Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
stail.exe

Overview

General Information

Sample name:stail.exe
Analysis ID:1565506
MD5:5ce6dc42328ec1134eb1af7ceb781608
SHA1:8c62c89a91b5372530617d5135aa7e3a08374a21
SHA256:4519ffb96ab3e8a4746518455911475f459685fc4174251a17552f1f100c93b5
Tags:exeuser-aachum
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • stail.exe (PID: 2136 cmdline: "C:\Users\user\Desktop\stail.exe" MD5: 5CE6DC42328EC1134EB1AF7CEB781608)
    • stail.tmp (PID: 3416 cmdline: "C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp" /SL5="$203B6,5977381,56832,C:\Users\user\Desktop\stail.exe" MD5: 3C6AFF88C22351BCB786883117AB81D7)
      • net.exe (PID: 3512 cmdline: "C:\Windows\system32\net.exe" pause hd_video_converter_fox_125 MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 5048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 5020 cmdline: C:\Windows\system32\net1 pause hd_video_converter_fox_125 MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • hdvideoconverterfox125.exe (PID: 5056 cmdline: "C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe" -i MD5: 3E5665842EDF692C5DA51975BEA8BE54)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000005.00000002.3372157942.0000000002D63000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: hdvideoconverterfox125.exe PID: 5056JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-30T02:34:57.033614+010020494671A Network Trojan was detected192.168.2.649817185.208.158.20280TCP
        2024-11-30T02:34:58.665038+010020494671A Network Trojan was detected192.168.2.649821185.208.158.20280TCP
        2024-11-30T02:35:00.228636+010020494671A Network Trojan was detected192.168.2.649827185.208.158.20280TCP
        2024-11-30T02:35:01.864211+010020494671A Network Trojan was detected192.168.2.649832185.208.158.20280TCP
        2024-11-30T02:35:03.652327+010020494671A Network Trojan was detected192.168.2.649836185.208.158.20280TCP
        2024-11-30T02:35:05.341725+010020494671A Network Trojan was detected192.168.2.649841185.208.158.20280TCP
        2024-11-30T02:35:07.003734+010020494671A Network Trojan was detected192.168.2.649846185.208.158.20280TCP
        2024-11-30T02:35:07.588978+010020494671A Network Trojan was detected192.168.2.649846185.208.158.20280TCP
        2024-11-30T02:35:09.152220+010020494671A Network Trojan was detected192.168.2.649852185.208.158.20280TCP
        2024-11-30T02:35:10.717905+010020494671A Network Trojan was detected192.168.2.649856185.208.158.20280TCP
        2024-11-30T02:35:12.323026+010020494671A Network Trojan was detected192.168.2.649860185.208.158.20280TCP
        2024-11-30T02:35:13.935963+010020494671A Network Trojan was detected192.168.2.649864185.208.158.20280TCP
        2024-11-30T02:35:15.656100+010020494671A Network Trojan was detected192.168.2.649869185.208.158.20280TCP
        2024-11-30T02:35:17.259069+010020494671A Network Trojan was detected192.168.2.649875185.208.158.20280TCP
        2024-11-30T02:35:18.869673+010020494671A Network Trojan was detected192.168.2.649879185.208.158.20280TCP
        2024-11-30T02:35:20.545279+010020494671A Network Trojan was detected192.168.2.649883185.208.158.20280TCP
        2024-11-30T02:35:22.149466+010020494671A Network Trojan was detected192.168.2.649888185.208.158.20280TCP
        2024-11-30T02:35:22.719543+010020494671A Network Trojan was detected192.168.2.649888185.208.158.20280TCP
        2024-11-30T02:35:24.442259+010020494671A Network Trojan was detected192.168.2.649895185.208.158.20280TCP
        2024-11-30T02:35:25.009649+010020494671A Network Trojan was detected192.168.2.649895185.208.158.20280TCP
        2024-11-30T02:35:26.671923+010020494671A Network Trojan was detected192.168.2.649901185.208.158.20280TCP
        2024-11-30T02:35:28.281307+010020494671A Network Trojan was detected192.168.2.649905185.208.158.20280TCP
        2024-11-30T02:35:30.005298+010020494671A Network Trojan was detected192.168.2.649910185.208.158.20280TCP
        2024-11-30T02:35:30.578850+010020494671A Network Trojan was detected192.168.2.649910185.208.158.20280TCP
        2024-11-30T02:35:32.183048+010020494671A Network Trojan was detected192.168.2.649915185.208.158.20280TCP
        2024-11-30T02:35:33.983119+010020494671A Network Trojan was detected192.168.2.649920185.208.158.20280TCP
        2024-11-30T02:35:35.634165+010020494671A Network Trojan was detected192.168.2.649925185.208.158.20280TCP
        2024-11-30T02:35:37.288908+010020494671A Network Trojan was detected192.168.2.649930185.208.158.20280TCP
        2024-11-30T02:35:37.868929+010020494671A Network Trojan was detected192.168.2.649930185.208.158.20280TCP
        2024-11-30T02:35:39.479467+010020494671A Network Trojan was detected192.168.2.649935185.208.158.20280TCP
        2024-11-30T02:35:41.042501+010020494671A Network Trojan was detected192.168.2.649939185.208.158.20280TCP
        2024-11-30T02:35:42.756374+010020494671A Network Trojan was detected192.168.2.649945185.208.158.20280TCP
        2024-11-30T02:35:44.374299+010020494671A Network Trojan was detected192.168.2.649949185.208.158.20280TCP
        2024-11-30T02:35:45.930793+010020494671A Network Trojan was detected192.168.2.649954185.208.158.20280TCP
        2024-11-30T02:35:47.546586+010020494671A Network Trojan was detected192.168.2.649958185.208.158.20280TCP
        2024-11-30T02:35:49.108392+010020494671A Network Trojan was detected192.168.2.649963185.208.158.20280TCP
        2024-11-30T02:35:50.759308+010020494671A Network Trojan was detected192.168.2.649966185.208.158.20280TCP
        2024-11-30T02:35:52.367198+010020494671A Network Trojan was detected192.168.2.649972185.208.158.20280TCP
        2024-11-30T02:35:52.938280+010020494671A Network Trojan was detected192.168.2.649972185.208.158.20280TCP
        2024-11-30T02:35:54.588871+010020494671A Network Trojan was detected192.168.2.649977185.208.158.20280TCP
        2024-11-30T02:35:56.197359+010020494671A Network Trojan was detected192.168.2.649982185.208.158.20280TCP
        2024-11-30T02:35:57.930245+010020494671A Network Trojan was detected192.168.2.649987185.208.158.20280TCP
        2024-11-30T02:35:59.528205+010020494671A Network Trojan was detected192.168.2.649991185.208.158.20280TCP
        2024-11-30T02:36:01.184309+010020494671A Network Trojan was detected192.168.2.649995185.208.158.20280TCP
        2024-11-30T02:36:02.800375+010020494671A Network Trojan was detected192.168.2.650001185.208.158.20280TCP
        2024-11-30T02:36:04.421697+010020494671A Network Trojan was detected192.168.2.650006185.208.158.20280TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exeReversingLabs: Detection: 87%
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeReversingLabs: Detection: 87%
        Source: stail.exeReversingLabs: Detection: 55%
        Source: stail.exeVirustotal: Detection: 69%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045D230 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D230
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045D2E4 ArcFourCrypt,1_2_0045D2E4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045D2FC ArcFourCrypt,1_2_0045D2FC
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeUnpacked PE file: 5.2.hdvideoconverterfox125.exe.400000.0.unpack
        Source: stail.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: Binary string: msvcp71.pdbx# source: is-C421M.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-U3SH4.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-C421M.tmp.1.dr
        Source: Binary string: C:\NT\sdktools\unicows\godot\obj\i386\unicows.pdb source: is-5S7GH.tmp.1.dr
        Source: Binary string: C:\NT\sdktools\unicows\godot\obj\i386\unicows.pdbSUVW source: is-5S7GH.tmp.1.dr
        Source: Binary string: msvcr71.pdb source: is-U3SH4.tmp.1.dr
        Source: Binary string: C:\KRAPPYSOFTWARE_CVS\KRAPPYSOFTWARE\Projects\Sparkle_Win\Release\WinSparkle.pdb source: is-6LHHU.tmp.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004753C4 FindFirstFileA,FindNextFileA,FindClose,1_2_004753C4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00464200 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464200
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0049877C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049877C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004627F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004627F8
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00463D84 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463D84

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49817 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49827 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49821 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49836 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49832 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49852 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49846 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49856 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49860 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49841 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49864 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49869 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49883 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49879 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49901 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49910 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49930 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49939 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49949 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49875 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49888 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49925 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49895 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49920 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49972 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49954 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49935 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49982 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49958 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49915 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:50001 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49987 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49995 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49977 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49966 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49945 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49963 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49991 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:50006 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:49905 -> 185.208.158.202:80
        Source: Joe Sandbox ViewIP Address: 185.208.158.202 185.208.158.202
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E172AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,_memset,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,_memset,_memset,_memset,_malloc,_memset,_strtok,_swscanf,_strtok,_free,Sleep,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_memset,_free,5_2_02E172AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1Host: beogbve.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: beogbve.com
        Source: hdvideoconverterfox125.exe, 00000005.00000002.3370707622.0000000000A41000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000002.3373573736.0000000003768000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://vinylcut.co.za/activation
        Source: is-6LHHU.tmp.1.drString found in binary or memory: http://winsparkle.org).
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.VinylCut.co.za
        Source: is-6LHHU.tmp.1.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#os
        Source: is-6LHHU.tmp.1.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLink
        Source: is-6LHHU.tmp.1.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinktitledescriptionenclosureurlhttp
        Source: is-6LHHU.tmp.1.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#shortVersionString
        Source: is-6LHHU.tmp.1.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#version
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/createspace
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/createspace/activate.php?Dhttps://www.craftedge.com/activation/s
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/cut
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/greatcut
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/greatcut/activate.php?Ahttps://www.craftedge.com/activation/sure
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/magiccutdstudio/activate.php?Dhttps://www.craftedge.com/activati
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/magiccutstudio
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/scal
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/scal/activate.php?Dhttps://www.craftedge.com/activation/surecuts
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/scalCFailed
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/scalaser/activate.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/scalaserSCutting
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/activation/smartprint/activate.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/ecal
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/ecal6http://www.craftedge.com/activation/ecal/activate.php??https:
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/ecal_Trial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/scal
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/scalbridge
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/scalpro
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/scalprobTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchase/smartprint.http://www.craftedge.com/activation/smartprintChttps://
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/purchaseUTrial
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/register
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.com/updates
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.comGTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.comNTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.craftedge.comPTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.easycutpro.com
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.easycutpro.com/store.html
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.easycutstudio.com
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.easycutstudio.com/buy.html
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.gccwebshop.com
        Source: stail.tmp, stail.tmp, 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, stail.tmp.0.dr, is-SC8P2.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: stail.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
        Source: stail.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.pss.co
        Source: stail.exe, 00000000.00000003.2120971677.0000000002088000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000003.2120824866.0000000002340000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, stail.tmp, 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, stail.tmp.0.dr, is-SC8P2.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: stail.exe, 00000000.00000003.2120971677.0000000002088000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000003.2120824866.0000000002340000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, stail.tmp.0.dr, is-SC8P2.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.signwarehouse.com
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.signwarehouse.comRTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.sizzix.com/ecallite#This
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.starcraftvinyl.com
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.starcraftvinyl.com/activate
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.starcraftvinyl.com/create&http://www.starcraftvinyl.com/activate
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.starcraftvinyl.com/createDTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: http://www.vinylcut.co.za
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.VinylCut.co.za
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/cut/activate.php??https://www.craftedge.com/activation/surecuts
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/easycutstudio6_kd.php?Fhttps://www.craftedge.com/a
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/ecal3.php?(http://www.craftedge.com/activation/eca
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/ecal3.php??https://www.craftedge.com/activation/su
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/ecal3_k.php?
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/greatcutd.php?
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scal6.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scal6.php??https://www.craftedge.com/activation/su
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scal6_k.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scal6_kd.php?=https://www.craftedge.com/activation
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scalaser.php?Bhttps://www.craftedge.com/activation
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scalaserd.php?Ghttps://www.craftedge.com/activatio
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/skycut_kd.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/skycutd.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/starcut.php?Ahttps://www.craftedge.com/activation/
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/starcut_k.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/vinylcut5.php?Chttps://www.craftedge.com/activatio
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/vinylcut5_k.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/xfcut.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/xfcut_k.php?
