                                  • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02B43518
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                  • String ID: CancelIoEx$KERNEL32
                                                                  • API String ID: 2902213904-434325024
                                                                  • Opcode ID: f49f51d5293d5288d11c786404a7e8f1b0c2b665c31dc4fe2609f6b0f2ca6581
                                                                  • Instruction ID: 9f3d1b1697aee654a718d36b666d837747e860d23786e969dd643a10f8a3bafd
                                                                  • Opcode Fuzzy Hash: f49f51d5293d5288d11c786404a7e8f1b0c2b665c31dc4fe2609f6b0f2ca6581
                                                                  • Instruction Fuzzy Hash: 3731ADB1A00215DFDB11AF64C888BAABBF8FF48314F1888D9E9059B240DB74D910DFA1
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403DBD,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 0040545A
                                                                  • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405472
                                                                  • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405483
                                                                  • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405490
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$LibraryLoad
                                                                  • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                                  • API String ID: 2238633743-4073082454
                                                                  • Opcode ID: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                  • Instruction ID: 719c486d86e77ef44942212c2818972a1bc491ccdb8af7780b8a6ee813afdaeb
                                                                  • Opcode Fuzzy Hash: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                  • Instruction Fuzzy Hash: F3017131700711AFD710CFB4AD80A677EE8FA88791309443BB915F22A1DB788860CB69
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403D06
                                                                  • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00403DDC
                                                                  • WriteFile.KERNEL32(00000000), ref: 00403DE3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandleModuleNameWrite
                                                                  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $r@
                                                                  • API String ID: 3784150691-1191147370
                                                                  • Opcode ID: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                  • Instruction ID: b93fff65649126e5b3d37bda6a1812f97b7c921671873a024369cfc986fa55b8
                                                                  • Opcode Fuzzy Hash: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                  • Instruction Fuzzy Hash: AE31A772A04208AEEF20EB60DE49FDE7B6CEF45305F1004BBF545F61C1D6BCAA548A59
                                                                  APIs
                                                                  • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,004051E5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BA3
                                                                  • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405BBD
                                                                  • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004051E5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BF1
                                                                  • MultiByteToWideChar.KERNEL32(Q@ ,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004051E5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405C29
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 00405C7F
                                                                  • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 00405C91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: StringType$ByteCharMultiWide
                                                                  • String ID: Q@
                                                                  • API String ID: 3852931651-2369137212
                                                                  • Opcode ID: 1f072edf838c0633f1ddd93648b40b2fa664618b3211cae8d1df43924b460189
                                                                  • Instruction ID: 4b3632b6e53a901d6a2e465bc2c777524628d5a2e1763878187fe0d2e8535d87
                                                                  • Opcode Fuzzy Hash: 1f072edf838c0633f1ddd93648b40b2fa664618b3211cae8d1df43924b460189
                                                                  • Instruction Fuzzy Hash: 1D418C71500609AFDF219F94DD8AAAF3F79FB05310F10443AF902B6290C3399960CBA9
                                                                  APIs
                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,114A922B), ref: 02B516B0
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B516C5
                                                                  • ResetEvent.KERNEL32(00000000,114A922B), ref: 02B516CF
                                                                  • CloseHandle.KERNEL32(00000000,114A922B), ref: 02B51704
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,114A922B), ref: 02B5177A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B5178F
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEventHandle$CreateOpenReset
                                                                  • String ID:
                                                                  • API String ID: 1285874450-0
                                                                  • Opcode ID: bdc205cb421ebbbfc2b10467e980785d00d1b8b5654d71ecfa5f0d76b04b14e9
                                                                  • Instruction ID: 300afaf0f031ddd94a575992583a6ee86cbbec89890a743eeb4af84efc65afda
                                                                  • Opcode Fuzzy Hash: bdc205cb421ebbbfc2b10467e980785d00d1b8b5654d71ecfa5f0d76b04b14e9
                                                                  • Instruction Fuzzy Hash: BA416E70D10368ABDF20CFA9C848BADBBB8FF05764F144659E818EF280D7349905CBA1
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B420AC
                                                                  • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02B420CD
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B420D8
                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02B4213E
                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02B4217A
                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02B42187
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B421A6
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                  • String ID:
                                                                  • API String ID: 1171374749-0
                                                                  • Opcode ID: 41d2f6fb820ad5662b3f63b06f41915e694b8ef16ac1594a1c24ff272db01995
                                                                  • Instruction ID: ce463c1f0d1af33fb3539bee4a2653c05f9be0ff09e946e5af6f79f93a3d7618
                                                                  • Opcode Fuzzy Hash: 41d2f6fb820ad5662b3f63b06f41915e694b8ef16ac1594a1c24ff272db01995
                                                                  • Instruction Fuzzy Hash: C14117715447019FC321DF25D888A6BBBF9EBC8654F004A5EF89A83250DB34E545EBA2
                                                                  APIs
                                                                    • Part of subcall function 02B51ED0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02B5172E,?,?), ref: 02B51EFF
                                                                    • Part of subcall function 02B51ED0: CloseHandle.KERNEL32(00000000,?,?,02B5172E,?,?), ref: 02B51F14
                                                                    • Part of subcall function 02B51ED0: SetEvent.KERNEL32(00000000,02B5172E,?,?), ref: 02B51F27
                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,114A922B), ref: 02B516B0
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B516C5
                                                                  • ResetEvent.KERNEL32(00000000,114A922B), ref: 02B516CF
                                                                  • CloseHandle.KERNEL32(00000000,114A922B), ref: 02B51704
                                                                  • __CxxThrowException@8.LIBCMT ref: 02B51735
                                                                    • Part of subcall function 02B5455A: RaiseException.KERNEL32(?,?,02B4FB5F,?,?,?,?,?,?,?,02B4FB5F,?,02B70F98,?), ref: 02B545AF
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,114A922B), ref: 02B5177A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B5178F
                                                                    • Part of subcall function 02B51C10: GetCurrentProcessId.KERNEL32(?), ref: 02B51C69
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,114A922B), ref: 02B5179F
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                  • String ID:
                                                                  • API String ID: 2227236058-0
                                                                  • Opcode ID: f33165fb04c3a581a2377232cb47d3ab0765bde4ada1a8478ce07d18b8ba89cf
                                                                  • Instruction ID: 1d5e5fabc0cd157b5604d32ea08d6ad4dd29a9bb53d466be98a50a4151297e50
                                                                  • Opcode Fuzzy Hash: f33165fb04c3a581a2377232cb47d3ab0765bde4ada1a8478ce07d18b8ba89cf
                                                                  • Instruction Fuzzy Hash: A2314D71D10368ABEF21DBAC9C48BADB7B9EF05364F140199EC1DEF280D7219945CB61
                                                                  APIs
                                                                  • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403A76), ref: 00404679
                                                                  • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403A76), ref: 0040469D
                                                                  • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403A76), ref: 004046B7
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403A76), ref: 00404778
                                                                  • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403A76), ref: 0040478F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual$FreeHeap
                                                                  • String ID: r@$r@
                                                                  • API String ID: 714016831-1712950306
                                                                  • Opcode ID: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                  • Instruction ID: 1cc5eaf967e246a12e5a52ca871b73f99b907e1947bc06876926af54f9e9662d
                                                                  • Opcode Fuzzy Hash: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                  • Instruction Fuzzy Hash: A231CFB19407029BD331DF28DD44B62B7A4E785754F11467BF255B72D0E778A8008B5D
                                                                  APIs
                                                                  • __init_pointers.LIBCMT ref: 02B55D94
                                                                    • Part of subcall function 02B58503: RtlEncodePointer.NTDLL(00000000), ref: 02B58506
                                                                    • Part of subcall function 02B58503: __initp_misc_winsig.LIBCMT ref: 02B58521
                                                                    • Part of subcall function 02B58503: GetModuleHandleW.KERNEL32(kernel32.dll,?,02B71598,00000008,00000003,02B70F7C,?,00000001), ref: 02B59281
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02B59295
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02B592A8
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02B592BB
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02B592CE
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02B592E1
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02B592F4
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02B59307
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02B5931A
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02B5932D
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02B59340
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02B59353
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02B59366
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02B59379
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02B5938C
                                                                    • Part of subcall function 02B58503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02B5939F
                                                                  • __mtinitlocks.LIBCMT ref: 02B55D99
                                                                  • __mtterm.LIBCMT ref: 02B55DA2
                                                                    • Part of subcall function 02B55E0A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02B58939
                                                                    • Part of subcall function 02B55E0A: _free.LIBCMT ref: 02B58940
                                                                    • Part of subcall function 02B55E0A: RtlDeleteCriticalSection.NTDLL(02B73978), ref: 02B58962
                                                                  • __calloc_crt.LIBCMT ref: 02B55DC7
                                                                  • __initptd.LIBCMT ref: 02B55DE9
                                                                  • GetCurrentThreadId.KERNEL32 ref: 02B55DF0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                  • String ID:
                                                                  • API String ID: 3567560977-0
                                                                  • Opcode ID: 34d5ada7d990e038aab73a88e2f00ad1a68a138223d76cffe3f959fd9b157038
                                                                  • Instruction ID: 6cb6b061aa283ca3eac0088ce1dce13c352fc1feffb7863b86252248643bb1ee
                                                                  • Opcode Fuzzy Hash: 34d5ada7d990e038aab73a88e2f00ad1a68a138223d76cffe3f959fd9b157038
                                                                  • Instruction Fuzzy Hash: 2FF0F0325196316EE6397675BC4974B2B83DB01772B6006D9FC20CE0E0FF2184814BA0
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02B53473,00000000), ref: 02B534DB
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02B534E2
                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02B534EE
                                                                  • RtlDecodePointer.NTDLL(00000001), ref: 02B5350B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoInitialize$combase.dll
                                                                  • API String ID: 3489934621-340411864
                                                                  • Opcode ID: 4c5d99bc67ff25c25c2db7f1725adf77f319906c2fd38f408b597c9ffbb7c97d
                                                                  • Instruction ID: b8583364cee6dcdf8d84e9569ad18b0c763726727cbffb6a0179a33c1bc2a6de
                                                                  • Opcode Fuzzy Hash: 4c5d99bc67ff25c25c2db7f1725adf77f319906c2fd38f408b597c9ffbb7c97d
                                                                  • Instruction Fuzzy Hash: ADE0ED70DD0350AAEA105B70EC4DF163759E700786F0048A4F502D62D1CBB951689F20
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02B534B0), ref: 02B535B0
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02B535B7
                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02B535C2
                                                                  • RtlDecodePointer.NTDLL(02B534B0), ref: 02B535DD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoUninitialize$combase.dll
                                                                  • API String ID: 3489934621-2819208100
                                                                  • Opcode ID: 307e3d3f30481ec77dd7ffa4e31099ff004b202b08052006441eaef2bf682a9f
                                                                  • Instruction ID: d815be2b58035eb3e660863ba76dade15a007800867e0a106ce64a7f3ca69e20
                                                                  • Opcode Fuzzy Hash: 307e3d3f30481ec77dd7ffa4e31099ff004b202b08052006441eaef2bf682a9f
                                                                  • Instruction Fuzzy Hash: 85E01270ED0300ABEA108F60AD4CB163BA8F710789F004CA1F602D2290DBB85168EA10
                                                                  APIs
                                                                  • TlsGetValue.KERNEL32(00000029,114A922B,?,?,?,?,00000000,02B66AB8,000000FF,02B521CA), ref: 02B51F6A
                                                                  • TlsSetValue.KERNEL32(00000029,02B521CA,?,?,00000000), ref: 02B51FD7
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02B52001
                                                                  • HeapFree.KERNEL32(00000000), ref: 02B52004
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: HeapValue$FreeProcess
                                                                  • String ID:
                                                                  • API String ID: 1812714009-0
                                                                  • Opcode ID: 3be7a0c08050eb2935e0c5bc51701df0097dd1a6de9fbf461dc9e4b2faedfe20
                                                                  • Instruction ID: 4778ae9176455eb2b009b7d78ded810a082af6590755a196854d52bf97921778
                                                                  • Opcode Fuzzy Hash: 3be7a0c08050eb2935e0c5bc51701df0097dd1a6de9fbf461dc9e4b2faedfe20
                                                                  • Instruction Fuzzy Hash: DF51B0759063249FDB20DF29C448B2ABBE5FF48764F0986A9EC599B390D735EC00CB91
                                                                  APIs
                                                                  • _ValidateScopeTableHandlers.LIBCMT ref: 02B65790
                                                                  • __FindPESection.LIBCMT ref: 02B657AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FindHandlersScopeSectionTableValidate
                                                                  • String ID:
                                                                  • API String ID: 876702719-0
                                                                  • Opcode ID: 3a2b8943120f7459fc80546c9a4b9e2f20206f995171604376731258e4608c02
                                                                  • Instruction ID: 523d25d482c00b3c08b35351fe6317fe1cfa2984d80875df7974c34630be9b57
                                                                  • Opcode Fuzzy Hash: 3a2b8943120f7459fc80546c9a4b9e2f20206f995171604376731258e4608c02