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.easycutpro.com/activation
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.easycutpro.com/activationGhttps://www.craftedge.com/activation/surecutsalot/easysigncutp
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.easycutpro.comOTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.easycutstudio.com/activation
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.easycutstudio.com/activationAhttps://www.craftedge.com/activation/surecutsalot/scalaser_
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.easycutstudio.com/buy.html
        Source: stail.exe, 00000000.00000003.2120510631.0000000002081000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000002.3370846883.0000000002081000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000003.2120413852.0000000002340000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000002.3371685185.00000000022A5000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000003.2122111258.0000000003260000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000002.3371277834.0000000000744000.00000004.00000020.00020000.00000000.sdmp, stail.tmp, 00000001.00000003.2122180580.00000000022A8000.00000004.00001000.00020000.00000000.sdmp, is-KB8LQ.tmp.1.drString found in binary or memory: https://www.easycutstudio.com/support.html
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.gccwebshop.com
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.gccwebshop.comPTrial
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.xfcut.com/activation
        Source: stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.xfcut.com/activation?https://www.craftedge.com/activation/surecutsalot/xfcut_kd.php?=htt
        Source: hdvideoconverterfox125.exe.1.drString found in binary or memory: https://www.xfcut.com/store

        System Summary

        barindex
        Source: hdvideoconverterfox125.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: ED Video Splitter 11.5.45.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0042F594 NtdllDefWindowProc_A,1_2_0042F594
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00478EFC NtdllDefWindowProc_A,1_2_00478EFC
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045763C PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_0045763C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004708A01_2_004708A0
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00480E7E1_2_00480E7E
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0043533C1_2_0043533C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0046744C1_2_0046744C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004880141_2_00488014
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004303D01_2_004303D0
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0048E4AC1_2_0048E4AC
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0044453C1_2_0044453C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004346381_2_00434638
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00444AE41_2_00444AE4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00430F5C1_2_00430F5C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004870B41_2_004870B4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045F16C1_2_0045F16C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004451DC1_2_004451DC
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045B21C1_2_0045B21C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004694C81_2_004694C8
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004455E81_2_004455E8
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00451A301_2_00451A30
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0043DDC41_2_0043DDC4
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_004010515_2_00401051
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_00406C175_2_00406C17
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_00401C265_2_00401C26
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E4B4E55_2_02E4B4E5
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E4BF805_2_02E4BF80
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E4BF315_2_02E4BF31
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E2E24D5_2_02E2E24D
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E1F07A5_2_02E1F07A
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E34EE95_2_02E34EE9
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E2E6655_2_02E2E665
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E32E745_2_02E32E74
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E29F445_2_02E29F44
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E2ACFA5_2_02E2ACFA
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E354605_2_02E35460
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E2DD595_2_02E2DD59
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E285035_2_02E28503
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exe 21E988AA820894FAEB5F57171734501A444BE9AC2758A2B17BCC9A4B677BA495
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\CH375DLL.dll (copy) 3B578B15AD0D0747E8A3D958A0E7BF1FF6D5C335B8894FF7A020604DA008D79D
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00408C1C appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00406AD4 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 0040596C appears 117 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00407904 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00403400 appears 60 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00445E48 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00457FC4 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00457DB8 appears 105 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00434550 appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00403494 appears 83 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 004533B8 appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00446118 appears 59 times
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: String function: 00403684 appears 227 times
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: String function: 02E353F0 appears 139 times
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: String function: 02E28BA0 appears 37 times
        Source: stail.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: stail.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: stail.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-SC8P2.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-SC8P2.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-SC8P2.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: stail.exe, 00000000.00000003.2120971677.0000000002088000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs stail.exe
        Source: stail.exe, 00000000.00000003.2120824866.0000000002340000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs stail.exe
        Source: stail.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal100.troj.evad.winEXE@10/74@1/1
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E208C0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,5_2_02E208C0
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00455EB4 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455EB4
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: CreateServiceA,5_2_00402274
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0046E1E4 GetVersion,CoCreateInstance,1_2_0046E1E4
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_0040D629 StartServiceCtrlDispatcherA,5_2_0040D629
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_0040D629 StartServiceCtrlDispatcherA,5_2_0040D629
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5048:120:WilError_03
        Source: C:\Users\user\Desktop\stail.exeFile created: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\stail.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: stail.exeReversingLabs: Detection: 55%
        Source: stail.exeVirustotal: Detection: 69%
        Source: stail.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
        Source: stail.exeString found in binary or memory: /LOADINF="filename"
        Source: C:\Users\user\Desktop\stail.exeFile read: C:\Users\user\Desktop\stail.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\stail.exe "C:\Users\user\Desktop\stail.exe"
        Source: C:\Users\user\Desktop\stail.exeProcess created: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp "C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp" /SL5="$203B6,5977381,56832,C:\Users\user\Desktop\stail.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" pause hd_video_converter_fox_125
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe "C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe" -i
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause hd_video_converter_fox_125
        Source: C:\Users\user\Desktop\stail.exeProcess created: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp "C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp" /SL5="$203B6,5977381,56832,C:\Users\user\Desktop\stail.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" pause hd_video_converter_fox_125Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe "C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe" -iJump to behavior
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause hd_video_converter_fox_125Jump to behavior
        Source: C:\Users\user\Desktop\stail.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\stail.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: stail.exeStatic file information: File size 6228338 > 1048576
        Source: Binary string: msvcp71.pdbx# source: is-C421M.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-U3SH4.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-C421M.tmp.1.dr
        Source: Binary string: C:\NT\sdktools\unicows\godot\obj\i386\unicows.pdb source: is-5S7GH.tmp.1.dr
        Source: Binary string: C:\NT\sdktools\unicows\godot\obj\i386\unicows.pdbSUVW source: is-5S7GH.tmp.1.dr
        Source: Binary string: msvcr71.pdb source: is-U3SH4.tmp.1.dr
        Source: Binary string: C:\KRAPPYSOFTWARE_CVS\KRAPPYSOFTWARE\Projects\Sparkle_Win\Release\WinSparkle.pdb source: is-6LHHU.tmp.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeUnpacked PE file: 5.2.hdvideoconverterfox125.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeUnpacked PE file: 5.2.hdvideoconverterfox125.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: is-NLP3T.tmp.1.drStatic PE information: section name: STLPORT_
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0048446C push 0048457Ah; ret 1_2_00484572
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0040995C push 00409999h; ret 1_2_00409991
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00458060 push 00458098h; ret 1_2_00458090
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax1_2_004062C5
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004104F0 push ecx; mov dword ptr [esp], edx1_2_004104F5
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0049AD30 pushad ; retf 1_2_0049AD3F
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0040CE48 push ecx; mov dword ptr [esp], edx1_2_0040CE4A
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00459378 push 004593BCh; ret 1_2_004593B4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00495384 push ecx; mov dword ptr [esp], ecx1_2_00495389
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0040F3A8 push ecx; mov dword ptr [esp], edx1_2_0040F3AA
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004434B4 push ecx; mov dword ptr [esp], ecx1_2_004434B8
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045186C push 0045189Fh; ret 1_2_00451897
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00451A30 push ecx; mov dword ptr [esp], eax1_2_00451A35
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00485B5C push ecx; mov dword ptr [esp], ecx1_2_00485B61
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00419C38 push ecx; mov dword ptr [esp], ecx1_2_00419C3D
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0045FDC4 push ecx; mov dword ptr [esp], ecx1_2_0045FDC8

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_00401A4F
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_02E1F8A3
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-5S7GH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\CH375DLL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-6269J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\Desktop\stail.exeFile created: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\stlport_vc7146.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-O8PS3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-C421M.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-U3SH4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\Drivers\Summa\is-11S80.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\unicows.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\Drivers\Summa\summausb.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeFile created: C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-NLP3T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-SC8P2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\cairogfx.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\WinSparkle.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-6LHHU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpFile created: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeFile created: C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_00401A4F
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_02E1F8A3
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_0040D629 StartServiceCtrlDispatcherA,5_2_0040D629
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0042F2F0 IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,1_2_0042F2F0
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00483E20 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00483E20
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\stail.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,5_2_00401B4B
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,5_2_02E1F9A7
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeWindow / User API: threadDelayed 2703Jump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeWindow / User API: threadDelayed 7179Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\CH375DLL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-5S7GH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-6269J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\Drivers\Summa\is-11S80.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\stlport_vc7146.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\unicows.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\Drivers\Summa\summausb.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-NLP3T.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-SC8P2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-O8PS3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\WinSparkle.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\cairogfx.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-C421M.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-U3SH4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-6LHHU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\stail.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5966
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_5-19822
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe TID: 5480Thread sleep count: 2703 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe TID: 5480Thread sleep time: -5406000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe TID: 4948Thread sleep count: 37 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe TID: 4948Thread sleep time: -2220000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe TID: 5480Thread sleep count: 7179 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe TID: 5480Thread sleep time: -14358000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004753C4 FindFirstFileA,FindNextFileA,FindClose,1_2_004753C4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00464200 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464200
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0049877C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049877C
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_004627F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004627F8
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00463D84 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463D84
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeThread delayed: delay time: 60000Jump to behavior
        Source: hdvideoconverterfox125.exe, 00000005.00000002.3370707622.0000000000A7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX/l
        Source: hdvideoconverterfox125.exe, 00000005.00000002.3373307157.00000000036A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: hdvideoconverterfox125.exe, 00000005.00000002.3370707622.000000000098E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
        Source: C:\Users\user\Desktop\stail.exeAPI call chain: ExitProcess graph end nodegraph_0-6763
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeAPI call chain: ExitProcess graph end nodegraph_5-19824
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeAPI call chain: ExitProcess graph end nodegraph_5-19469
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E301BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,5_2_02E301BE
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E301BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,5_2_02E301BE
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E1648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,5_2_02E1648B
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E29528 SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_02E29528
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00478940 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478940
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause hd_video_converter_fox_125Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0042EE28 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,1_2_0042EE28
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exeCode function: 5_2_02E2806E cpuid 5_2_02E2806E
        Source: C:\Users\user\Desktop\stail.exeCode function: GetLocaleInfoA,0_2_0040520C
        Source: C:\Users\user\Desktop\stail.exeCode function: GetLocaleInfoA,0_2_00405258
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: GetLocaleInfoA,1_2_00408578
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: GetLocaleInfoA,1_2_004085C4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00458670 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00458670
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmpCode function: 1_2_00455644 GetUserNameA,1_2_00455644
        Source: C:\Users\user\Desktop\stail.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.3372157942.0000000002D63000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hdvideoconverterfox125.exe PID: 5056, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.3372157942.0000000002D63000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hdvideoconverterfox125.exe PID: 5056, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        4
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Service Execution
        1
        Bootkit
        1
        Access Token Manipulation
        2
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook4
        Windows Service
        1
        DLL Side-Loading
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture12
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
        Process Injection
        1
        Masquerading
        LSA Secrets141
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
        Process Injection
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Bootkit
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1565506 Sample: stail.exe Startdate: 30/11/2024 Architecture: WINDOWS Score: 100 38 Suricata IDS alerts for network traffic 2->38 40 Multi AV Scanner detection for dropped file 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 7 other signatures 2->44 8 stail.exe 2 2->8         started        process3 file4 24 C:\Users\user\AppData\Local\...\stail.tmp, PE32 8->24 dropped 11 stail.tmp 18 49 8->11         started        process5 file6 26 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 11->26 dropped 28 C:\Users\user\AppData\...\unins000.exe (copy), PE32 11->28 dropped 30 C:\Users\user\AppData\...\unicows.dll (copy), PE32 11->30 dropped 32 19 other files (13 malicious) 11->32 dropped 14 hdvideoconverterfox125.exe 19 11->14         started        18 net.exe 1 11->18         started        process7 dnsIp8 36 beogbve.com 185.208.158.202, 49817, 49821, 49827 SIMPLECARRER2IT Switzerland 14->36 34 C:\...D Video Splitter 11.5.45.exe, PE32 14->34 dropped 20 conhost.exe 18->20         started        22 net1.exe 1 18->22         started        file9 process10

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        stail.exe55%ReversingLabsWin32.Trojan.Generic
        stail.exe69%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exe100%Joe Sandbox ML
        C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exe88%ReversingLabsWin32.Trojan.Ekstak
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\CH375DLL.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\Drivers\Summa\is-11S80.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\Drivers\Summa\summausb.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\WinSparkle.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\cairogfx.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe88%ReversingLabsWin32.Trojan.Ekstak
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-5S7GH.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-6269J.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-6LHHU.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-C421M.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-NLP3T.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-O8PS3.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-SC8P2.tmp4%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\is-U3SH4.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\msvcp71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\msvcr71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\stlport_vc7146.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\unicows.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\unins000.exe (copy)4%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-39R6H.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://vinylcut.co.za/activation0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#shortVersionString0%Avira URL Cloudsafe
        https://www.easycutpro.com/activation0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/cut/activate.php??https://www.craftedge.com/activation/surecuts0%Avira URL Cloudsafe
        https://www.gccwebshop.com0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLink0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/greatcut/activate.php?Ahttps://www.craftedge.com/activation/sure0%Avira URL Cloudsafe
        https://www.easycutstudio.com/activation0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#os0%Avira URL Cloudsafe
        http://www.signwarehouse.comRTrial0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/smartprint/activate.php?0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/vinylcut5.php?Chttps://www.craftedge.com/activatio0%Avira URL Cloudsafe
        http://www.craftedge.comNTrial0%Avira URL Cloudsafe
        https://www.easycutpro.com/activationGhttps://www.craftedge.com/activation/surecutsalot/easysigncutp0%Avira URL Cloudsafe
        http://beogbve.com/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef940%Avira URL Cloudsafe
        http://www.craftedge.com/activation/scalaserSCutting0%Avira URL Cloudsafe
        https://www.VinylCut.co.za0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/ecal3.php??https://www.craftedge.com/activation/su0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#shortVersionString0%VirustotalBrowse
        http://www.craftedge.com/purchase/ecal_Trial0%Avira URL Cloudsafe
        http://www.craftedge.comGTrial0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/skycut_kd.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/magiccutstudio0%Avira URL Cloudsafe
        http://www.signwarehouse.com0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/easycutstudio6_kd.php?Fhttps://www.craftedge.com/a0%Avira URL Cloudsafe
        http://www.easycutpro.com0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scal6_k.php?0%Avira URL Cloudsafe
        https://www.gccwebshop.comPTrial0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scalaserd.php?Ghttps://www.craftedge.com/activatio0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/ecal3.php?(http://www.craftedge.com/activation/eca0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scal6.php??https://www.craftedge.com/activation/su0%Avira URL Cloudsafe
        https://www.xfcut.com/activation0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/scalbridge0%Avira URL Cloudsafe
        http://www.starcraftvinyl.com/create&http://www.starcraftvinyl.com/activate0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scal6.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/register0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/starcut_k.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/scalpro0%Avira URL Cloudsafe
        http://www.VinylCut.co.za0%Avira URL Cloudsafe
        http://www.craftedge.com/updates0%Avira URL Cloudsafe
        https://www.easycutstudio.com/activationAhttps://www.craftedge.com/activation/surecutsalot/scalaser_0%Avira URL Cloudsafe
        http://www.easycutstudio.com/buy.html0%Avira URL Cloudsafe
        http://www.starcraftvinyl.com/activate0%Avira URL Cloudsafe
        https://www.xfcut.com/activation?https://www.craftedge.com/activation/surecutsalot/xfcut_kd.php?=htt0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scal6_kd.php?=https://www.craftedge.com/activation0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinktitledescriptionenclosureurlhttp0%Avira URL Cloudsafe
        https://www.easycutpro.comOTrial0%Avira URL Cloudsafe
        https://www.xfcut.com/store0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#version0%Avira URL Cloudsafe
        http://www.easycutpro.com/store.html0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/createspace0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/greatcut0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/scal0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/scalaser/activate.php?0%Avira URL Cloudsafe
        http://www.craftedge.comPTrial0%Avira URL Cloudsafe
        http://winsparkle.org).0%Avira URL Cloudsafe
        https://www.craftedge.com/activation0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/xfcut.php?0%Avira URL Cloudsafe
        http://185.208.158.202/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/greatcutd.php?0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scalaser.php?Bhttps://www.craftedge.com/activation0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/scalprobTrial0%Avira URL Cloudsafe
        http://www.starcraftvinyl.com/createDTrial0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/scal0%Avira URL Cloudsafe
        http://www.gccwebshop.com0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/ecal3_k.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/smartprint.http://www.craftedge.com/activation/smartprintChttps://0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/xfcut_k.php?0%Avira URL Cloudsafe
        http://www.craftedge.com0%Avira URL Cloudsafe
        https://www.easycutstudio.com/buy.html0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/skycutd.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/purchaseUTrial0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/scal/activate.php?Dhttps://www.craftedge.com/activation/surecuts0%Avira URL Cloudsafe
        http://www.easycutstudio.com0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/magiccutdstudio/activate.php?Dhttps://www.craftedge.com/activati0%Avira URL Cloudsafe
        http://www.starcraftvinyl.com0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/vinylcut5_k.php?0%Avira URL Cloudsafe
        http://www.sizzix.com/ecallite#This0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/scalCFailed0%Avira URL Cloudsafe
        http://www.pss.co0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/ecal0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/starcut.php?Ahttps://www.craftedge.com/activation/0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/cut0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/ecal6http://www.craftedge.com/activation/ecal/activate.php??https:0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/createspace/activate.php?Dhttps://www.craftedge.com/activation/s0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        beogbve.com
        185.208.158.202
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://beogbve.com/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.gccwebshop.comhdvideoconverterfox125.exe.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://vinylcut.co.za/activationhdvideoconverterfox125.exe.1.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.easycutpro.com/activationstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.andymatuschak.org/xml-namespaces/sparkle#shortVersionStringis-6LHHU.tmp.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.craftedge.com/activation/cut/activate.php??https://www.craftedge.com/activation/surecutsstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinkis-6LHHU.tmp.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.craftedge.com/activation/greatcut/activate.php?Ahttps://www.craftedge.com/activation/surehdvideoconverterfox125.exe.1.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUstail.exefalse
            high
            https://www.easycutstudio.com/activationstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.andymatuschak.org/xml-namespaces/sparkle#osis-6LHHU.tmp.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.signwarehouse.comRTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/activation/smartprint/activate.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/vinylcut5.php?Chttps://www.craftedge.com/activatiostail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.comNTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.easycutpro.com/activationGhttps://www.craftedge.com/activation/surecutsalot/easysigncutpstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/activation/scalaserSCuttingstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.VinylCut.co.zastail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/ecal3.php??https://www.craftedge.com/activation/sustail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchasestail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchase/ecal_Trialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.comGTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/skycut_kd.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/activation/magiccutstudiostail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.signwarehouse.comhdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/easycutstudio6_kd.php?Fhttps://www.craftedge.com/astail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.easycutpro.comstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scal6_k.php?hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.gccwebshop.comPTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scalaserd.php?Ghttps://www.craftedge.com/activatiostail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/ecal3.php?(http://www.craftedge.com/activation/ecastail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scal6.php??https://www.craftedge.com/activation/sustail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.xfcut.com/activationstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchase/scalbridgestail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.starcraftvinyl.com/create&http://www.starcraftvinyl.com/activatestail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scal6.php?hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/registerhdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/starcut_k.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchase/scalprohdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.VinylCut.co.zastail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/updatesstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.easycutstudio.com/activationAhttps://www.craftedge.com/activation/surecutsalot/scalaser_stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.easycutstudio.com/buy.htmlstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.starcraftvinyl.com/activatestail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.xfcut.com/activation?https://www.craftedge.com/activation/surecutsalot/xfcut_kd.php?=httstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scal6_kd.php?=https://www.craftedge.com/activationstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinktitledescriptionenclosureurlhttpis-6LHHU.tmp.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.easycutpro.comOTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.xfcut.com/storehdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.andymatuschak.org/xml-namespaces/sparkle#versionis-6LHHU.tmp.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.easycutpro.com/store.htmlstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.innosetup.com/stail.tmp, stail.tmp, 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, stail.tmp.0.dr, is-SC8P2.tmp.1.drfalse
              high
              http://www.craftedge.com/activation/createspacestail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/activation/greatcuthdvideoconverterfox125.exe.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/purchase/scalstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/activation/scalaser/activate.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.comPTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://winsparkle.org).is-6LHHU.tmp.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlinestail.exefalse
                high
                https://www.craftedge.com/activationstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.craftedge.com/activation/surecutsalot/xfcut.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://185.208.158.202/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dhdvideoconverterfox125.exe, 00000005.00000002.3370707622.0000000000A41000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000002.3373573736.0000000003768000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.craftedge.com/activation/surecutsalot/greatcutd.php?hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.craftedge.com/activation/surecutsalot/scalaser.php?Bhttps://www.craftedge.com/activationstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.com/purchase/scalprobTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.starcraftvinyl.com/createDTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.com/activation/scalstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.gccwebshop.comstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.craftedge.com/activation/surecutsalot/ecal3_k.php?hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.com/purchase/smartprint.http://www.craftedge.com/activation/smartprintChttps://stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.craftedge.com/activation/surecutsalot/xfcut_k.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.comhdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.easycutstudio.com/buy.htmlstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.craftedge.com/activation/surecutsalot/skycutd.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.com/purchaseUTrialstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.remobjects.com/psUstail.exe, 00000000.00000003.2120971677.0000000002088000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000003.2120824866.0000000002340000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, stail.tmp.0.dr, is-SC8P2.tmp.1.drfalse
                  high
                  http://www.craftedge.com/activation/scal/activate.php?Dhttps://www.craftedge.com/activation/surecutshdvideoconverterfox125.exe.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.easycutstudio.comstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.craftedge.com/activation/magiccutdstudio/activate.php?Dhttps://www.craftedge.com/activatistail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.starcraftvinyl.comstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.vinylcut.co.zastail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                    unknown
                    https://www.craftedge.com/activation/surecutsalot/vinylcut5_k.php?stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sizzix.com/ecallite#Thisstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.craftedge.com/activation/scalCFailedstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.pss.cohdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.craftedge.com/purchase/ecalhdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.craftedge.com/activation/surecutsalot/starcut.php?Ahttps://www.craftedge.com/activation/stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.craftedge.com/activation/cutstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.craftedge.com/activation/createspace/activate.php?Dhttps://www.craftedge.com/activation/sstail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.remobjects.com/psstail.exe, 00000000.00000003.2120971677.0000000002088000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000003.2120824866.0000000002340000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, stail.tmp, 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, stail.tmp.0.dr, is-SC8P2.tmp.1.drfalse
                      high
                      https://www.easycutstudio.com/support.htmlstail.exe, 00000000.00000003.2120510631.0000000002081000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000002.3370846883.0000000002081000.00000004.00001000.00020000.00000000.sdmp, stail.exe, 00000000.00000003.2120413852.0000000002340000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000002.3371685185.00000000022A5000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000003.2122111258.0000000003260000.00000004.00001000.00020000.00000000.sdmp, stail.tmp, 00000001.00000002.3371277834.0000000000744000.00000004.00000020.00020000.00000000.sdmp, stail.tmp, 00000001.00000003.2122180580.00000000022A8000.00000004.00001000.00020000.00000000.sdmp, is-KB8LQ.tmp.1.drfalse
                        high
                        http://www.craftedge.com/purchase/ecal6http://www.craftedge.com/activation/ecal/activate.php??https:stail.tmp, 00000001.00000002.3372789201.0000000005A8E000.00000004.00001000.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000003.2147967446.000000000277F000.00000004.00000020.00020000.00000000.sdmp, hdvideoconverterfox125.exe, 00000005.00000000.2146381057.0000000000673000.00000002.00000001.01000000.00000009.sdmp, is-MAK37.tmp.1.dr, ED Video Splitter 11.5.45.exe.5.dr, hdvideoconverterfox125.exe.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        185.208.158.202
                        beogbve.comSwitzerland
                        34888SIMPLECARRER2ITtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1565506
                        Start date and time:2024-11-30 02:33:08 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 53s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:10
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:stail.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@10/74@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 91%
                        • Number of executed functions: 179
                        • Number of non-executed functions: 255
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        20:34:35API Interceptor356628x Sleep call for process: hdvideoconverterfox125.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        185.208.158.202file.exeGet hashmaliciousNymaim, Socks5SystemzBrowse
                          i7j22nof2Q.exeGet hashmaliciousSocks5SystemzBrowse
                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                file.exeGet hashmaliciousSocks5SystemzBrowse
                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                    gxjIKuKnu7.exeGet hashmaliciousSocks5SystemzBrowse
                                      OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                                        BJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Socks5Systemz, Stealc, VidarBrowse
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            SIMPLECARRER2ITchutmarao.ps1Get hashmaliciousRHADAMANTHYSBrowse
                                            • 185.196.8.68
                                            RjygH3Vh7O.exeGet hashmaliciousRHADAMANTHYSBrowse
                                            • 185.196.8.68
                                            SekpL8Z26C.exeGet hashmaliciousUnknownBrowse
                                            • 185.208.159.79
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 185.208.159.79
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 185.208.159.79
                                            file.exeGet hashmaliciousNymaim, Socks5SystemzBrowse
                                            • 185.208.158.202
                                            http://itrack4.valuecommerce.ne.jp/cgi-bin/2366370/entry.php?vc_url=http://serviceoctopus.comGet hashmaliciousHTMLPhisherBrowse
                                            • 185.208.158.251
                                            0a0#U00a0.jsGet hashmaliciousRHADAMANTHYSBrowse
                                            • 185.196.8.68
                                            i7j22nof2Q.exeGet hashmaliciousSocks5SystemzBrowse
                                            • 185.208.158.202
                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                            • 185.208.158.202
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\ProgramData\ED Video Splitter 11.5.45\ED Video Splitter 11.5.45.exefile.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, Zhark RATBrowse
                                              C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\CH375DLL.dll (copy)i7j22nof2Q.exeGet hashmaliciousSocks5SystemzBrowse
                                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                  file.exeGet hashmaliciousSocks5SystemzBrowse
                                                    file.exeGet hashmaliciousSocks5SystemzBrowse
                                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, Zhark RATBrowse
                                                          gxjIKuKnu7.exeGet hashmaliciousSocks5SystemzBrowse
                                                            NBoJCkvcb1.exeGet hashmaliciousBabadeda SystemBCBrowse
                                                              Process:C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):4320256
                                                              Entropy (8bit):6.643044428314729
                                                              Encrypted:false
                                                              SSDEEP:49152:tNKVmL2fbrwtT6O4QwUc37eGQCs10CbdLBv5ci4:tNSmL2fkT6O/wUcjrs10Cb5B5ci
                                                              MD5:3E5665842EDF692C5DA51975BEA8BE54
                                                              SHA1:DF865EFAAA7DE117B983588FEFD7474053CF3BFF
                                                              SHA-256:21E988AA820894FAEB5F57171734501A444BE9AC2758A2B17BCC9A4B677BA495
                                                              SHA-512:75B721CB68C254C6BA26D82CBBB38ACE5928A386D5428F651E56734A1A70DE55C315378E8BC2D95B26F90B51095229E1CE5F239C177DFF1204E31D18CC4A486D
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 88%
                                                              Joe Sandbox View:
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              Reputation:low
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......L..........'......."..*........".......#...@..........................@B.....e.B.......................................#.......#..............................................................................#..............................text...Z.".......".................`....rdata...2....#..4....".............@..@.data....T...@#..2....#.............@....rsrc.........#......L#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              File Type:OpenPGP Secret Key
                                                              Category:dropped
                                                              Size (bytes):8
                                                              Entropy (8bit):2.0
                                                              Encrypted:false
                                                              SSDEEP:3:L6:G
                                                              MD5:BA99171F8E6508F6EF7E67C0C9E40521
                                                              SHA1:1D9A8BB8169FD47F3F7C10405B357ECE9778AE6B
                                                              SHA-256:DAC4FA424F8B9145CC4471DC62E737B8CC23F62CFF74D03151911F3EDD9753A0
                                                              SHA-512:FA0E71639F6656C4DBC48C8F0D9D7B9B1B2E95E98828F17330516F96031376A27FD5B8E819272F63A0637D13FE47DEAEA377F34E210F8D58BB3840E8D6460388
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:.kJg....
                                                              Process:C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):4
                                                              Entropy (8bit):0.8112781244591328
                                                              Encrypted:false
                                                              SSDEEP:3:Y:Y
                                                              MD5:1EBC4541E985D612A5FF7ED2EE92BF3D
                                                              SHA1:BBF9EC5CD7F3ABEB6119901F8E7AB2DCDDDAF1EB
                                                              SHA-256:28276425D45829D4E6F5E18AEFBF1F62862F07260A904532FB6E2106DEC973E6
                                                              SHA-512:658B7C94407138B7113DC15D2E432936409FE1D06961A3DE4DD72D92A47E7F7C93582F9DE57D7F564EB7D905D21D8035A1ACA22873D25A6FCAB88CC42618E876
                                                              Malicious:false
                                                              Preview:-...