                                                                  • Instruction Fuzzy Hash: CBA1BF72E007158FDB31CF18D8887B9B7B5FB44324F9546A9DD55AB290EB38E821CB90
                                                                  APIs
                                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02B41CB1
                                                                  • CloseHandle.KERNEL32(?), ref: 02B41CBA
                                                                  • InterlockedExchangeAdd.KERNEL32(02B7727C,00000000), ref: 02B41CC6
                                                                  • TerminateThread.KERNEL32(?,00000000), ref: 02B41CD4
                                                                  • QueueUserAPC.KERNEL32(02B41E7C,?,00000000), ref: 02B41CE1
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02B41CEC
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 1946104331-0
                                                                  • Opcode ID: f913322c021c9b832a8e70bdb600030b943590451eb06a7f1805d723fd61d11f
                                                                  • Instruction ID: 199c557bea6c2d57911098a96442f448a98656b209f9c431dc05315054438015
                                                                  • Opcode Fuzzy Hash: f913322c021c9b832a8e70bdb600030b943590451eb06a7f1805d723fd61d11f
                                                                  • Instruction Fuzzy Hash: 1EF08131950204BFD7104B9ADD0DC57FBBCEB45720B004699F56AC21D0DF605950EB70
                                                                  APIs
                                                                  • GetVersionExA.KERNEL32 ref: 00403907
                                                                  • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 0040393C
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040399C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentFileModuleNameVariableVersion
                                                                  • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                  • API String ID: 1385375860-4131005785
                                                                  • Opcode ID: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                  • Instruction ID: 24b01e2c5f2cf27f02eabbfbb156e14d1de3d61a730e22f90953ffde06304200
                                                                  • Opcode Fuzzy Hash: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                  • Instruction Fuzzy Hash: 9231E4B1A452446EEB31DE755C45BDA3FAC9B02705F2400FBE185F52C2E6B88F89CB19
                                                                  APIs
                                                                  • std::exception::exception.LIBCMT ref: 02B5197F
                                                                    • Part of subcall function 02B524D3: std::exception::_Copy_str.LIBCMT ref: 02B524EC
                                                                    • Part of subcall function 02B50D50: __CxxThrowException@8.LIBCMT ref: 02B50DAE
                                                                  • std::exception::exception.LIBCMT ref: 02B519DE
                                                                  Strings
                                                                  • boost unique_lock has no mutex, xrefs: 02B5196E
                                                                  • $, xrefs: 02B519E3
                                                                  • boost unique_lock owns already the mutex, xrefs: 02B519CD
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                  • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                  • API String ID: 2140441600-46888669
                                                                  • Opcode ID: 7b56fd9ab749ebada88b6226b9e66026195af718ec153040b5eb5ddb131478e8
                                                                  • Instruction ID: 9085863fb7cdc1ba3e7a7cd2e639350f32c8d424774bef48c07774b33af41591
                                                                  • Opcode Fuzzy Hash: 7b56fd9ab749ebada88b6226b9e66026195af718ec153040b5eb5ddb131478e8
                                                                  • Instruction Fuzzy Hash: 812128B15187909FD711EF24C54875BBBE5BF88708F004E9DF9A58B280D7B99848CF92
                                                                  APIs
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B42350
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B42360
                                                                  • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B42370
                                                                  • GetLastError.KERNEL32 ref: 02B4237A
                                                                    • Part of subcall function 02B41712: __EH_prolog.LIBCMT ref: 02B41717
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                  • String ID: pqcs
                                                                  • API String ID: 1619523792-2559862021
                                                                  • Opcode ID: 931a9a004284c3c04e44c56cfd8bd024fbcdb2c40a584ebb2f6f5d11132cf7ee
                                                                  • Instruction ID: e1401522c1e06f301fb55763576df039da147a3287df85e66a649f0861bd641c
                                                                  • Opcode Fuzzy Hash: 931a9a004284c3c04e44c56cfd8bd024fbcdb2c40a584ebb2f6f5d11132cf7ee
                                                                  • Instruction Fuzzy Hash: 74F03071950304AFDB20AF74994DBABBBBCEB04649F0049A9F905D3140EF749914ABA1
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B44035
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 02B44042
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02B44049
                                                                  • std::exception::exception.LIBCMT ref: 02B44063
                                                                    • Part of subcall function 02B4A6CA: __EH_prolog.LIBCMT ref: 02B4A6CF
                                                                    • Part of subcall function 02B4A6CA: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B4A6DE
                                                                    • Part of subcall function 02B4A6CA: __CxxThrowException@8.LIBCMT ref: 02B4A6FD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                  • String ID: bad allocation
                                                                  • API String ID: 3112922283-2104205924
                                                                  • Opcode ID: 29347007772b38b43013af1a8c1f8962fd5f387ab5fa563c7d8dfc8043850907
                                                                  • Instruction ID: 9e176811ac71934203c0e168804238e92e15fe9573c2c9210756824ecf07c109
                                                                  • Opcode Fuzzy Hash: 29347007772b38b43013af1a8c1f8962fd5f387ab5fa563c7d8dfc8043850907
                                                                  • Instruction Fuzzy Hash: 14F08272D44209ABCB10EFE0C81CBBFB779EB04744F4045D5E915A6280DB3852249F51
                                                                  APIs
                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00403769
                                                                  • GetFileType.KERNEL32(00000800), ref: 0040380F
                                                                  • GetStdHandle.KERNEL32(-000000F6), ref: 00403868
                                                                  • GetFileType.KERNEL32(00000000), ref: 00403876
                                                                  • SetHandleCount.KERNEL32 ref: 004038AD
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandleType$CountInfoStartup
                                                                  • String ID:
                                                                  • API String ID: 1710529072-0
                                                                  • Opcode ID: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                  • Instruction ID: 7aeea0d4db44b673a81bd41ca563771f5c0df64e32c8b5c2d8e76d2542b5c17e
                                                                  • Opcode Fuzzy Hash: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                  • Instruction Fuzzy Hash: A05123B25043508BD7209F28C948B577FE8AB01726F19C67AF4A2AB2E1C338C955C65A
                                                                  APIs
                                                                    • Part of subcall function 02B51A50: CloseHandle.KERNEL32(00000000,114A922B), ref: 02B51AA1
                                                                    • Part of subcall function 02B51A50: WaitForSingleObject.KERNEL32(?,000000FF,114A922B,?,?,?,?,114A922B,02B51A23,114A922B), ref: 02B51AB8
                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02B51D1E
                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02B51D3E
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02B51D77
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02B51DCB
                                                                  • SetEvent.KERNEL32(?), ref: 02B51DD2
                                                                    • Part of subcall function 02B4418C: CloseHandle.KERNEL32(00000000,?,02B51D05), ref: 02B441B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                  • String ID:
                                                                  • API String ID: 4166353394-0
                                                                  • Opcode ID: 6f525208ac7070d014964de130176ab8475fdb35bd2920d3ee69821e93b3b04f