                                                              Process:C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):128
                                                              Entropy (8bit):2.9545817380615236
                                                              Encrypted:false
                                                              SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                              MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                              SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                              SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                              SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                              Malicious:false
                                                              Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                              Process:C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):128
                                                              Entropy (8bit):1.7095628900165245
                                                              Encrypted:false
                                                              SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                              MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                              SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                              SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                              SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                              Malicious:false
                                                              Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):15864
                                                              Entropy (8bit):5.446150628226878
                                                              Encrypted:false
                                                              SSDEEP:384:zVQEjoZ7ooLzDCccymQx/9DSpNAJemtjf0Ncl08:zV1joxLH1SpKJtTF08
                                                              MD5:43F2BC6828B177477C2F98B8973460E8
                                                              SHA1:F0A3C975346AF66A843E8B49574DC9083CD32E02
                                                              SHA-256:3B578B15AD0D0747E8A3D958A0E7BF1FF6D5C335B8894FF7A020604DA008D79D
                                                              SHA-512:2449C3D615E5BCECE4C1B773FE629A75061A3E1488F6D3D743D7D209F1D687F26997937AB13B3A1B89B650D122DB030D2188E1E89BC1AB03CF2DF9A29CAA456C
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: i7j22nof2Q.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: gxjIKuKnu7.exe, Detection: malicious, Browse
                                                              • Filename: NBoJCkvcb1.exe, Detection: malicious, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................l.......^...............Rich............PE..L.....C (.........!.........................0....@..........................`......B}...............................'.......$..P....@..H....................P..<.......T...............................................|............................text............................... ..`.data........0....... ..............@....rsrc...H....@......."..............@..@.reloc.......P.......&..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):36864
                                                              Entropy (8bit):3.990104497523604
                                                              Encrypted:false
                                                              SSDEEP:384:U/2zDIc6XmlKm5sfOo8yqt6TsyzAaQDTW6pTo9aICi:a2Qm/5t6Ts4AdDa+To9V
                                                              MD5:7A98D38CE4E2CB796E723CDEAD2540D3
                                                              SHA1:47E58CF04357B0A4FA1189A84ECD30EC2125A596
                                                              SHA-256:18735127CAD27A472A50C8D1C39BC0A07283921D588AECC90D3A6D99446A80B7
                                                              SHA-512:F5E00C5969BAAFBC94EF970EB0B6C02BB8971F988676C86B564BDCFC0B76B0E5ED51CB0741168512DA664894899FCE3D27159F04645F9F7AB2283A54301F7A20
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T.x.............................r...........'...........................Rich............................PE..L...o.|G...........!.....@...@...............P......................................................................@Y......|T..<....p...............................................................................P...............................text...f3.......@.................. ..`.rdata.......P.......P..............@..@.data........`.......`..............@....rsrc........p.......p..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):36864
                                                              Entropy (8bit):3.990104497523604
                                                              Encrypted:false
                                                              SSDEEP:384:U/2zDIc6XmlKm5sfOo8yqt6TsyzAaQDTW6pTo9aICi:a2Qm/5t6Ts4AdDa+To9V
                                                              MD5:7A98D38CE4E2CB796E723CDEAD2540D3
                                                              SHA1:47E58CF04357B0A4FA1189A84ECD30EC2125A596
                                                              SHA-256:18735127CAD27A472A50C8D1C39BC0A07283921D588AECC90D3A6D99446A80B7
                                                              SHA-512:F5E00C5969BAAFBC94EF970EB0B6C02BB8971F988676C86B564BDCFC0B76B0E5ED51CB0741168512DA664894899FCE3D27159F04645F9F7AB2283A54301F7A20
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T.x.............................r...........'...........................Rich............................PE..L...o.|G...........!.....@...@...............P......................................................................@Y......|T..<....p...............................................................................P...............................text...f3.......@.................. ..`.rdata.......P.......P..............@..@.data........`.......`..............@....rsrc........p.......p..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PDF document, version 1.6 (zip deflate encoded)
                                                              Category:dropped
                                                              Size (bytes):1360891
                                                              Entropy (8bit):7.974159148087012
                                                              Encrypted:false
                                                              SSDEEP:24576:F3ZH1hmhsjpGswgZZa6exedw2LulKWDHr9TJ2kRoMKEWt4KNucL8jgJL:F51EhwGEZZa6rEKWbrKkeF94K3LvJL
                                                              MD5:C871E4C9E9C0FCFE60CDB675B89A1501
                                                              SHA1:A6BD175BAC7305296A16F3F3D0E48CD98249DBFA
                                                              SHA-256:714BDCDFC56A37194012D78F7CF064E1E36ED228341230CC8318A1F1EC65F8E5
                                                              SHA-512:A4EA4A68B74137317761325D79AC1A3BA22FAD0A078633C9FB8B823E639B0E7F530033ED35265C08F4CDD8C5D3777371AF3A87309B3A6F96C94A2D57077E132A
                                                              Malicious:false
                                                              Preview:%PDF-1.6.%......1360 0 obj.<</Linearized 1/L 1360891/O 1362/E 89624/N 71/T 1358784/H [ 480 892]>>.endobj. .1369 0 obj.<</DecodeParms<</Columns 5/Predictor 12>>/Filter/FlateDecode/ID[<199AD1A9301D48F38B5B5CB1F220F56B><F1B8847A9F1144D5AC18C33BACE848B0>]/Index[1360 19]/Info 1359 0 R/Length 69/Prev 1358785/Root 1361 0 R/Size 1379/Type/XRef/W[1 3 1]>>stream..h.bbd`.``b``..... ..-.d....."'?...;..eAj./......z.....(.?.......!...endstream.endobj.startxref.0.%%EOF. .1378 0 obj.<</E 1066/Filter/FlateDecode/I 1082/Length 787/O 1028/S 899/V 1044>>stream..h..S.KSQ.?....kmm.R)-.Y.....'M.[.m.......r..!1e.*.....9.b..z.-V......a_]..b..6...z..s>.....;.@.....P..G........%.8..a...bm...i..`...zyM.PY.^..c[.....S.,.j %.....uc.mW.a.]........;d...'..G.+.|..7..2/..5^*..9.y.y..dV..gSy.F+9..>.x SH.........s..6=.yuAW$.\.i.k?RP.....8&.u...&.v[S3Qv}..<.}.1T.......*x.b{y...y...E.=x.........7.40...,....}..I3...MEAZP..[..ONEd.2.B...&$96L*....g$e.-n.....)a.[........D......T.6..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):79
                                                              Entropy (8bit):4.871394476074933
                                                              Encrypted:false
                                                              SSDEEP:3:wFWWMNHU8LdgC1BEJ6MiRgLoxRY9iK:w7MVBdUgq8xRY4K
                                                              MD5:F25C7A35A68742D5DC0BCC7BB396D62B
                                                              SHA1:12CDFC54E6C8E4BD39FDD9EB429BB34754F1DDDC
                                                              SHA-256:2E7746E47AB1FEB0F5E7F3EE31B83329BF6241C64154CCE00A60F99D96D63E2C
                                                              SHA-512:E38B3A2FDDA23D06DD32779E316C15BF288E7B41BB353083FDF615D56FB246F2994CC47CAA4C7673526EA743C2CA6FC9C9F5925EFC763EEBB0ACBDE34FA5EA93
                                                              Malicious:false
                                                              Preview:<xml version="1.0" encoding="UTF-8">..<scal_install product="scal3" />..</xml>
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):56223
                                                              Entropy (8bit):7.675938408908281
                                                              Encrypted:false
                                                              SSDEEP:1536:/+jsHu4IMEuSznazX2TQZwm+WxhM6HMy6Z7:/ppIMEulGTuwmXhMwMB
                                                              MD5:619CA288DE840F0BEC52218DB7F2036C
                                                              SHA1:D1D5389AAE91284734F4940BD8319CFA2BC40A0D
                                                              SHA-256:C2A6D78B635CA45E316D10936EF7507B1643F4674BAA08B79FE22285EADC3966
                                                              SHA-512:4FACBC40E37F9801E9177A057D55BF236C5FBCE5397AF973B60B21C027AB258FD1A91B893F93AE3100A6785AD67089FBF623C121B7D4990A987A311E47314E5C
                                                              Malicious:false
                                                              Preview:BSCAL...............)...............................................$..G..............4........=.......~L..`.....U........n........y.......T............O....W...%....|...b............z................DSCAL...............................|.1..%.[.B=l.8....I9s\QP2..?..U.G....."....7..[d.b...6.,J]./;[.{T....*bV....$G.M......../T..5y............w.5.y...N...:.,.y..k.........0....0........Arrows.Craft Edge.Shapes..........8.....8"...`...............................DSCAL................................ u..d[........P.[..Y5eD..w..s.5~.._.Ev\.,o...E.......}5..3J..6.6E<W|.....6.[..s..... .@zc.X.f....I.........R.f..x.T.....A.........1....1..."....Arrow 1.Craft Edge.Shapes..........8.....8....`.........Arrow 1.d.d......PNG........IHDR...d...d.....p.T....bKGD.............AIDATx...KHT{....c.$......l..g(...DP..4.@#h.Zd.,.!Y..R8.P..&.EFa..I.E....K."....t..v.v.uG...2.....A_..9z,B.4....Po@|O.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(&,...v.......C..Phii....7o.P[[..h......
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):132979
                                                              Entropy (8bit):7.662743912764236
                                                              Encrypted:false
                                                              SSDEEP:3072:viQWV2mUue1Kkp5F8U4rpAzmYDbUabHidS42O9mR:vTWa91dFr4rpwnUTdF2O6
                                                              MD5:F88752DB58C53A82F2DCD5D11F8233AB
                                                              SHA1:6D41999B017AD74783339AD00E03811F48A60E97
                                                              SHA-256:8B5AD9F2E46D3331989887761AFB6C3C7786BCA8D846444BF2FF234FD4E0E2DD
                                                              SHA-512:86350CC5DB773D092BFBDCB5710E90391ECE9D243E16706CD17E62197683520478FD32C2D4036DF45AF9326F59BF263A7FF7E56C662BEC5AA3960F6328852A00
                                                              Malicious:false
                                                              Preview:BSCAL.......................-......4........S....:.................!)........6.._....C<..>.....D......./S........\........b..i.....z.......W........j........f...-.................I........v....c...9......................J........*$........0..r.....;..&.....G..B.....M........Z........^........b..x....%v...........o....U...W................./........U.................;......................p................. .................a.......DSCAL..........................@...5.2N33....^m...n-.C0O.i.!w.2G.,.".).22.............a{[X ..N.>...{.,.W..0...{.]F<{a<f~....+.=...sj....M.,.<..z.(~.V.2|i....{j.(..C.'..`..]......R...Ex2...H.N.............6....6........Basic Shapes.Craft Edge.Shapes................."...`...............................DSCAL..........................@...3..k33....^m...n-.C0O.i.!w.2G.,.".).22|..B..[k.3..Y.....B..q..}4..X<.96H.. v..N...Nr......@......ss#%.\.:.g.3..4..$.e..3...3.....bd..c.<:.....L.t..... ...y.Y...................F....Arch.Craft Edge.Shapes...........
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):543833
                                                              Entropy (8bit):7.50496335178111
                                                              Encrypted:false
                                                              SSDEEP:6144:9DQ1236dLlSmlgZOw9/+wdM0zOyJromlIK1Z7HsH1GpYMnhdjYnDf67:dx6dLk/xSc+6sV8YIhdkDf67
                                                              MD5:7D692438B7E70DE932BC386A3D44D319
                                                              SHA1:5FC91DF8EA79A005A8583DCF44E0D48B7EC5A90F
                                                              SHA-256:05CB2D622DDEED62E052B8BBDB19DBE99B83F44F4447408601823B518D330586
                                                              SHA-512:1A605B25724B91BE5802104BC8BAA0C4EB0A3638CFD84D8AECFF10FC41B72BFD44DDD8DA34373C1BB8B7C8D4823D222441E0CFAF9696B8F119F8BEA37ED9724D
                                                              Malicious:false
                                                              Preview:BSCAL.......................4......D....6........'...j0....H..b........x....k........T...G%....9..}0....j...........]....r...N..................2...x...#............./...:9...iJ...F............k........d...z................-.................d...."............S....%...........................)..=.....7........B..@.....]........o..E....;....A...+...09...[....2..../..y....];........J.......WX........e........r......._...2........L........'.......=k....<..o^........Q.......<........A........r..DSCAL........@a"-..............@......v33....^m...n-.C0O.i.!w.2G.,.".).22.....N%....;.b7.P....G...1.u...iD..........A...[ys.@..zX.m.j.Y~....y...K<....n.l.......L...P..=......@...@.A4...t.@"..*z..........F....F........Createinspain Designs.Craft Edge.Miscellaneous..........4.....4....`...............................DSCAL..........................@.....r33....^m...n-.C0O.i.!w.2G.,.".).22.,"...~u..@....7.p.m.Q.&?@..d.>........ <"..-.`2@...aM.....+,..<........Sm.9....C.O.5p.Q..c....*
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):81816
                                                              Entropy (8bit):7.707519991934002
                                                              Encrypted:false
                                                              SSDEEP:1536:bsicsYedzR8eO9gKbvL2aiWqAIqwsoxlprW+DWu8UYHI7zoZ8jPy74RSBsZ:7p/dG9Bbz2DWqA1w7jKGWY3oujfRSBsZ
                                                              MD5:4C1F9B5ECF86DC7B839BF5D8F3ADFDC0
                                                              SHA1:CC6D1748BD0FFBB9036C0D871EC894E59B1CD6FC
                                                              SHA-256:F2A2A3C04FB8E6E9467A62B408F705D77C9A4269B2ADF5EC1947A871A0D1C4F9
                                                              SHA-512:C49470EBA77A8616E7CE32CFE8DA98010635BDA0046BD8904328D11777162DE9774635F20627A772F24719DA3C7E217CDEB8A8ED41BBD71B04C722D6F0E217AB
                                                              Malicious:false
                                                              Preview:BSCAL.....................y.................#..............%..F.....D...(....m................X...x........q....A...`..................%...H...P$..DSCAL.................................`..xG{0.G.N.X..)_...j.QW...K. t.{.L..!'.%=.....I..bE..|&..N2..!..s..c..x6..../D..c.=FEY....J..7.V.Q...>j..:.B......5....p.........................Fall.Craft Edge.Shapes..........9.....9!...`...............................DSCAL.................................l.........H.ES..5.....P.Qo{.=...T...*-.\X.h.5|S9.<...frt..N.k.n.-.2...-.,...M......!.B{.`n...~O.d..l.5......f.V..4BZ. ............/..../...7....Acorn.Craft Edge.Shapes..........9.....9....`.v.......Acorn.d.d.c....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{|S...I.$M....By....E(.D...Zqt....yl...{.P.|.6...G......+.V@..@'..h...B.i.4..q...!V..7.....49.{.o...{.2A........@._G...H..'.i.............].kF....W......@.dP...=QT..<8y.o.."..&.^Haa!3.N"g......w{..mJJ.."%%%h..V....g.sS...d.D...t..j.S1..k!UUU...'..7?.F
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):66594
                                                              Entropy (8bit):7.800838697373916
                                                              Encrypted:false
                                                              SSDEEP:1536:bOqndgG+IQ32TpUJz0DXmKTmg9usUFSZVl:bvQ3216zuXlFZVl
                                                              MD5:DE2D8D73F85285535A13F89B0F904847
                                                              SHA1:A4A42EB9FA7F9C8A51CD24560D999163DEE57290
                                                              SHA-256:306F7E5AFA1685939708DBBDAC6A0DD91DFE7C106BA6F84780BE9E44656B775B
                                                              SHA-512:CD1E87D933E8E821769721A1B03E244655D519722329E114388FD5E18F4DA57DAA7D2E769379C4938BA8F958AA71A87FD1DA194967A57EF5B94AA3347ECB8D29
                                                              Malicious:false
                                                              Preview:BSCAL.....................y...............................>!..M.....-..&.....I..).....Z........y..H......................}.........................DSCAL..............................4..a.A...;..l..0=a..S^[{.. ....D.2R..[N.HFm.qA%.D1E..<..~....i...e....R....O...`@...{P.....PAn|...J.......'I.4|0.....]H..I!D..........................Game.Craft Edge.Shapes..........9.....9....`...............................DSCAL....................................V.%....w$..g.....n..p.~......5W...Wi;..O.-.T..6T.,...(*..........*.......l<|....<...A.F_......`..).v.;....:.Q.........................Club.Craft Edge.Shapes..........9.....9.7..`.........Club.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{....?.......rY..0.PX..X.07...\.r..Fc.. .0.$>....ZIU....h..(r....-., ..B..X.X.1;....ced....L...g.t......9.....;..y..(..|7..466r..a..9..'.4..02....X,.......`.aD".<..g.. ..g...x..j.ne....E$.A.$<...<...q\$ID.....$Ix..e.$.I..(..g.iL.<........|.....q...x..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):595545
                                                              Entropy (8bit):7.0713050562667386
                                                              Encrypted:false
                                                              SSDEEP:12288:fTBZLFkAEYvIfNLmu2cTbZqSNTuh4kMjBUJ84Ch9ycd8sl:f7LgLF2cbZtNT+sjOJXCrgsl
                                                              MD5:3695D419AA9C7B11C464BE2A58A40530
                                                              SHA1:C73513DF0555DB421EF81EF436136E53CCF4EE11
                                                              SHA-256:0487C6C64C185AC5BF459A907F302E363E5A162081B651570E691B3EA07818DD
                                                              SHA-512:54883F5E76E2208856F07DC16C9E5BCEA3ACBDA7C4B9CE48BF043CC371AD57F2925DCB6360CA85F5725609FC692906546B6E5BF70D8F839A206E06316C9E2F59
                                                              Malicious:false
                                                              Preview:BSCAL.......................2......H....(...........w....r...&?........E...cI...2....|...D........!................."....#...)....M...2............c....-........"........X...JW...*.......4........+........n...BQ..."....s...5...U...5/........@...8....M....f...2.......d*...a........1....+...3...j'....D...,...Kq.../...(....!.......b....H...~.........-...u<.......{R..r.....j..@....-....B........*......../...."..\$....G........`..].....y...(.......5............k... "...........DSCAL..........................@......d33....^m...n-.C0O.i.!w.2G.,.".).22...S...V.P...~).......PJ...._..q..7.4..l...}.........^M.rY......".L..+...|.X.....)...i..B...+~i..s.82.X........x.9..(M..L.........J....J........MichelleMyBelle Creations.Craft Edge.Miscellaneous..........;.....;B...`...............................DSCAL..........................@...c..#33....^m...n-.C0O.i.!w.2G.,.".).22.F..`m`..XJh9u..pFdCp%.R..9z.n...Qe.. 3.{,"....,`.9.+.5.D........vr..72#..s.U.y"[.6...h.3M. 2O..x.f.Ah.`.L.9...
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):44241
                                                              Entropy (8bit):7.747233988337866
                                                              Encrypted:false
                                                              SSDEEP:768:tZh3JPKW648iSo736Az5jwwcFuyZ3Y1Lnhe5xaLZPTAXogkA1sywv6:thPKz4/7h6fZ3Y1LhqxaB0Xrkosfv6
                                                              MD5:561A63F0CD4A70F3134143A5E266E58D
                                                              SHA1:18F871AE3532B1F9A030EBF2EEE7AA7A4491D60C
                                                              SHA-256:7C1B0B11EBF37D03AE2F6CF5135593D604BC1D3BF942329A3952DC0CCB770769
                                                              SHA-512:52F15AE1794120CA3E7E6204A4AEC9364BB8EBF7BF446753C53E8B5232BD7F76114603DABF41562318903EBEBB5390CDC4E651CDB33350AC5F3C0BDEDBBE3594
                                                              Malicious:false
                                                              Preview:BSCAL.....................g........,.............Q........0........(,.......19........B..C.....W........_........t..Y$...'.......DSCAL..........................@...Ps..33....^m...n-.C0O.i.!w.2G.,.".).22.4....Q....<.^..]e..!..G`......E..B..,..O..ev.b.....j P[Oc. ?1o65.O..r.dp.X.....7..O*B...p.Q..pU....e<...4X.H...uU4J*?.........................Music.Craft Edge.Music.................0'..`...............................DSCAL........`.................@....:.<33....^m...n-.C0O.i.!w.2G.,.".).22.P...A....^.M._.Z.vpMD<.Z.i+..\:.v......."...o...E.5..W.......M).....@.....K....~.t(.y...T.S......6~..hx..~w.=..d.3'.............4....4........Double Note.Craft Edge.Music................. ...`.........Double Note.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..ML....}..v.n.Xy..iS..h<j8.1x.111.x0^L..M.zQ.&..$....1..'.....H./@)..R.ei;...o.R...:...v..<;...4.Q.B...-u....p..`..`..@....p.\+.cB..,................ ...099.o...8.<.B...(^.x.....e1!.J.099.@ .@ .`0
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):76044
                                                              Entropy (8bit):7.781593198930996
                                                              Encrypted:false
                                                              SSDEEP:1536:9zCUsvuDmEm7KAaAJB2x56SPCwlkmsKpUaYVRMguAIXSA2:9z/s2Vm7KAajfl/sKpUaYVRM8YSf
                                                              MD5:FA20A58E0C27D4DED87150AADDBB2556
                                                              SHA1:74CF094D22A5806FD0DF01701851309CA3D3F263
                                                              SHA-256:A047FE59A6C64A6C17B887934245E64DAB2CDA4925B259456596C2C597740D75
                                                              SHA-512:3E1C65AD1FB8728724FEFCB8601918BEABCFBF4DC31AE17BC5BAD66BFA32DB184950AC077B0B27AE399A4B3A6B5890AAB325805F4444CDF07C4D216B7FDA4EDD
                                                              Malicious:false
                                                              Preview:BSCAL............................................l........"#........;.......iY........h..b....gz...........S....r...'.............p........=...^.............D...N........z...DSCAL..............................{.I..T.......\..?....;....X.+$g.=.7|5..G.N..X....v.eo.@.[...9.*>E.Y{..}[......w!j+..vy.8.p...w..&......I..B..s.W..\.G..f........../..../........Newborn.Craft Edge.Baby..........:.....:@...`...............................DSCAL..............................}.r..@.1.R...1H...Ul.A.k......~...l.[.J:E.X.".d(6J.*.....r..P....X.....I.j,.72Gcd$......>Xd.y,.[.e..zP`..$I......g5x..MhG.........................Bottle.Craft Edge.Baby..........:.....:. ..`.g.......Bottle.d.d.S....PNG........IHDR...d...d.....p.T....bKGD..............IDATx...Kh.k...'1*..I.1......QIM.X.."n,...*...U(RQhA..........Ru./XKI..N5.....g!...j&.s.~.N2....\.!.""..G....d2x....`.m.a..*..=@%..;.......btt....8~...*C.u..Mjmm....o?......&.u...*.. .iR4.......d(.......|.z..%. ....(.J..^.ze.X.p
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):92038
                                                              Entropy (8bit):7.7200406826946235
                                                              Encrypted:false
                                                              SSDEEP:1536:ca4Jw4jmV7T35O0vMSndbJMZSMSU514ph64P8beNFbWmGINBU0Od:ca2bmh35rkmrU5f4P8beNhhG0rM
                                                              MD5:E98226F38153CFBF93BF77744E364434
                                                              SHA1:6E613678B12144ADAA5ADCC18AA40965EB903101
                                                              SHA-256:825F3BA18ABDFA2164FBC1D183D8C1C178C9D99C3C4B694AC358D833A755D241
                                                              SHA-512:228B1334D11F455EC6610DB53E36BCC2D747975EB5E8D650D41C92FD856A34E266ACE5A8A094FCE407E518EF76B6E0B00C983A0CDCE2B930B2222E16A4B6A5CD
                                                              Malicious:false
                                                              Preview:BSCAL...................................................../+.......'G..\.....]..9.....s..~....:...^.........!.......X%.......7....4....!........?...qX......DSCAL..............................jy.l.j.;.\o..`P..a...c._.u.`....Gm2)T....^........$y..V............2....b&..?o....u.9...*.Zj.VT.J....h.C....!..B..jE..GP+.ewI.........0....0........Spring.Craft Edge.Shapes..........:.....:`c..`...............................DSCAL................................Q].........y....n%.3.Q.ky......{.`.P-P%.p..-TjNI..{-92...Y./.....N...!D...g....r.84X...M.....2h...b.^l.0P......}c...(...............7....7........3 Leaf Clover.Craft Edge.Shapes..........:.....:!T..`.f.......3 Leaf Clover.d.d.K....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..yX....?......3 ..z..j.".Rn.1-}.....Y.Y..R..-TvR,.5....4M%....f....I.......f.af...|}K...a.>.....}...|.^..I.A.h.o.6..-...A...A..yc;..7n.`.-l......^..dA......&..P....?0l.0.....e..4.N=''.7?x.C....-C.C..(@r+..(....k...S.23m&....34
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):114158
                                                              Entropy (8bit):7.754245071397085
                                                              Encrypted:false
                                                              SSDEEP:3072:o4KTAq4ntdBWZ4H9fCXCzTP0UuBkZcvqqUnj7K:ITCtzg4dCkgUuM1ju
                                                              MD5:1092617765A52BADA8A812FEA901B137
                                                              SHA1:31DAA90CFE29AFA8E3FAAA10C049B45834833308
                                                              SHA-256:88FF0A560A3DA375C323FD0C3761328419A06BA58E373EFB09F8418BC7EFF393
                                                              SHA-512:37DA07F3DA44D298CED21FA3323B54CADC839F3C19ACE0FC000A614C0D8FAD833ABC06C6239C89D8FFAB465848FADB3E667D365DB8310286935705A118FBF901
                                                              Malicious:false
                                                              Preview:BSCAL.......................................G/....1..7....AD...#....h..N....c|.. !............H...f........y....'.................H........>....>....Y..y'...T.........................DSCAL...............................w.L....,.....9YU.".Ad<..c.0RQI.?..."...>....ve...W.q.....b..Uk.N.......*g@.,.w....T.f(..A.Z..1Qn.i.h<.#.=..o..+.....}..B..@a.27.........0....0........Summer.Craft Edge.Shapes..........:.....:...`...............................DSCAL................................U....T...T..E.Uv4.....`.;.....c.]k....@.."T........p/..p.....S.D.\.....6.A.U"....+.4.#..uZ...4..2.."..(jy...*&...;./...5q|.........4....4...V....Beach Ball.Craft Edge.Shapes..........:.....:C...`..$......Beach Ball.d.d.}$...PNG........IHDR...d...d.....p.T....bKGD............ .IDATx..wxTU.._3.>.^ ....!!A@....Q.....k..._..u......AD.....K..&......!J.Rf2.....c..;)...~.y...{.=...9...........(...x.....;GJJ...'##...b.......O.>..............=d. .o...........v......L..=8m.6.^..#S.p.;@...~C.0`.
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):132558
                                                              Entropy (8bit):7.669771822889911
                                                              Encrypted:false
                                                              SSDEEP:3072:aqP0FOHIgQ/1E8d9ko/te/O+MFgriBmVdQIKgaKKHEZkiIZR1WjA/sBf:3P+Oogc1EyO8t4LMFgri0/3EPnIsEf
                                                              MD5:E6497DA72921573C22D29C664B5C1EAA
                                                              SHA1:5D2F7BBC3E94BDCA08B9DABBE47CB4762024FCB8
                                                              SHA-256:17BB9F3422F532DDFE5D6C9602E9E49BE765E4848ACA1C191CF0484B0092AB59
                                                              SHA-512:1090C1B1D4005725DF62A20D8D4D68E0B561E7A285104CBD99F42E16A170A1BA8A2452F05162212D05683264104DEE3F504C90CE38033A393E92B62427397562
                                                              Malicious:false
                                                              Preview:BSCAL.......................................f....h........3...a.....2.......}F..f.....T........f..X....)t....................*.......S........L....8...Y!........'....8..h$....]........r.......u...#........_........x....o........Q...V........'...DSCAL.................................6.I6{..tr....W....zY..2y..?>..4.....'...o.h.]..:....)f..c>t.<.....]..M..H..R...\..S?P..[....u.~..+ ..B.HR.....N....@..U.i..........0....0........Swirls.Craft Edge.Shapes..........:.....:.6..`...............................DSCAL..............................ix.0.X]..Sv..5....k.#.m|i.7..9.@q...:..``.=...p...0..8....n.q...@..cTgu...q_&...ib.q..O~\...S..........[a/S.E."...B\.....N............7....7...r....Flourish Sm 1.Craft Edge.Shapes..........:.....:....`.Q.......Flourish Sm 1.d.d.6....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..MHT]....C..VcX.Z...A.$..."k....A.B...}P.F...X$4ML..I..h..?.0....%3S.?...y..s.:....}.....s...?.8..9.suDD..0,....5.......W...#.(.B..p8(**.....{..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):59279
                                                              Entropy (8bit):7.723890349807642
                                                              Encrypted:false
                                                              SSDEEP:1536:WQSDmzHAmdxSMSfXUkfK9H3BpBZYtzWBiAmNHDm:W35mdxS2kfOHR1sqB8g
                                                              MD5:A667A4635760A604F5E90455657DF9BA
                                                              SHA1:3ACEABEEDCFF9C6F7922FC954218D42D08B54A1F
                                                              SHA-256:196FD731971B11B3873D52EE13C1EFAC4BF9F0F91D82856CBBE05CA1FB659152
                                                              SHA-512:3ABCFEC0BC6D820F4317A32B3E027B1CC3D4438825844618AEEF1443C8A0F9A059C1FAF36ACE16F6CD156260D74BC92BDC9EA489BE8F23B1FEA069D795E0B1E3
                                                              Malicious:false
                                                              Preview:BSCAL..............$.0.$.0p......../.......................!..Z0....Q..g....Ad.......#n..6....Y.............................Z....f...)...DSCAL........p.................@......X33....^m...n-.C0O.i.!w.2G.,.".).22E....@2....B...W.8..x=Ic..L......".l.X.......2..0G...AO..s..?q.N......v(.8............-......8.|P?.?K.9smIe...,[+..6.E... ..`.........1....1........Symbols.Craft Edge.Shapes.....................`...............................DSCAL........p.................@......a33....^m...n-.C0O.i.!w.2G.,.".).223bk.].^...>2..{...I..,.v)&.....{. `......Q...4..J.b*..z<...t.....8).._..Y..r..*..'?...?.......gK.......1...!.X..W.T".g`U,.........../..../........Don't.Craft Edge.Shapes..................D..`.........Don't.d.d......PNG........IHDR...d...d.............bKGD.............RIDATx..]ilT..?....,m.m.Ri.J ..!..D.....(h.b.`..)1,..Ee..=..'....P..H.E-(..B...]..3].....fZ..3..7K...a2...w.}.w......A.h........^%.......d9.$.......J...Z[......:}.......f.hH.!./..H.!...Z""......"*)..r*
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:DIY-Thermocam raw data (Lepton 3.x), scale -20926-24706, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 500970464867410926013250174713856.000000
                                                              Category:dropped
                                                              Size (bytes):56822
                                                              Entropy (8bit):7.651463699422176
                                                              Encrypted:false
                                                              SSDEEP:768:1ro+zsC5ugrZR+LeBc+m5IShs7ohcTvNg2xhMNdZ/aDIg2fbGw:pugrb+LeGvNukcTlg20V/anS1
                                                              MD5:1FF0C9489E836499DB1ED7B3417BA478
                                                              SHA1:750206AB4FBD34B17205ADF33710F91140323915
                                                              SHA-256:74A96CB715FB81EB958BE3DFB60AF0C716D6CB0EF7DD1F5217CD15594DC3F39E
                                                              SHA-512:7EDE209919E3ECF80C47EBEC43207195AAC41C71F4C8398115AF2807EF07043A984086251C0A683A3F5F60AF51304D3559F9CC5385CE782FF5F6FA28B34F40B2
                                                              Malicious:false
                                                              Preview:BSCAL..............................D........................................."..+.....(........2..h....!?........N........Z..~....Vh..).....s.......L~..I.............a.........................DSCAL..........................@...yq..33....^m...n-.C0O.i.!w.2G.,.".).22..J.......F.b.So.X.D..U0.....{...~..T7..... ..t...$......$j.9"..n..g....I....*O,y.*..]..S..S,._.d......=>}.....w.k.O#...........F....F........Tags, Signs & Banners.Craft Edge.Miscellaneous.....................`...............................DSCAL...........?..............@...a..n33....^m...n-.C0O.i.!w.2G.,.".).22..\...N.Q.T..RtO.7c.R..e.Wu..i.%..h=...].L..i.M...g.....x.*b..O.2...A...eK......a=}...M...f.S..rZ.z'.cL._...;.Z....FK?gbP..x..........6....6........Tag 1.Craft Edge.Miscellaneous................."...`.........Tag 1.d.d......PNG........IHDR...d...d.............bKGD..............IDATx...MH*k...F....>.$(.h.JD.M..mZE......h!.H.......EB.%.-...QD.@.h....3w....9..<......a..._CAC.............Y..F.,.....4]V
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):64537
                                                              Entropy (8bit):7.783531894467484
                                                              Encrypted:false
                                                              SSDEEP:1536:mY9p0pAuZhUVKdEmHZt/YPBkBbnFeAHiix8qwQ1tTepK:m1EVmT/YpMT8qwQoK
                                                              MD5:B877B821FAA0514BE7D67132C026D97B
                                                              SHA1:B634758494358A2951799BDCDAA664271DFAD248