                                                                  • Instruction ID: e30104d0c70d8b0bfaa90c57a886dff646b6024b386f945e359dc1f1e8e2a35c
                                                                  • Opcode Fuzzy Hash: 6f525208ac7070d014964de130176ab8475fdb35bd2920d3ee69821e93b3b04f
                                                                  • Instruction Fuzzy Hash: 7F41CE716107219BEB269F2DCC80B26B7A4EF45724F1406A8EC19EF2D5D739D8118BA1
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4E0FD
                                                                    • Part of subcall function 02B41A01: TlsGetValue.KERNEL32 ref: 02B41A0A
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B4E17C
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02B4E198
                                                                  • InterlockedIncrement.KERNEL32(02B75190), ref: 02B4E1BD
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02B4E1D2
                                                                    • Part of subcall function 02B427F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02B4284E
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                  • String ID:
                                                                  • API String ID: 1578506061-0
                                                                  • Opcode ID: 9bb607b8348b72b120050fe9f2fc5f2d37030f98817266ac6dd656d99d7a1efb
                                                                  • Instruction ID: 75c3af7f15f7210c205404ba84e7ece5f6e1e67dcbb8b6336d79d647c0730ef7
                                                                  • Opcode Fuzzy Hash: 9bb607b8348b72b120050fe9f2fc5f2d37030f98817266ac6dd656d99d7a1efb
                                                                  • Instruction Fuzzy Hash: C03128B1D013059FCB10DF68C588AAABBF9FF08314F14859EE849D7641EB74A654DFA0
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 02B603B0
                                                                    • Part of subcall function 02B52FAC: __FF_MSGBANNER.LIBCMT ref: 02B52FC3
                                                                    • Part of subcall function 02B52FAC: __NMSG_WRITE.LIBCMT ref: 02B52FCA
                                                                    • Part of subcall function 02B52FAC: RtlAllocateHeap.NTDLL(009E0000,00000000,00000001), ref: 02B52FEF
                                                                  • _free.LIBCMT ref: 02B603C3
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateHeap_free_malloc
                                                                  • String ID:
                                                                  • API String ID: 1020059152-0
                                                                  • Opcode ID: 6c2218b57482bf439615d097e3e3524654fd15feb3d74927df1d870c628eda8b
                                                                  • Instruction ID: db16ff7e0334021357a4ed84752a12b3075a89c6c82dd8a96704c1557574bd9f
                                                                  • Opcode Fuzzy Hash: 6c2218b57482bf439615d097e3e3524654fd15feb3d74927df1d870c628eda8b
                                                                  • Instruction Fuzzy Hash: 2D119432805625ABDF313F71A84877E37A9FB043A5B1889E5ED599A580DB388850CB90
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B421DA
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B421ED
                                                                  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02B42224
                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02B42237
                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02B42261
                                                                    • Part of subcall function 02B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B42350
                                                                    • Part of subcall function 02B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B42360
                                                                    • Part of subcall function 02B42341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B42370
                                                                    • Part of subcall function 02B42341: GetLastError.KERNEL32 ref: 02B4237A
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 1856819132-0
                                                                  • Opcode ID: dc4641b68c343f2efcd440d52ef39766abb1478b5838691409f602eb208123ae
                                                                  • Instruction ID: 11f6409c495324973adc629e813e58f1a69a1121dfd83357ec6f45b23cf2c92b
                                                                  • Opcode Fuzzy Hash: dc4641b68c343f2efcd440d52ef39766abb1478b5838691409f602eb208123ae
                                                                  • Instruction Fuzzy Hash: 32116D72D04129ABCB11AFA8D8486AEFBBAFB54354F0045AAFC5593290DB754620FF90
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4229D
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B422B0
                                                                  • TlsGetValue.KERNEL32 ref: 02B422E7
                                                                  • TlsSetValue.KERNEL32(?), ref: 02B42300
                                                                  • TlsSetValue.KERNEL32(?,?,?), ref: 02B4231C
                                                                    • Part of subcall function 02B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B42350
                                                                    • Part of subcall function 02B42341: InterlockedExchange.KERNEL32(?,00000001), ref: 02B42360
                                                                    • Part of subcall function 02B42341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02B42370
                                                                    • Part of subcall function 02B42341: GetLastError.KERNEL32 ref: 02B4237A
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 1856819132-0
                                                                  • Opcode ID: 4773afa08e02a422efc02bd7cd21022ce9753d924e613dc8804232edaff8d75e
                                                                  • Instruction ID: 6d5c782f0e9b67f42d00c686bcba796b7dbb539ddcb0a1da015ee911ef3d6820
                                                                  • Opcode Fuzzy Hash: 4773afa08e02a422efc02bd7cd21022ce9753d924e613dc8804232edaff8d75e
                                                                  • Instruction Fuzzy Hash: B6115E72D10119ABCB119FA4D848AAEFFBAFF54354F0444AAF815A3290DB754A24EF90
                                                                  APIs
                                                                    • Part of subcall function 02B4B165: __EH_prolog.LIBCMT ref: 02B4B16A
                                                                  • __CxxThrowException@8.LIBCMT ref: 02B4BD2F
                                                                    • Part of subcall function 02B5455A: RaiseException.KERNEL32(?,?,02B4FB5F,?,?,?,?,?,?,?,02B4FB5F,?,02B70F98,?), ref: 02B545AF
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02B71DB4,?,00000001), ref: 02B4BD45
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B4BD58
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02B71DB4,?,00000001), ref: 02B4BD68
                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02B4BD76
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                  • String ID:
                                                                  • API String ID: 2725315915-0
                                                                  • Opcode ID: 8d4c504ee066e319bf0a79560ecce66e4d677b50868c449fb156c2677cc22efe
                                                                  • Instruction ID: a48068d386d2195fe01847faa14abd6558c58e452e19e5e4d3e1042a23678340
                                                                  • Opcode Fuzzy Hash: 8d4c504ee066e319bf0a79560ecce66e4d677b50868c449fb156c2677cc22efe
                                                                  • Instruction Fuzzy Hash: 0F018676A502046FDB209EA4DCCDF8A77ADEB04759F004999F626D71D0DB64E8449B20
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02B42432
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B42445
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02B42454
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B42469
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02B42470
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 747265849-0
                                                                  • Opcode ID: 5894841e50fda4d502cbc0deea1f071f1996874f84ede1b0515c883f1de690e4
                                                                  • Instruction ID: 885caa9777d9eb427e4170895027d1dfb9c14991d491eebf6d0c3a3424636b98
                                                                  • Opcode Fuzzy Hash: 5894841e50fda4d502cbc0deea1f071f1996874f84ede1b0515c883f1de690e4
                                                                  • Instruction Fuzzy Hash: 5FF03072680204BBD7009AA0ED8DFD6B72DFB44755F804451F701D74C0DF65A920EBB1
                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(?), ref: 02B41ED2
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02B41EEA
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02B41EF9
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B41F0E
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02B41F15
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 830998967-0
                                                                  • Opcode ID: 458c194573e8017fd4df3468839e3c0b9688036e4e9fef277d96d7dc1d5b3383
                                                                  • Instruction ID: 0b4e4bf52c20158f8c5d60a4be01ec255fcb75c7333df595eef331a26c2619b4