                                                              SHA-256:32BC4297D594164F7BE3753FE2328132B0562C81C5EA18AC97831AE10C707F1B
                                                              SHA-512:FD47CD1C73A83DAC589EE449D28BAC8E6AFE4D74BFBC077D670BF57A7BF141B7865BDE1F0C5179A7BC9569917ACD9967C6D173B7967442648E104F420C7A921F
                                                              Malicious:false
                                                              Preview:BSCAL............................................x.........%........;........U........].......Ni........t...........}....2............K....f...{.......y....Z.....................T...DSCAL..............................u.n.W.....|.o..K.....F'.Q^Sv..@r.9.'....B..8...g.iv`...6.<Pj....1.E...U!.........E...$..(.........wd...O.n......^.rN.m$..q.x...........=....=........Talk Bubbles.Craft Edge.Miscellaneous..........;.....;C%..`...............................DSCAL..............................1.q5..G.8&.Y.j.2c6x..Ow....L.....j...PMC..@qt...P...=.!.kE...........(...g......O.o.......o...#...i......mC..TYx|..Mf].2l...........>....>........Talk Bubble 1.Craft Edge.Miscellaneous..........;.....;C...`.,.......Talk Bubble 1.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx.._L.......W:..F..f.F. ........Vy...k.Y.....(W[.juQ7.lm-.Uk....jm].-.dk....D(.<.../_.....N>.u.9....y=.....""p.A...8.p!...0....\.cp!...0....\.cp!...0....\.cp!...9X....~..AD"...$++.999...H
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):211380
                                                              Entropy (8bit):7.37236649718158
                                                              Encrypted:false
                                                              SSDEEP:3072:IOT3BfdrN6I+0ZQ/yYLtpAYVZy72KKkhaQ3iBbuRb4yVgwNefQd2Flx4wL0wT:1RFrN6I+02yf2KkJBOb4yVlefQ2FnT
                                                              MD5:5D5EAAC4FAA75CB7478198FEC28895CC
                                                              SHA1:D7FC225DE85266FACABF314B166C957FF35EB122
                                                              SHA-256:032B715FDE24B59BE882D379968C681AF09F0B15E9F42A9C55B8A668D78A36C7
                                                              SHA-512:DA90291D9022BADA837498A501DAC94414EE2B9A59724C7ADC656EDEA6FC8EAA060981B29ACFB92BC4BBFD358CAA6F379EB6C1B89510F2062E53B96A23888656
                                                              Malicious:false
                                                              Preview:BSCAL.......................7...............L....e...T........s....,"......./+........8........?..8....JH.......ZP.......P\.......~f.......wo..K.....z...............h........D...h.............g...U*................:......................'...:....a...)........ ..... ........+..X.....5........<.......JF........N........X....... `........k..e....Fv........|................n...a............[...W.................................j........n.........a....W...........n..........................e........).....&..w.....1..0...DSCAL...........F.....................P.^.C...Cj.;.K..S...n..g>.7.....&....."o.6Zn...s.C...#.C.g.....F.l..!....k9..X..A...SA.....hM...3..B1j@.]+...Q..M.?.S...[ .........0....0........USA.Craft Edge.Geography..........;.....;....`...............................DSCAL..............................J.T.R=k.x..&.....B....#.Y#.M....zY.o-.8s.iq.1 .Sc..h...:.i+.0_.Gh.{..N/......k%...G&..M.?.1R..W2ij..s......jx9..z5d..=4...A.P.H.........4....4...[....Alabama.Craft Edg
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):96301
                                                              Entropy (8bit):7.809129886497833
                                                              Encrypted:false
                                                              SSDEEP:1536:dINDJFcDGljnsSvjgSyRFLcqIqE+yh319vpvKA9Z4CPOSLbnBKoIytnR2kJ7dm:iRcCBbv0SyRFByd3vFKCGSXBKTyLRdm
                                                              MD5:E82C623CE1F741A9F4FDE9DC43F23630
                                                              SHA1:C2E84F76BFC81C1789AE7BB6AEE197E186774697
                                                              SHA-256:05D668F5C491AA51C7DA93862D3E3C5843A27631BBD1C0EF8034B94080D6CE00
                                                              SHA-512:6B51E4BE629BA85CA583A703700FD2CBFD43734BB29433BA4453CA068B767AB05B1F4084C71B22D6BF11D0B5CA73B9F4FF61A32436BA1A62CA465F1005847109
                                                              Malicious:false
                                                              Preview:BSCAL.......................................1........K....A!........1........@........O.......H`..?.....o...........d....p...........|....k.... ........>....,........L.......Ig......DSCAL...............................x..SA.{..s.g......9g]5.jB.HY.CslP...?.g(.. S/..K9#.....w\S..$M|vX.zKw/.Fl.`.`.c_=..q.......|.^a...kEX<....=..H!..t.....+.W...........2....2........Weather.Craft Edge.Weather..........;.....;....`...............................DSCAL...............................$...s....o..IsD.).8.$.LD&.,.').....,..,.x........J......I[...P..\.q...K:.}Y....... v%........*..?.n.\........L.g..2c..........1....1...C....Bolt 2.Craft Edge.Weather..........;.....;.$..`.........Bolt 2.d.d......PNG........IHDR...d...d.....p.T....bKGD.............CIDATx..{PT...(.{..q`.].EY....-...F.........Tk........F.m2...P.....'"7Q...H...#..6....\....F.\v...U>3........<..s.s.N$.>.~R.p.RRRD[V..N0..:u2...p...Q..'.....1e.D|.m*.m{.^^^.,.o..0yyy.={...+1v.(.>..prr.e.}=.'|..1L...E.*..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 670.488708
                                                              Category:dropped
                                                              Size (bytes):77426
                                                              Entropy (8bit):7.644517291394499
                                                              Encrypted:false
                                                              SSDEEP:1536:3tRKxIbZjmpsrGj6q+RZFHMqxU9pSKi2RWscqh8Pi7Bs:3tR9bZycVlxzKnv78Pi7a
                                                              MD5:39DC4CE3E509EE530E2EC97E03E227D6
                                                              SHA1:E60B00E89197208BE2D9CF8F3C6C8661FBDEAED1
                                                              SHA-256:5296290ACDD86B7DABEAFABC26D0EF6FDD1A8DD9EA2914F036B94D0AD115B973
                                                              SHA-512:39711AE42F87C3E3B0E17A8378EFE05C416BA4D1895FF6F6E718B384D5C7699C318FF36CF420DCD480094EABCD9F07672ECB1FE3F4A3E64E8EF6C6450A010BD8
                                                              Malicious:false
                                                              Preview:BSCAL.....................p..................!...`#..[.....1... ...yR.......Ya.......0{..........|....j.... ........ .......&....B...07..DSCAL.................................QqI.;.`.....h...'I.T.C.:...L.;..F..U......k=R.iW...O.!..YY.P.0..p..c.........P...z..BWn ..q..{V....m....q%.I....?...C...........7....7........Winter.Craft Edge.Miscellaneous..........;.....;....`...............................DSCAL..............................,..)K.9......Z..3..-.R(.>..dq.............|n=r]M?.O!v...2..4.A..$...<'j...U..N.Wlm0.d...m..Z.B<?.f..GD,I..8*..S.........\.@rt..........@....@.... ...Gingerbread Man.Craft Edge.Miscellaneous..........;.....;."..`.e.......Gingerbread Man.d.d.H....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..y|.....3{%....IHB.H.g#..?.". ..V..?....Z.R<....`+"".....!}!^(.@...!!..9..v.....H......dwk}...\3..~..g.EQ.~.g.z...b.Z................ **...T........K.=.#.)++.w....O.=.GD.?a..z.....Zl...V..&...3u..n..w$$$x..\G...k..<..Br..I..H......\
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):114158
                                                              Entropy (8bit):7.754245071397085
                                                              Encrypted:false
                                                              SSDEEP:3072:o4KTAq4ntdBWZ4H9fCXCzTP0UuBkZcvqqUnj7K:ITCtzg4dCkgUuM1ju
                                                              MD5:1092617765A52BADA8A812FEA901B137
                                                              SHA1:31DAA90CFE29AFA8E3FAAA10C049B45834833308
                                                              SHA-256:88FF0A560A3DA375C323FD0C3761328419A06BA58E373EFB09F8418BC7EFF393
                                                              SHA-512:37DA07F3DA44D298CED21FA3323B54CADC839F3C19ACE0FC000A614C0D8FAD833ABC06C6239C89D8FFAB465848FADB3E667D365DB8310286935705A118FBF901
                                                              Malicious:false
                                                              Preview:BSCAL.......................................G/....1..7....AD...#....h..N....c|.. !............H...f........y....'.................H........>....>....Y..y'...T.........................DSCAL...............................w.L....,.....9YU.".Ad<..c.0RQI.?..."...>....ve...W.q.....b..Uk.N.......*g@.,.w....T.f(..A.Z..1Qn.i.h<.#.=..o..+.....}..B..@a.27.........0....0........Summer.Craft Edge.Shapes..........:.....:...`...............................DSCAL................................U....T...T..E.Uv4.....`.;.....c.]k....@.."T........p/..p.....S.D.\.....6.A.U"....+.4.#..uZ...4..2.."..(jy...*&...;./...5q|.........4....4...V....Beach Ball.Craft Edge.Shapes..........:.....:C...`..$......Beach Ball.d.d.}$...PNG........IHDR...d...d.....p.T....bKGD............ .IDATx..wxTU.._3.>.^ ....!!A@....Q.....k..._..u......AD.....K..&......!J.Rf2.....c..;)...~.y...{.=...9...........(...x.....;GJJ...'##...b.......O.>..............=d. .o...........v......L..=8m.6.^..#S.p.;@...~C.0`.
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):59279
                                                              Entropy (8bit):7.723890349807642
                                                              Encrypted:false
                                                              SSDEEP:1536:WQSDmzHAmdxSMSfXUkfK9H3BpBZYtzWBiAmNHDm:W35mdxS2kfOHR1sqB8g
                                                              MD5:A667A4635760A604F5E90455657DF9BA
                                                              SHA1:3ACEABEEDCFF9C6F7922FC954218D42D08B54A1F
                                                              SHA-256:196FD731971B11B3873D52EE13C1EFAC4BF9F0F91D82856CBBE05CA1FB659152
                                                              SHA-512:3ABCFEC0BC6D820F4317A32B3E027B1CC3D4438825844618AEEF1443C8A0F9A059C1FAF36ACE16F6CD156260D74BC92BDC9EA489BE8F23B1FEA069D795E0B1E3
                                                              Malicious:false
                                                              Preview:BSCAL..............$.0.$.0p......../.......................!..Z0....Q..g....Ad.......#n..6....Y.............................Z....f...)...DSCAL........p.................@......X33....^m...n-.C0O.i.!w.2G.,.".).22E....@2....B...W.8..x=Ic..L......".l.X.......2..0G...AO..s..?q.N......v(.8............-......8.|P?.?K.9smIe...,[+..6.E... ..`.........1....1........Symbols.Craft Edge.Shapes.....................`...............................DSCAL........p.................@......a33....^m...n-.C0O.i.!w.2G.,.".).223bk.].^...>2..{...I..,.v)&.....{. `......Q...4..J.b*..z<...t.....8).._..Y..r..*..'?...?.......gK.......1...!.X..W.T".g`U,.........../..../........Don't.Craft Edge.Shapes..................D..`.........Don't.d.d......PNG........IHDR...d...d.............bKGD.............RIDATx..]ilT..?....,m.m.Ri.J ..!..D.....(h.b.`..)1,..Ee..=..'....P..H.E-(..B...]..3].....fZ..3..7K...a2...w.}.w......A.h........^%.......d9.$.......J...Z[......:}.......f.hH.!./..H.!...Z""......"*)..r*
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):543833
                                                              Entropy (8bit):7.50496335178111
                                                              Encrypted:false
                                                              SSDEEP:6144:9DQ1236dLlSmlgZOw9/+wdM0zOyJromlIK1Z7HsH1GpYMnhdjYnDf67:dx6dLk/xSc+6sV8YIhdkDf67
                                                              MD5:7D692438B7E70DE932BC386A3D44D319
                                                              SHA1:5FC91DF8EA79A005A8583DCF44E0D48B7EC5A90F
                                                              SHA-256:05CB2D622DDEED62E052B8BBDB19DBE99B83F44F4447408601823B518D330586
                                                              SHA-512:1A605B25724B91BE5802104BC8BAA0C4EB0A3638CFD84D8AECFF10FC41B72BFD44DDD8DA34373C1BB8B7C8D4823D222441E0CFAF9696B8F119F8BEA37ED9724D
                                                              Malicious:false
                                                              Preview:BSCAL.......................4......D....6........'...j0....H..b........x....k........T...G%....9..}0....j...........]....r...N..................2...x...#............./...:9...iJ...F............k........d...z................-.................d...."............S....%...........................)..=.....7........B..@.....]........o..E....;....A...+...09...[....2..../..y....];........J.......WX........e........r......._...2........L........'.......=k....<..o^........Q.......<........A........r..DSCAL........@a"-..............@......v33....^m...n-.C0O.i.!w.2G.,.".).22.....N%....;.b7.P....G...1.u...iD..........A...[ys.@..zX.m.j.Y~....y...K<....n.l.......L...P..=......@...@.A4...t.@"..*z..........F....F........Createinspain Designs.Craft Edge.Miscellaneous..........4.....4....`...............................DSCAL..........................@.....r33....^m...n-.C0O.i.!w.2G.,.".).22.,"...~u..@....7.p.m.Q.&?@..d.>........ <"..-.`2@...aM.....+,..<........Sm.9....C.O.5p.Q..c....*
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):44241
                                                              Entropy (8bit):7.747233988337866
                                                              Encrypted:false
                                                              SSDEEP:768:tZh3JPKW648iSo736Az5jwwcFuyZ3Y1Lnhe5xaLZPTAXogkA1sywv6:thPKz4/7h6fZ3Y1LhqxaB0Xrkosfv6
                                                              MD5:561A63F0CD4A70F3134143A5E266E58D
                                                              SHA1:18F871AE3532B1F9A030EBF2EEE7AA7A4491D60C
                                                              SHA-256:7C1B0B11EBF37D03AE2F6CF5135593D604BC1D3BF942329A3952DC0CCB770769
                                                              SHA-512:52F15AE1794120CA3E7E6204A4AEC9364BB8EBF7BF446753C53E8B5232BD7F76114603DABF41562318903EBEBB5390CDC4E651CDB33350AC5F3C0BDEDBBE3594
                                                              Malicious:false
                                                              Preview:BSCAL.....................g........,.............Q........0........(,.......19........B..C.....W........_........t..Y$...'.......DSCAL..........................@...Ps..33....^m...n-.C0O.i.!w.2G.,.".).22.4....Q....<.^..]e..!..G`......E..B..,..O..ev.b.....j P[Oc. ?1o65.O..r.dp.X.....7..O*B...p.Q..pU....e<...4X.H...uU4J*?.........................Music.Craft Edge.Music.................0'..`...............................DSCAL........`.................@....:.<33....^m...n-.C0O.i.!w.2G.,.".).22.P...A....^.M._.Z.vpMD<.Z.i+..\:.v......."...o...E.5..W.......M).....@.....K....~.t(.y...T.S......6~..hx..~w.=..d.3'.............4....4........Double Note.Craft Edge.Music................. ...`.........Double Note.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..ML....}..v.n.Xy..iS..h<j8.1x.111.x0^L..M.zQ.&..$....1..'.....H./@)..R.ei;...o.R...:...v..<;...4.Q.B...-u....p..`..`..@....p.\+.cB..,................ ...099.o...8.<.B...(^.x.....e1!.J.099.@ .@ .`0
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 670.488708
                                                              Category:dropped
                                                              Size (bytes):77426
                                                              Entropy (8bit):7.644517291394499
                                                              Encrypted:false
                                                              SSDEEP:1536:3tRKxIbZjmpsrGj6q+RZFHMqxU9pSKi2RWscqh8Pi7Bs:3tR9bZycVlxzKnv78Pi7a
                                                              MD5:39DC4CE3E509EE530E2EC97E03E227D6
                                                              SHA1:E60B00E89197208BE2D9CF8F3C6C8661FBDEAED1
                                                              SHA-256:5296290ACDD86B7DABEAFABC26D0EF6FDD1A8DD9EA2914F036B94D0AD115B973
                                                              SHA-512:39711AE42F87C3E3B0E17A8378EFE05C416BA4D1895FF6F6E718B384D5C7699C318FF36CF420DCD480094EABCD9F07672ECB1FE3F4A3E64E8EF6C6450A010BD8
                                                              Malicious:false
                                                              Preview:BSCAL.....................p..................!...`#..[.....1... ...yR.......Ya.......0{..........|....j.... ........ .......&....B...07..DSCAL.................................QqI.;.`.....h...'I.T.C.:...L.;..F..U......k=R.iW...O.!..YY.P.0..p..c.........P...z..BWn ..q..{V....m....q%.I....?...C...........7....7........Winter.Craft Edge.Miscellaneous..........;.....;....`...............................DSCAL..............................,..)K.9......Z..3..-.R(.>..dq.............|n=r]M?.O!v...2..4.A..$...<'j...U..N.Wlm0.d...m..Z.B<?.f..GD,I..8*..S.........\.@rt..........@....@.... ...Gingerbread Man.Craft Edge.Miscellaneous..........;.....;."..`.e.......Gingerbread Man.d.d.H....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..y|.....3{%....IHB.H.g#..?.". ..V..?....Z.R<....`+"".....!}!^(.@...!!..9..v.....H......dwk}...\3..~..g.EQ.~.g.z...b.Z................ **...T........K.=.#.)++.w....O.=.GD.?a..z.....Zl...V..&...3u..n..w$$$x..\G...k..<..Br..I..H......\
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):211380
                                                              Entropy (8bit):7.37236649718158
                                                              Encrypted:false
                                                              SSDEEP:3072:IOT3BfdrN6I+0ZQ/yYLtpAYVZy72KKkhaQ3iBbuRb4yVgwNefQd2Flx4wL0wT:1RFrN6I+02yf2KkJBOb4yVlefQ2FnT
                                                              MD5:5D5EAAC4FAA75CB7478198FEC28895CC
                                                              SHA1:D7FC225DE85266FACABF314B166C957FF35EB122
                                                              SHA-256:032B715FDE24B59BE882D379968C681AF09F0B15E9F42A9C55B8A668D78A36C7
                                                              SHA-512:DA90291D9022BADA837498A501DAC94414EE2B9A59724C7ADC656EDEA6FC8EAA060981B29ACFB92BC4BBFD358CAA6F379EB6C1B89510F2062E53B96A23888656
                                                              Malicious:false
                                                              Preview:BSCAL.......................7...............L....e...T........s....,"......./+........8........?..8....JH.......ZP.......P\.......~f.......wo..K.....z...............h........D...h.............g...U*................:......................'...:....a...)........ ..... ........+..X.....5........<.......JF........N........X....... `........k..e....Fv........|................n...a............[...W.................................j........n.........a....W...........n..........................e........).....&..w.....1..0...DSCAL...........F.....................P.^.C...Cj.;.K..S...n..g>.7.....&....."o.6Zn...s.C...#.C.g.....F.l..!....k9..X..A...SA.....hM...3..B1j@.]+...Q..M.?.S...[ .........0....0........USA.Craft Edge.Geography..........;.....;....`...............................DSCAL..............................J.T.R=k.x..&.....B....#.Y#.M....zY.o-.8s.iq.1 .Sc..h...:.i+.0_.Gh.{..N/......k%...G&..M.?.1R..W2ij..s......jx9..z5d..=4...A.P.H.........4....4...[....Alabama.Craft Edg
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):132558
                                                              Entropy (8bit):7.669771822889911
                                                              Encrypted:false
                                                              SSDEEP:3072:aqP0FOHIgQ/1E8d9ko/te/O+MFgriBmVdQIKgaKKHEZkiIZR1WjA/sBf:3P+Oogc1EyO8t4LMFgri0/3EPnIsEf
                                                              MD5:E6497DA72921573C22D29C664B5C1EAA
                                                              SHA1:5D2F7BBC3E94BDCA08B9DABBE47CB4762024FCB8
                                                              SHA-256:17BB9F3422F532DDFE5D6C9602E9E49BE765E4848ACA1C191CF0484B0092AB59
                                                              SHA-512:1090C1B1D4005725DF62A20D8D4D68E0B561E7A285104CBD99F42E16A170A1BA8A2452F05162212D05683264104DEE3F504C90CE38033A393E92B62427397562
                                                              Malicious:false
                                                              Preview:BSCAL.......................................f....h........3...a.....2.......}F..f.....T........f..X....)t....................*.......S........L....8...Y!........'....8..h$....]........r.......u...#........_........x....o........Q...V........'...DSCAL.................................6.I6{..tr....W....zY..2y..?>..4.....'...o.h.]..:....)f..c>t.<.....]..M..H..R...\..S?P..[....u.~..+ ..B.HR.....N....@..U.i..........0....0........Swirls.Craft Edge.Shapes..........:.....:.6..`...............................DSCAL..............................ix.0.X]..Sv..5....k.#.m|i.7..9.@q...:..``.=...p...0..8....n.q...@..cTgu...q_&...ib.q..O~\...S..........[a/S.E."...B\.....N............7....7...r....Flourish Sm 1.Craft Edge.Shapes..........:.....:....`.Q.......Flourish Sm 1.d.d.6....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..MHT]....C..VcX.Z...A.$..."k....A.B...}P.F...X$4ML..I..h..?.0....%3S.?...y..s.:....}.....s...?.8..9.suDD..0,....5.......W...#.(.B..p8(**.....{..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):92038
                                                              Entropy (8bit):7.7200406826946235
                                                              Encrypted:false
                                                              SSDEEP:1536:ca4Jw4jmV7T35O0vMSndbJMZSMSU514ph64P8beNFbWmGINBU0Od:ca2bmh35rkmrU5f4P8beNhhG0rM
                                                              MD5:E98226F38153CFBF93BF77744E364434
                                                              SHA1:6E613678B12144ADAA5ADCC18AA40965EB903101
                                                              SHA-256:825F3BA18ABDFA2164FBC1D183D8C1C178C9D99C3C4B694AC358D833A755D241
                                                              SHA-512:228B1334D11F455EC6610DB53E36BCC2D747975EB5E8D650D41C92FD856A34E266ACE5A8A094FCE407E518EF76B6E0B00C983A0CDCE2B930B2222E16A4B6A5CD
                                                              Malicious:false
                                                              Preview:BSCAL...................................................../+.......'G..\.....]..9.....s..~....:...^.........!.......X%.......7....4....!........?...qX......DSCAL..............................jy.l.j.;.\o..`P..a...c._.u.`....Gm2)T....^........$y..V............2....b&..?o....u.9...*.Zj.VT.J....h.C....!..B..jE..GP+.ewI.........0....0........Spring.Craft Edge.Shapes..........:.....:`c..`...............................DSCAL................................Q].........y....n%.3.Q.ky......{.`.P-P%.p..-TjNI..{-92...Y./.....N...!D...g....r.84X...M.....2h...b.^l.0P......}c...(...............7....7........3 Leaf Clover.Craft Edge.Shapes..........:.....:!T..`.f.......3 Leaf Clover.d.d.K....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..yX....?......3 ..z..j.".Rn.1-}.....Y.Y..R..-TvR,.5....4M%....f....I.......f.af...|}K...a.>.....}...|.^..I.A.h.o.6..-...A...A..yc;..7n.`.-l......^..dA......&..P....?0l.0.....e..4.N=''.7?x.C....-C.C..(@r+..(....k...S.23m&....34
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):66594
                                                              Entropy (8bit):7.800838697373916
                                                              Encrypted:false
                                                              SSDEEP:1536:bOqndgG+IQ32TpUJz0DXmKTmg9usUFSZVl:bvQ3216zuXlFZVl
                                                              MD5:DE2D8D73F85285535A13F89B0F904847
                                                              SHA1:A4A42EB9FA7F9C8A51CD24560D999163DEE57290
                                                              SHA-256:306F7E5AFA1685939708DBBDAC6A0DD91DFE7C106BA6F84780BE9E44656B775B
                                                              SHA-512:CD1E87D933E8E821769721A1B03E244655D519722329E114388FD5E18F4DA57DAA7D2E769379C4938BA8F958AA71A87FD1DA194967A57EF5B94AA3347ECB8D29
                                                              Malicious:false
                                                              Preview:BSCAL.....................y...............................>!..M.....-..&.....I..).....Z........y..H......................}.........................DSCAL..............................4..a.A...;..l..0=a..S^[{.. ....D.2R..[N.HFm.qA%.D1E..<..~....i...e....R....O...`@...{P.....PAn|...J.......'I.4|0.....]H..I!D..........................Game.Craft Edge.Shapes..........9.....9....`...............................DSCAL....................................V.%....w$..g.....n..p.~......5W...Wi;..O.-.T..6T.,...(*..........*.......l<|....<...A.F_......`..).v.;....:.Q.........................Club.Craft Edge.Shapes..........9.....9.7..`.........Club.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{....?.......rY..0.PX..X.07...\.r..Fc.. .0.$>....ZIU....h..(r....-., ..B..X.X.1;....ced....L...g.t......9.....;..y..(..|7..466r..a..9..'.4..02....X,.......`.aD".<..g.. ..g...x..j.ne....E$.A.$<...<...q\$ID.....$Ix..e.$.I..(..g.iL.<........|.....q...x..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):81816
                                                              Entropy (8bit):7.707519991934002
                                                              Encrypted:false
                                                              SSDEEP:1536:bsicsYedzR8eO9gKbvL2aiWqAIqwsoxlprW+DWu8UYHI7zoZ8jPy74RSBsZ:7p/dG9Bbz2DWqA1w7jKGWY3oujfRSBsZ
                                                              MD5:4C1F9B5ECF86DC7B839BF5D8F3ADFDC0
                                                              SHA1:CC6D1748BD0FFBB9036C0D871EC894E59B1CD6FC
                                                              SHA-256:F2A2A3C04FB8E6E9467A62B408F705D77C9A4269B2ADF5EC1947A871A0D1C4F9
                                                              SHA-512:C49470EBA77A8616E7CE32CFE8DA98010635BDA0046BD8904328D11777162DE9774635F20627A772F24719DA3C7E217CDEB8A8ED41BBD71B04C722D6F0E217AB
                                                              Malicious:false
                                                              Preview:BSCAL.....................y.................#..............%..F.....D...(....m................X...x........q....A...`..................%...H...P$..DSCAL.................................`..xG{0.G.N.X..)_...j.QW...K. t.{.L..!'.%=.....I..bE..|&..N2..!..s..c..x6..../D..c.=FEY....J..7.V.Q...>j..:.B......5....p.........................Fall.Craft Edge.Shapes..........9.....9!...`...............................DSCAL.................................l.........H.ES..5.....P.Qo{.=...T...*-.\X.h.5|S9.<...frt..N.k.n.-.2...-.,...M......!.B{.`n...~O.d..l.5......f.V..4BZ. ............/..../...7....Acorn.Craft Edge.Shapes..........9.....9....`.v.......Acorn.d.d.c....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{|S...I.$M....By....E(.D...Zqt....yl...{.P.|.6...G......+.V@..@'..h...B.i.4..q...!V..7.....49.{.o...{.2A........@._G...H..'.i.............].kF....W......@.dP...=QT..<8y.o.."..&.^Haa!3.N"g......w{..mJJ.."%%%h..V....g.sS...d.D...t..j.S1..k!UUU...'..7?.F
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):595545
                                                              Entropy (8bit):7.0713050562667386
                                                              Encrypted:false
                                                              SSDEEP:12288:fTBZLFkAEYvIfNLmu2cTbZqSNTuh4kMjBUJ84Ch9ycd8sl:f7LgLF2cbZtNT+sjOJXCrgsl
                                                              MD5:3695D419AA9C7B11C464BE2A58A40530
                                                              SHA1:C73513DF0555DB421EF81EF436136E53CCF4EE11
                                                              SHA-256:0487C6C64C185AC5BF459A907F302E363E5A162081B651570E691B3EA07818DD
                                                              SHA-512:54883F5E76E2208856F07DC16C9E5BCEA3ACBDA7C4B9CE48BF043CC371AD57F2925DCB6360CA85F5725609FC692906546B6E5BF70D8F839A206E06316C9E2F59
                                                              Malicious:false
                                                              Preview:BSCAL.......................2......H....(...........w....r...&?........E...cI...2....|...D........!................."....#...)....M...2............c....-........"........X...JW...*.......4........+........n...BQ..."....s...5...U...5/........@...8....M....f...2.......d*...a........1....+...3...j'....D...,...Kq.../...(....!.......b....H...~.........-...u<.......{R..r.....j..@....-....B........*......../...."..\$....G........`..].....y...(.......5............k... "...........DSCAL..........................@......d33....^m...n-.C0O.i.!w.2G.,.".).22...S...V.P...~).......PJ...._..q..7.4..l...}.........^M.rY......".L..+...|.X.....)...i..B...+~i..s.82.X........x.9..(M..L.........J....J........MichelleMyBelle Creations.Craft Edge.Miscellaneous..........;.....;B...`...............................DSCAL..........................@...c..#33....^m...n-.C0O.i.!w.2G.,.".).22.F..`m`..XJh9u..pFdCp%.R..9z.n...Qe.. 3.{,"....,`.9.+.5.D........vr..72#..s.U.y"[.6...h.3M. 2O..x.f.Ah.`.L.9...