                                                                  • Opcode Fuzzy Hash: 458c194573e8017fd4df3468839e3c0b9688036e4e9fef277d96d7dc1d5b3383
                                                                  • Instruction Fuzzy Hash: A4F06732650205BBDB00AFA0ED88FD6BB2DFF04789F000412F20187480DF69AA25DBB0
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: d3b7112e2a4e245f8b805595af63b51287d51f88858d8c572a796d85d869c88c
                                                                  • Instruction ID: 9e5fd49603c71312e0394ba0d76b2a66afaca7ee787c9ab0aec3862476a12678
                                                                  • Opcode Fuzzy Hash: d3b7112e2a4e245f8b805595af63b51287d51f88858d8c572a796d85d869c88c
                                                                  • Instruction Fuzzy Hash: 9041B031700314ABDB24EE6DDCD4E6AB7AAEB41754B0409ADE8568B781CF70F844DBA1
                                                                  APIs
                                                                  • WSASetLastError.WS2_32(00000000), ref: 02B430C3
                                                                  • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02B43102
                                                                  • _memcmp.LIBCMT ref: 02B43141
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressErrorLastString_memcmp
                                                                  • String ID: 255.255.255.255
                                                                  • API String ID: 1618111833-2422070025
                                                                  • Opcode ID: 800f1b3c2f1158dfa0a10fcac3b1fc9a48a505c988065a7edf0f493a29333672
                                                                  • Instruction ID: ba8dc45e0104dc16200ed2e4ac4ff46e03a4bbdbb1742fe544a095a86986788e
                                                                  • Opcode Fuzzy Hash: 800f1b3c2f1158dfa0a10fcac3b1fc9a48a505c988065a7edf0f493a29333672
                                                                  • Instruction Fuzzy Hash: E031D371A007189FDB20AF64C8D076EB7E5EF45324F2449E9EC559B280EF719981CB90
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B41F5B
                                                                  • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02B41FC5
                                                                  • GetLastError.KERNEL32(?,00000000), ref: 02B41FD2
                                                                    • Part of subcall function 02B41712: __EH_prolog.LIBCMT ref: 02B41717
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                  • String ID: iocp
                                                                  • API String ID: 998023749-976528080
                                                                  • Opcode ID: 38f799ef9a37c02733518a5c78e7ab16365ed4a291c9fd1f3debfafc89be9ce4
                                                                  • Instruction ID: 2d667ce7c499515518b2ce853920a24419b7e5ab19177816491ad561a81084cd
                                                                  • Opcode Fuzzy Hash: 38f799ef9a37c02733518a5c78e7ab16365ed4a291c9fd1f3debfafc89be9ce4
                                                                  • Instruction Fuzzy Hash: C821E4B1901B449FC720DF6AC54455BFBF8FF94720B108A5FE8A683A90D7B4A644CF91
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051E5,00200020,00000000,?,00000000), ref: 00405A4C
                                                                  • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051E5,00200020,00000000,?,00000000), ref: 00405A62
                                                                  • LCMapStringW.KERNEL32(?,?,?,00000000,Q@ ,?,?,004051E5,00200020,00000000,?,00000000), ref: 00405A95
                                                                  • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051E5,00200020,00000000,?,00000000), ref: 00405AFD
                                                                  • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,Q@ ,?,00000000,00000000,?,00000000,?,004051E5,00200020,00000000,?,00000000), ref: 00405B22
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: String$ByteCharMultiWide
                                                                  • String ID: Q@
                                                                  • API String ID: 352835431-2369137212
                                                                  • Opcode ID: 97e826765c333d16f7cbdfb3d62a925f0377e56339be4bed5ee7552fc8779137
                                                                  • Instruction ID: 876b9e3a682e269875083bcddfa4c935106d124651a593956607a31a4446b0ba
                                                                  • Opcode Fuzzy Hash: 97e826765c333d16f7cbdfb3d62a925f0377e56339be4bed5ee7552fc8779137
                                                                  • Instruction Fuzzy Hash: 50113A32A00609AFCF228F94DD40ADFBBB5FB48350F148166F911B21A0D33A9D60DF54
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 02B53B64
                                                                    • Part of subcall function 02B52FAC: __FF_MSGBANNER.LIBCMT ref: 02B52FC3
                                                                    • Part of subcall function 02B52FAC: __NMSG_WRITE.LIBCMT ref: 02B52FCA
                                                                    • Part of subcall function 02B52FAC: RtlAllocateHeap.NTDLL(009E0000,00000000,00000001), ref: 02B52FEF
                                                                  • std::exception::exception.LIBCMT ref: 02B53B82
                                                                  • __CxxThrowException@8.LIBCMT ref: 02B53B97
                                                                    • Part of subcall function 02B5455A: RaiseException.KERNEL32(?,?,02B4FB5F,?,?,?,?,?,?,?,02B4FB5F,?,02B70F98,?), ref: 02B545AF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                  • String ID: bad allocation
                                                                  • API String ID: 3074076210-2104205924
                                                                  • Opcode ID: 90bd173153538652868e20eb0541c9a30296d600f5bf14d906808ca0bd62f9d6
                                                                  • Instruction ID: 9d1f0742393b61a6e1b733bc13a72c99062e028eed946604cf1d41291c4337dc
                                                                  • Opcode Fuzzy Hash: 90bd173153538652868e20eb0541c9a30296d600f5bf14d906808ca0bd62f9d6
                                                                  • Instruction Fuzzy Hash: 84E0653190062EA6DF00FEA4DC05FEF7BB9EB00354F4045D5AD24AE291DB719A54DA91
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B437B6
                                                                  • __localtime64.LIBCMT ref: 02B437C1
                                                                    • Part of subcall function 02B52600: __gmtime64_s.LIBCMT ref: 02B52613
                                                                  • std::exception::exception.LIBCMT ref: 02B437D9
                                                                    • Part of subcall function 02B524D3: std::exception::_Copy_str.LIBCMT ref: 02B524EC
                                                                    • Part of subcall function 02B4A528: __EH_prolog.LIBCMT ref: 02B4A52D
                                                                    • Part of subcall function 02B4A528: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B4A53C
                                                                    • Part of subcall function 02B4A528: __CxxThrowException@8.LIBCMT ref: 02B4A55B
                                                                  Strings
                                                                  • could not convert calendar time to UTC time, xrefs: 02B437CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                  • String ID: could not convert calendar time to UTC time
                                                                  • API String ID: 1963798777-2088861013
                                                                  • Opcode ID: 12455188ad056df43078676be21fef133fb5c84deae86cdc6bd46b44bf6404d0
                                                                  • Instruction ID: 17d5f2d917a73e7f2946c56e7d4b5231a72e88f3606248214a9da6e62d207a7e
                                                                  • Opcode Fuzzy Hash: 12455188ad056df43078676be21fef133fb5c84deae86cdc6bd46b44bf6404d0
                                                                  • Instruction Fuzzy Hash: B9E065B2D0120A9ACB14EFA4D958BBFBBB9FB04300F4085D9DC15A6240EB3886198F94
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 004040D2
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0040412D
                                                                  • HeapFree.KERNEL32(00000000,?), ref: 0040413F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Free$Virtual$Heap
                                                                  • String ID: $.@
                                                                  • API String ID: 2016334554-3185475474
                                                                  • Opcode ID: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                  • Instruction ID: 52cba6c4d4aa7b6c0db55710ed4d4ef1c2bc3465caadef879631ce54cd7cec75
                                                                  • Opcode Fuzzy Hash: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                  • Instruction Fuzzy Hash: 21B16C35A002059FDB28CF44D990AA9BBB1FB88314F24C1AED9596F396C735EE41CB84
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AdjustPointer_memmove
                                                                  • String ID:
                                                                  • API String ID: 1721217611-0
                                                                  • Opcode ID: bcf0a0b9e5fef891c539bfc29cdc8d1e532f778599cb5e337120e33fc1c6c886
                                                                  • Instruction ID: decaba946448ad4513acb63f4841bd7b51bf22b6458dda2ef25708b140a8bf56
                                                                  • Opcode Fuzzy Hash: bcf0a0b9e5fef891c539bfc29cdc8d1e532f778599cb5e337120e33fc1c6c886
                                                                  • Instruction Fuzzy Hash: 3D41B3756043125FEB259EB4E842B7A7BAAEF01354F24009FED459E2D2DB71E580CA14
                                                                  APIs
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02B44149), ref: 02B513BF
                                                                    • Part of subcall function 02B43FDC: __EH_prolog.LIBCMT ref: 02B43FE1
                                                                    • Part of subcall function 02B43FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02B43FF3
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B513B4
                                                                  • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02B44149), ref: 02B51400
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02B44149), ref: 02B514D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$Event$CreateH_prolog
                                                                  • String ID:
                                                                  • API String ID: 2825413587-0
                                                                  • Opcode ID: 95dc0ceabe6a4a196259909785d4a422fa6ada380eb5a1e7110f3d9496bdba67
                                                                  • Instruction ID: 183ce86b379402d26ec812ef5222452247d87946e7be5c30570a1b2971f0add8
                                                                  • Opcode Fuzzy Hash: 95dc0ceabe6a4a196259909785d4a422fa6ada380eb5a1e7110f3d9496bdba67
                                                                  • Instruction Fuzzy Hash: 1751AEB16003159BDB11DF28C894B5AB7E4EF4836CF1946A8EC6DAB390EB35D805CF91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                  • String ID:
                                                                  • API String ID: 2782032738-0
                                                                  • Opcode ID: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                                  • Instruction ID: 0c82ad8e05c394ed6ba9b88bb1cd3e9f12b9b8f7600c4ef1ed2265fc0537a1e9
                                                                  • Opcode Fuzzy Hash: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                                  • Instruction Fuzzy Hash: 6841A371B00726ABDB1C8EA9C890B6EB7E6EF443A4B1485EDEC15CF340D775E9418B40
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02B5FF4B
                                                                  • __isleadbyte_l.LIBCMT ref: 02B5FF79
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02B5FFA7
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02B5FFDD
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                  • String ID:
                                                                  • API String ID: 3058430110-0
                                                                  • Opcode ID: ba74fc94d7eed511fae2ae2cdd15542bcbda34a14ea4bc27eebc795b669a4f57
                                                                  • Instruction ID: f33529062fa9a1487d3b9d76d958558f5c48dc176de0880f2f6857d2cf5fa6f0
                                                                  • Opcode Fuzzy Hash: ba74fc94d7eed511fae2ae2cdd15542bcbda34a14ea4bc27eebc795b669a4f57
                                                                  • Instruction Fuzzy Hash: BD31EF31602366AFDB219E64C844BBAFBA6FF43354F1544A9EC648B9D0E730D851CB90
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(FFFFFFFF,00001000,00004000,74DEDFF0,?,00000000,?,$.@,0040494E,00000010,00402FE3,?,?), ref: 00404830
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID: $.@$r@$r@
                                                                  • API String ID: 1263568516-2024880544
                                                                  • Opcode ID: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                  • Instruction ID: 239a81ebb8be825a850bacd412b0a7c79afcc31b03ae4da5e11b51f0f7acaea7
                                                                  • Opcode Fuzzy Hash: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                  • Instruction Fuzzy Hash: E921F3B7600741DFDB20AB64C94476A33A4EB80379F148A3BDB65B26D0C378ED41CB58
                                                                  APIs
                                                                  • htons.WS2_32(?), ref: 02B43DA2
                                                                    • Part of subcall function 02B43BD3: __EH_prolog.LIBCMT ref: 02B43BD8
                                                                    • Part of subcall function 02B43BD3: std::bad_exception::bad_exception.LIBCMT ref: 02B43BED
                                                                  • htonl.WS2_32(00000000), ref: 02B43DB9
                                                                  • htonl.WS2_32(00000000), ref: 02B43DC0
                                                                  • htons.WS2_32(?), ref: 02B43DD4
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                  • String ID:
                                                                  • API String ID: 3882411702-0
                                                                  • Opcode ID: 8ea7c6170d92c7731bc12e25295f2737848f740f2fac9b1ad7ff51a8a3a87931
                                                                  • Instruction ID: f18e2d22a5f40f7813de94a31c434121faabd503cc70d6357777f976481d5a5b
                                                                  • Opcode Fuzzy Hash: 8ea7c6170d92c7731bc12e25295f2737848f740f2fac9b1ad7ff51a8a3a87931
                                                                  • Instruction Fuzzy Hash: FF11CE35A00309EFCF019F64D889AAAB7B9EF09314F108496FC08DF245DA719A54DBA1
                                                                  APIs
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02B423D0
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02B423DE
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B42401
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02B42408
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 4018804020-0
                                                                  • Opcode ID: 68dac5ca6f9b70f8f847759dfe607798b5a597af2a1bc7a3fe35a8ba719673d1
                                                                  • Instruction ID: 817ab0f47c14d3e087f937528d53a54544df4ac00bc5d2358622ab23e521e52b
                                                                  • Opcode Fuzzy Hash: 68dac5ca6f9b70f8f847759dfe607798b5a597af2a1bc7a3fe35a8ba719673d1
                                                                  • Instruction Fuzzy Hash: 2F11AC32600204AFDB109F60D988B6ABBB9FF40748F1044ADFA019B140DFB5E911EBA0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                  • String ID:
                                                                  • API String ID: 3016257755-0
                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction ID: 12910c4a95fbc2dc4b5e01a77163f2d918c879d918cd5e47aef5987f32eaf5b7
                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction Fuzzy Hash: C1010B3200025AFBCF166E94DC41AEE3F67BF18354B488596FE2859131D33AD9B5AB81
                                                                  APIs
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02B424A9
                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02B424B8
                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02B424CD
                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02B424D4
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                  • String ID:
                                                                  • API String ID: 4018804020-0
                                                                  • Opcode ID: d9aed85eaf2027bd91d8b2d7b90dec93af5a51abf50440353b849e79195137dc
                                                                  • Instruction ID: cb740e09dd64075191cb14800ad27ca3a1421ec14d80ef8aba96c6c468c99fc3
                                                                  • Opcode Fuzzy Hash: d9aed85eaf2027bd91d8b2d7b90dec93af5a51abf50440353b849e79195137dc
                                                                  • Instruction Fuzzy Hash: ACF03172540205AFDB009F55E888F9ABBACFF44754F004455FA04CB141DB75E560DFA0
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B42009
                                                                  • RtlDeleteCriticalSection.NTDLL(?), ref: 02B42028
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B42037
                                                                  • CloseHandle.KERNEL32(00000000), ref: 02B4204E
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                  • String ID:
                                                                  • API String ID: 2456309408-0
                                                                  • Opcode ID: ff2704c8c4be2f0fd0535dc3059c8cf70e705d414512ad5a3844486fcd5d311d
                                                                  • Instruction ID: 81e2762ab99e7b4a7e34d1fa6480ce5c0f61dd63877379c17f0775c04e4ac222
                                                                  • Opcode Fuzzy Hash: ff2704c8c4be2f0fd0535dc3059c8cf70e705d414512ad5a3844486fcd5d311d
                                                                  • Instruction Fuzzy Hash: A601AD715006049BC338AF54E94CBAABBF4FF08708F00499EE84682690CF786554EF50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Event$H_prologSleep
                                                                  • String ID:
                                                                  • API String ID: 1765829285-0
                                                                  • Opcode ID: 4d571392253646573e1af0cdc00fa165cf6bcd80bbdef2e0b01009d9039dcc92
                                                                  • Instruction ID: d17724bb696beddf570dc6d8e3f11b502625d876092595d24f9f0950db22c045
                                                                  • Opcode Fuzzy Hash: 4d571392253646573e1af0cdc00fa165cf6bcd80bbdef2e0b01009d9039dcc92
                                                                  • Instruction Fuzzy Hash: 51F05436640110EFCB009F94D8CCB98BBA4FF0D311F5481A9F51ADB2D0CB799954DB61
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,r@,0040489C,r@,74DEDFF0,?,00000000,?,$.@,0040494E,00000010,00402FE3), ref: 004047AB
                                                                  • HeapFree.KERNEL32(00000000,?), ref: 004047E1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Free$HeapVirtual
                                                                  • String ID: r@$r@
                                                                  • API String ID: 3783212868-1712950306
                                                                  • Opcode ID: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                  • Instruction ID: 785cceb230e357052b70e0ceb36fde31882332ccc7842067a6b44a21adfd0248
                                                                  • Opcode Fuzzy Hash: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                  • Instruction Fuzzy Hash: 79F01774504210DFC3248F08EE09A427BA0FB48710B11867EF596672E1C371AC40CF48
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmove
                                                                  • String ID: &'
                                                                  • API String ID: 3529519853-655172784
                                                                  • Opcode ID: 449f87fb459ef2b73b2d2c480c1b1e30f59792cf7de65f94155fa843e4ac0ffe
                                                                  • Instruction ID: 39b982cd00828a1a4f6fcace0d9a51fb27c77d8a49586491675d7360f33fe948
                                                                  • Opcode Fuzzy Hash: 449f87fb459ef2b73b2d2c480c1b1e30f59792cf7de65f94155fa843e4ac0ffe
                                                                  • Instruction Fuzzy Hash: EB618F71D00219DFDF20EFA4C990AEEFBB6EF48314F14819AD515AB280DB70AA45DF61
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(?,00000000), ref: 00404F11
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: Info
                                                                  • String ID: $
                                                                  • API String ID: 1807457897-3032137957
                                                                  • Opcode ID: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                  • Instruction ID: dde8e341c4e8bd313249a80e2b686b79912edb193a7f213553748e7c592af8a9
                                                                  • Opcode Fuzzy Hash: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                  • Instruction Fuzzy Hash: 2C4154310042A85EEB169724DE49FEB3FA8EB02704F1404F6E949F71D2C2794924CFAB
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4CCB4
                                                                    • Part of subcall function 02B4D290: std::exception::exception.LIBCMT ref: 02B4D2BF
                                                                    • Part of subcall function 02B4DA46: __EH_prolog.LIBCMT ref: 02B4DA4B
                                                                    • Part of subcall function 02B53B4C: _malloc.LIBCMT ref: 02B53B64
                                                                    • Part of subcall function 02B4D2EF: __EH_prolog.LIBCMT ref: 02B4D2F4
                                                                  Strings
                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02B4CCF1
                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02B4CCEA
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                  • API String ID: 1953324306-1943798000
                                                                  • Opcode ID: 6bae757f01e250885709fb745100308da2d2e01981c1dc9f97d7933044efe987
                                                                  • Instruction ID: 68d98e7e54d72f701676e77887791b9d310c442ab142be309b37b3c19d0e8a48
                                                                  • Opcode Fuzzy Hash: 6bae757f01e250885709fb745100308da2d2e01981c1dc9f97d7933044efe987
                                                                  • Instruction Fuzzy Hash: 4F21DD71E002199BDB14EBE8D598BEEFBB5EF54700F0400CEE816AB240DF745A04EB50
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 02B4535D
                                                                    • Part of subcall function 02B52FAC: __FF_MSGBANNER.LIBCMT ref: 02B52FC3
                                                                    • Part of subcall function 02B52FAC: __NMSG_WRITE.LIBCMT ref: 02B52FCA
                                                                    • Part of subcall function 02B52FAC: RtlAllocateHeap.NTDLL(009E0000,00000000,00000001), ref: 02B52FEF
                                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02B4536F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                  • String ID: \save.dat
                                                                  • API String ID: 4128168839-3580179773
                                                                  • Opcode ID: c5a1e269fda137f90cc8141768f7596128d9f31af5ef75f6f4ff079555fbe8cc
                                                                  • Instruction ID: 4c93083de1bb2e7d15a0ade5e2cad9b111fb2be186b61969096b91a2dd7e91c8
                                                                  • Opcode Fuzzy Hash: c5a1e269fda137f90cc8141768f7596128d9f31af5ef75f6f4ff079555fbe8cc
                                                                  • Instruction Fuzzy Hash: EF117D729042542BDB318E258CC4E6FFF6BDF82698B1441E9EC866B201DBA20D02D7A0
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4396A
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02B439C1
                                                                    • Part of subcall function 02B41410: std::exception::exception.LIBCMT ref: 02B41428
                                                                    • Part of subcall function 02B4A61E: __EH_prolog.LIBCMT ref: 02B4A623
                                                                    • Part of subcall function 02B4A61E: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02B4A632
                                                                    • Part of subcall function 02B4A61E: __CxxThrowException@8.LIBCMT ref: 02B4A651
                                                                  Strings
                                                                  • Day of month is not valid for year, xrefs: 02B439AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Day of month is not valid for year
                                                                  • API String ID: 1404951899-1521898139
                                                                  • Opcode ID: d0dee610ecb187ef4f8bed28eb83f25ce420b6f88c1bd3031e1a46a2a13c7ae8
                                                                  • Instruction ID: b01cdd7b8f49b5ad0183e373c3fea93136609148a2c8cab6ac67184e19dcef6e
                                                                  • Opcode Fuzzy Hash: d0dee610ecb187ef4f8bed28eb83f25ce420b6f88c1bd3031e1a46a2a13c7ae8
                                                                  • Instruction Fuzzy Hash: 0B01D476920209AACF00EFA8C885AFEBB79FF18B10F40409AFC0493240EF744B55DB95
                                                                  APIs
                                                                  • std::exception::exception.LIBCMT ref: 02B4FB17
                                                                  • __CxxThrowException@8.LIBCMT ref: 02B4FB2C
                                                                    • Part of subcall function 02B53B4C: _malloc.LIBCMT ref: 02B53B64
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                  • String ID: bad allocation
                                                                  • API String ID: 4063778783-2104205924
                                                                  • Opcode ID: 9af7b2d2b8a5ec47839ad1992f21d957904d52a1c2dca9d20e6481d831364603
                                                                  • Instruction ID: 9c55f4103cdedea6b2c2054f0bf81b80daccb22a1b5dc0d3562367a845d30923
                                                                  • Opcode Fuzzy Hash: 9af7b2d2b8a5ec47839ad1992f21d957904d52a1c2dca9d20e6481d831364603
                                                                  • Instruction Fuzzy Hash: 09F0AE70A0031967DF08FA989855ABF73FDDF04714B4005D5ED21E7281EF70E5449595
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B43C1B
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02B43C30
                                                                    • Part of subcall function 02B524B7: std::exception::exception.LIBCMT ref: 02B524C1
                                                                    • Part of subcall function 02B4A657: __EH_prolog.LIBCMT ref: 02B4A65C
                                                                    • Part of subcall function 02B4A657: __CxxThrowException@8.LIBCMT ref: 02B4A685
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                  • String ID: bad cast
                                                                  • API String ID: 1300498068-3145022300
                                                                  • Opcode ID: 6c401912c890b4623843fc7b9cd76005b048c05e151086b19bf76d8e90a1691c
                                                                  • Instruction ID: 7e7e12ffe8aaadb91fc131c9ac6e9eeb2fd2be6227e67b5907e097d0ce45bd6d
                                                                  • Opcode Fuzzy Hash: 6c401912c890b4623843fc7b9cd76005b048c05e151086b19bf76d8e90a1691c
                                                                  • Instruction Fuzzy Hash: 41F055329001088BCB08DF48D444AFBB776FF51310F1000EEEE0A4B200CB728A06CB90
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B43886
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02B438A5
                                                                    • Part of subcall function 02B41410: std::exception::exception.LIBCMT ref: 02B41428
                                                                    • Part of subcall function 02B4898C: _memmove.LIBCMT ref: 02B489AC
                                                                  Strings
                                                                  • Day of month value is out of range 1..31, xrefs: 02B43894
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Day of month value is out of range 1..31
                                                                  • API String ID: 3258419250-1361117730
                                                                  • Opcode ID: 8e26c9fa89e7e97ae0e18f09e78c9850c6f199c2c771597a03435e8e7a5821e0
                                                                  • Instruction ID: aaf43ed192ba1b6cd9ca31828dd98dba3c05d97ebf27ce4aaafa76cc85475e6a
                                                                  • Opcode Fuzzy Hash: 8e26c9fa89e7e97ae0e18f09e78c9850c6f199c2c771597a03435e8e7a5821e0
                                                                  • Instruction Fuzzy Hash: D5E0D872F5011557DB24AF98CC597FDB775DB08B10F4400CAE80663280DEB51954DFD5
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B438D2
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02B438F1
                                                                    • Part of subcall function 02B41410: std::exception::exception.LIBCMT ref: 02B41428
                                                                    • Part of subcall function 02B4898C: _memmove.LIBCMT ref: 02B489AC
                                                                  Strings
                                                                  • Year is out of valid range: 1400..10000, xrefs: 02B438E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Year is out of valid range: 1400..10000
                                                                  • API String ID: 3258419250-2344417016
                                                                  • Opcode ID: cdb138a3a29c1708b293e7bae71bf8ee5c621e6ef6fb975f4217d439d4e259bf
                                                                  • Instruction ID: 48e6d1b3d20b74e380a40efbee30410671b3624154614eddea1f40bd02b21150
                                                                  • Opcode Fuzzy Hash: cdb138a3a29c1708b293e7bae71bf8ee5c621e6ef6fb975f4217d439d4e259bf
                                                                  • Instruction Fuzzy Hash: 0CE09272B101146BDB24EB98CC597FDB769DB08710F0404CAE90663280DEB91954CB95
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B4391E
                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02B4393D
                                                                    • Part of subcall function 02B41410: std::exception::exception.LIBCMT ref: 02B41428
                                                                    • Part of subcall function 02B4898C: _memmove.LIBCMT ref: 02B489AC
                                                                  Strings
                                                                  • Month number is out of range 1..12, xrefs: 02B4392C
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                  • String ID: Month number is out of range 1..12
                                                                  • API String ID: 3258419250-4198407886
                                                                  • Opcode ID: 22d962f68175bac52582187aed1e0601ff71e1e492f96efcb5324def07eeb5dd
                                                                  • Instruction ID: 00af075d489ab3636525d218f801af3436f50d3fc8d05309ea644e1b69bfb152
                                                                  • Opcode Fuzzy Hash: 22d962f68175bac52582187aed1e0601ff71e1e492f96efcb5324def07eeb5dd
                                                                  • Instruction Fuzzy Hash: FCE0D872F1011897D724BF98CC597FDB775DB08710F0800CAE80663280DEB51954CBD5
                                                                  APIs
                                                                  • TlsAlloc.KERNEL32 ref: 02B419CC
                                                                  • GetLastError.KERNEL32 ref: 02B419D9
                                                                    • Part of subcall function 02B41712: __EH_prolog.LIBCMT ref: 02B41717
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocErrorH_prologLast
                                                                  • String ID: tss
                                                                  • API String ID: 249634027-1638339373
                                                                  • Opcode ID: d92687bcbe85268d118b686897ddb015104443de1dc09c631dde73ec39b49f6a
                                                                  • Instruction ID: 31217ec518164fc4524bf824dd537bf451b41551506ec881177e9eda4e751a40
                                                                  • Opcode Fuzzy Hash: d92687bcbe85268d118b686897ddb015104443de1dc09c631dde73ec39b49f6a
                                                                  • Instruction Fuzzy Hash: B9E08632D146145BC2007B78D84C19BFBA4DB45274F108BA7EDBD832D0EE3449509BD2
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 02B43BD8
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02B43BED
                                                                    • Part of subcall function 02B524B7: std::exception::exception.LIBCMT ref: 02B524C1
                                                                    • Part of subcall function 02B4A657: __EH_prolog.LIBCMT ref: 02B4A65C
                                                                    • Part of subcall function 02B4A657: __CxxThrowException@8.LIBCMT ref: 02B4A685
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2901982721.0000000002B41000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B41000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2b41000_syncplayer32_64.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                  • String ID: bad cast
                                                                  • API String ID: 1300498068-3145022300
                                                                  • Opcode ID: 9709f16ebd21ea2909240850fb28be2b72069ebf352b72a7474c85d266fcc359
                                                                  • Instruction ID: 3093ab785f0c036a363af87d8e3ee417783e02c574c0e2496cf5732ce4e645a8
                                                                  • Opcode Fuzzy Hash: 9709f16ebd21ea2909240850fb28be2b72069ebf352b72a7474c85d266fcc359
                                                                  • Instruction Fuzzy Hash: 0CE09A719001089BC714EF58D555BB9B771EB14300F0080E8AD0A47290CB394916CB81
                                                                  APIs
                                                                  • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404274,?,?,?,00000100,?,00000000), ref: 004044D4
                                                                  • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404274,?,?,?,00000100,?,00000000), ref: 00404508
                                                                  • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404274,?,?,?,00000100,?,00000000), ref: 00404522
                                                                  • HeapFree.KERNEL32(00000000,?,?,00000000,00404274,?,?,?,00000100,?,00000000), ref: 00404539
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.2900919351.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000002.00000002.2900919351.0000000000409000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_400000_syncplayer32_64.jbxd
                                                                  Similarity
                                                                  • API ID: AllocHeap$FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 3499195154-0
                                                                  • Opcode ID: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                  • Instruction ID: ffc993634d3e41a8c2101fd55908ffce7933bfbb75758218401b36e7eb91ee09
                                                                  • Opcode Fuzzy Hash: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                  • Instruction Fuzzy Hash: 37112571200301BFC730DF29EE45A627BB5FB847207104A3AF262E65B0D771A965DF19