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:DIY-Thermocam raw data (Lepton 3.x), scale -20926-24706, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 500970464867410926013250174713856.000000
                                                              Category:dropped
                                                              Size (bytes):56822
                                                              Entropy (8bit):7.651463699422176
                                                              Encrypted:false
                                                              SSDEEP:768:1ro+zsC5ugrZR+LeBc+m5IShs7ohcTvNg2xhMNdZ/aDIg2fbGw:pugrb+LeGvNukcTlg20V/anS1
                                                              MD5:1FF0C9489E836499DB1ED7B3417BA478
                                                              SHA1:750206AB4FBD34B17205ADF33710F91140323915
                                                              SHA-256:74A96CB715FB81EB958BE3DFB60AF0C716D6CB0EF7DD1F5217CD15594DC3F39E
                                                              SHA-512:7EDE209919E3ECF80C47EBEC43207195AAC41C71F4C8398115AF2807EF07043A984086251C0A683A3F5F60AF51304D3559F9CC5385CE782FF5F6FA28B34F40B2
                                                              Malicious:false
                                                              Preview:BSCAL..............................D........................................."..+.....(........2..h....!?........N........Z..~....Vh..).....s.......L~..I.............a.........................DSCAL..........................@...yq..33....^m...n-.C0O.i.!w.2G.,.".).22..J.......F.b.So.X.D..U0.....{...~..T7..... ..t...$......$j.9"..n..g....I....*O,y.*..]..S..S,._.d......=>}.....w.k.O#...........F....F........Tags, Signs & Banners.Craft Edge.Miscellaneous.....................`...............................DSCAL...........?..............@...a..n33....^m...n-.C0O.i.!w.2G.,.".).22..\...N.Q.T..RtO.7c.R..e.Wu..i.%..h=...].L..i.M...g.....x.*b..O.2...A...eK......a=}...M...f.S..rZ.z'.cL._...;.Z....FK?gbP..x..........6....6........Tag 1.Craft Edge.Miscellaneous................."...`.........Tag 1.d.d......PNG........IHDR...d...d.............bKGD..............IDATx...MH*k...F....>.$(.h.JD.M..mZE......h!.H.......EB.%.-...QD.@.h....3w....9..<......a..._CAC.............Y..F.,.....4]V
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):64537
                                                              Entropy (8bit):7.783531894467484
                                                              Encrypted:false
                                                              SSDEEP:1536:mY9p0pAuZhUVKdEmHZt/YPBkBbnFeAHiix8qwQ1tTepK:m1EVmT/YpMT8qwQoK
                                                              MD5:B877B821FAA0514BE7D67132C026D97B
                                                              SHA1:B634758494358A2951799BDCDAA664271DFAD248
                                                              SHA-256:32BC4297D594164F7BE3753FE2328132B0562C81C5EA18AC97831AE10C707F1B
                                                              SHA-512:FD47CD1C73A83DAC589EE449D28BAC8E6AFE4D74BFBC077D670BF57A7BF141B7865BDE1F0C5179A7BC9569917ACD9967C6D173B7967442648E104F420C7A921F
                                                              Malicious:false
                                                              Preview:BSCAL............................................x.........%........;........U........].......Ni........t...........}....2............K....f...{.......y....Z.....................T...DSCAL..............................u.n.W.....|.o..K.....F'.Q^Sv..@r.9.'....B..8...g.iv`...6.<Pj....1.E...U!.........E...$..(.........wd...O.n......^.rN.m$..q.x...........=....=........Talk Bubbles.Craft Edge.Miscellaneous..........;.....;C%..`...............................DSCAL..............................1.q5..G.8&.Y.j.2c6x..Ow....L.....j...PMC..@qt...P...=.!.kE...........(...g......O.o.......o...#...i......mC..TYx|..Mf].2l...........>....>........Talk Bubble 1.Craft Edge.Miscellaneous..........;.....;C...`.,.......Talk Bubble 1.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx.._L.......W:..F..f.F. ........Vy...k.Y.....(W[.juQ7.lm-.Uk....jm].-.dk....D(.<.../_.....N>.u.9....y=.....""p.A...8.p!...0....\.cp!...0....\.cp!...0....\.cp!...9X....~..AD"...$++.999...H
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):56223
                                                              Entropy (8bit):7.675938408908281
                                                              Encrypted:false
                                                              SSDEEP:1536:/+jsHu4IMEuSznazX2TQZwm+WxhM6HMy6Z7:/ppIMEulGTuwmXhMwMB
                                                              MD5:619CA288DE840F0BEC52218DB7F2036C
                                                              SHA1:D1D5389AAE91284734F4940BD8319CFA2BC40A0D
                                                              SHA-256:C2A6D78B635CA45E316D10936EF7507B1643F4674BAA08B79FE22285EADC3966
                                                              SHA-512:4FACBC40E37F9801E9177A057D55BF236C5FBCE5397AF973B60B21C027AB258FD1A91B893F93AE3100A6785AD67089FBF623C121B7D4990A987A311E47314E5C
                                                              Malicious:false
                                                              Preview:BSCAL...............)...............................................$..G..............4........=.......~L..`.....U........n........y.......T............O....W...%....|...b............z................DSCAL...............................|.1..%.[.B=l.8....I9s\QP2..?..U.G....."....7..[d.b...6.,J]./;[.{T....*bV....$G.M......../T..5y............w.5.y...N...:.,.y..k.........0....0........Arrows.Craft Edge.Shapes..........8.....8"...`...............................DSCAL................................ u..d[........P.[..Y5eD..w..s.5~.._.Ev\.,o...E.......}5..3J..6.6E<W|.....6.[..s..... .@zc.X.f....I.........R.f..x.T.....A.........1....1..."....Arrow 1.Craft Edge.Shapes..........8.....8....`.........Arrow 1.d.d......PNG........IHDR...d...d.....p.T....bKGD.............AIDATx...KHT{....c.$......l..g(...DP..4.@#h.Zd.,.!Y..R8.P..&.EFa..I.E....K."....t..v.v.uG...2.....A_..9z,B.4....Po@|O.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(&,...v.......C..Phii....7o.P[[..h......
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):96301
                                                              Entropy (8bit):7.809129886497833
                                                              Encrypted:false
                                                              SSDEEP:1536:dINDJFcDGljnsSvjgSyRFLcqIqE+yh319vpvKA9Z4CPOSLbnBKoIytnR2kJ7dm:iRcCBbv0SyRFByd3vFKCGSXBKTyLRdm
                                                              MD5:E82C623CE1F741A9F4FDE9DC43F23630
                                                              SHA1:C2E84F76BFC81C1789AE7BB6AEE197E186774697
                                                              SHA-256:05D668F5C491AA51C7DA93862D3E3C5843A27631BBD1C0EF8034B94080D6CE00
                                                              SHA-512:6B51E4BE629BA85CA583A703700FD2CBFD43734BB29433BA4453CA068B767AB05B1F4084C71B22D6BF11D0B5CA73B9F4FF61A32436BA1A62CA465F1005847109
                                                              Malicious:false
                                                              Preview:BSCAL.......................................1........K....A!........1........@........O.......H`..?.....o...........d....p...........|....k.... ........>....,........L.......Ig......DSCAL...............................x..SA.{..s.g......9g]5.jB.HY.CslP...?.g(.. S/..K9#.....w\S..$M|vX.zKw/.Fl.`.`.c_=..q.......|.^a...kEX<....=..H!..t.....+.W...........2....2........Weather.Craft Edge.Weather..........;.....;....`...............................DSCAL...............................$...s....o..IsD.).8.$.LD&.,.').....,..,.x........J......I[...P..\.q...K:.}Y....... v%........*..?.n.\........L.g..2c..........1....1...C....Bolt 2.Craft Edge.Weather..........;.....;.$..`.........Bolt 2.d.d......PNG........IHDR...d...d.....p.T....bKGD.............CIDATx..{PT...(.{..q`.].EY....-...F.........Tk........F.m2...P.....'"7Q...H...#..6....\....F.\v...U>3........<..s.s.N$.>.~R.p.RRRD[V..N0..:u2...p...Q..'.....1e.D|.m*.m{.^^^.,.o..0yyy.={...+1v.(.>..prr.e.}=.'|..1L...E.*..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):76044
                                                              Entropy (8bit):7.781593198930996
                                                              Encrypted:false
                                                              SSDEEP:1536:9zCUsvuDmEm7KAaAJB2x56SPCwlkmsKpUaYVRMguAIXSA2:9z/s2Vm7KAajfl/sKpUaYVRM8YSf
                                                              MD5:FA20A58E0C27D4DED87150AADDBB2556
                                                              SHA1:74CF094D22A5806FD0DF01701851309CA3D3F263
                                                              SHA-256:A047FE59A6C64A6C17B887934245E64DAB2CDA4925B259456596C2C597740D75
                                                              SHA-512:3E1C65AD1FB8728724FEFCB8601918BEABCFBF4DC31AE17BC5BAD66BFA32DB184950AC077B0B27AE399A4B3A6B5890AAB325805F4444CDF07C4D216B7FDA4EDD
                                                              Malicious:false
                                                              Preview:BSCAL............................................l........"#........;.......iY........h..b....gz...........S....r...'.............p........=...^.............D...N........z...DSCAL..............................{.I..T.......\..?....;....X.+$g.=.7|5..G.N..X....v.eo.@.[...9.*>E.Y{..}[......w!j+..vy.8.p...w..&......I..B..s.W..\.G..f........../..../........Newborn.Craft Edge.Baby..........:.....:@...`...............................DSCAL..............................}.r..@.1.R...1H...Ul.A.k......~...l.[.J:E.X.".d(6J.*.....r..P....X.....I.j,.72Gcd$......>Xd.y,.[.e..zP`..$I......g5x..MhG.........................Bottle.Craft Edge.Baby..........:.....:. ..`.g.......Bottle.d.d.S....PNG........IHDR...d...d.....p.T....bKGD..............IDATx...Kh.k...'1*..I.1......QIM.X.."n,...*...U(RQhA..........Ru./XKI..N5.....g!...j&.s.~.N2....\.!.""..G....d2x....`.m.a..*..=@%..;.......btt....8~...*C.u..Mjmm....o?......&.u...*.. .iR4.......d(.......|.z..%. ....(.J..^.ze.X.p
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):132979
                                                              Entropy (8bit):7.662743912764236
                                                              Encrypted:false
                                                              SSDEEP:3072:viQWV2mUue1Kkp5F8U4rpAzmYDbUabHidS42O9mR:vTWa91dFr4rpwnUTdF2O6
                                                              MD5:F88752DB58C53A82F2DCD5D11F8233AB
                                                              SHA1:6D41999B017AD74783339AD00E03811F48A60E97
                                                              SHA-256:8B5AD9F2E46D3331989887761AFB6C3C7786BCA8D846444BF2FF234FD4E0E2DD
                                                              SHA-512:86350CC5DB773D092BFBDCB5710E90391ECE9D243E16706CD17E62197683520478FD32C2D4036DF45AF9326F59BF263A7FF7E56C662BEC5AA3960F6328852A00
                                                              Malicious:false
                                                              Preview:BSCAL.......................-......4........S....:.................!)........6.._....C<..>.....D......./S........\........b..i.....z.......W........j........f...-.................I........v....c...9......................J........*$........0..r.....;..&.....G..B.....M........Z........^........b..x....%v...........o....U...W................./........U.................;......................p................. .................a.......DSCAL..........................@...5.2N33....^m...n-.C0O.i.!w.2G.,.".).22.............a{[X ..N.>...{.,.W..0...{.]F<{a<f~....+.=...sj....M.,.<..z.(~.V.2|i....{j.(..C.'..`..]......R...Ex2...H.N.............6....6........Basic Shapes.Craft Edge.Shapes................."...`...............................DSCAL..........................@...3..k33....^m...n-.C0O.i.!w.2G.,.".).22|..B..[k.3..Y.....B..q..}4..X<.96H.. v..N...Nr......@......ss#%.\.:.g.3..4..$.e..3...3.....bd..c.<:.....L.t..... ...y.Y...................F....Arch.Craft Edge.Shapes...........
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:ISO-8859 text, with very long lines (912), with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):5420
                                                              Entropy (8bit):4.956744606432396
                                                              Encrypted:false
                                                              SSDEEP:96:KepTimpPqWVrKXkvP68rHIXzicpOcGlg53IXxnX1DB64aL:K0ThpP5gkvyEHQzLpOcMg53OxlDB648
                                                              MD5:89137911F2987C15370269DF851479BC
                                                              SHA1:603CFB36D56A9E7D2019254BC8AFD5AD7017673E
                                                              SHA-256:0E550CDC9D4172183102F9B9BE0952F82393006C01CD5936444787EDE2F663EA
                                                              SHA-512:3140210CA44250388D983D5620AF1C6853F2117C59DBA452478B184D525AFF7E54ED95C3BDE64D6208AC5EC3F9F3801CB53F50148F8EF1546892422CA4BBED3D
                                                              Malicious:false
                                                              Preview:Easy Cut Studio..End User License Agreement....Please read this License Agreement carefully before proceeding. This Agreement licenses Software to you [either an individual or single entity] from Craft Edge and contains warrant and liability disclaimers. By installing, copying or otherwise using this Software, you are confirming that you have read and understand this Agreement and agree to be bound by the terms of this Agreement. If you do not agree with the terms of this Agreement, you should not install or use this Software.....1. Definitions.."Software" means all of the contents of the files, disk(s), CD-ROM(s) or other media with which this Agreement is provided..."Use", "Used" or "Using" means to access, install, download, copy or otherwise benefit from using the functionality of the Software in accordance with the Documentation..."Computer" means one central processing unit (CPU) that accepts information in digital or similar form and manipulates it for a specific result based on
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1669
                                                              Entropy (8bit):5.015582857937245
                                                              Encrypted:false
                                                              SSDEEP:48:4WFF/9Vd4tOsxOG037++Wi3ai/K/pqcMZxLfMyuVyI1:xF/PmOTS+V3aie1S7Mr1
                                                              MD5:819E0C5D20AF24006EC534274A71D4B8
                                                              SHA1:2AE22F4DCB8AA2CEA89CCA69E70C5C4AABF11A79
                                                              SHA-256:2884EBC96851AB8C3123D2ACBD121D9A8FF56CC577FF5B4FC385BA77C64136D2
                                                              SHA-512:774CAD6F30D3C59B23936119092B0DA9F4BB38534831FA4121E6CDF2EB223EAAAADCEC2084CDE912AEB139967A50970B790BA2055200B6FA36DBE380B7C21CC2
                                                              Malicious:false
                                                              Preview:Easy Cut Studio 6 Read Me....1. General Information..Easy Cut Studio is the world's most popular sign-making and vinyl cutting software for vinyl cutters and cutting plotters.....- Works with your installed TrueType & OpenType fonts on your computer...- Full control over editing and cutting your artwork...- Import various file formats, including SVG, AI, WPC, GSD, EPS & PDF...- Drawing tools to draw and edit shapes...- Easily place text and objects on bezier paths...- Weld overlapping letters and shapes together...- Select styles, including Shadow and Blackout...- Auto tracing feature to automatically convert images for cutting...- Various special effects for text and shapes...- Create rhinestone templates and lattice shapes...- Print & Cut (Contour Cutting)...- Cut additional shapes from the "Easy Cut Studio" Library...- WYSIWYG Interface - What you see is what you cut...- Save your design layouts, so you can save your work to allow you to make changes over time...- Works with Graphte
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1142272
                                                              Entropy (8bit):6.575328533778386
                                                              Encrypted:false
                                                              SSDEEP:24576:JjNy0cphFIlPXI9RTczazoP2l0iS65WQ1jGb8JcBCu98xvtQ/U:JY0MhO+louaizR1jGb8iBCu98xvtQ/U
                                                              MD5:21CF2233F94BF81E22737E2CAE984FD1
                                                              SHA1:428951E7391B7CFCA62624C11E24B361CAD9D2E0
                                                              SHA-256:FCB2DC122AD93E88AA07B99DB1292CF5B8F04F7F5125C7A9AD98E8790E0F7366
                                                              SHA-512:F033174BB79D1F0E9D23FBE983A5D5849AE7CC99BA52D7CB5480F55F25CDDAE0EADE184FBF7DF970DE39B6FA315A049A13234D8379C72DC5AE2E8DDBABA13772
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t6.&0W.u0W.u0W.u9/|u.W.u9/mu.W.u9/ju.W.u...u:W.u...u'W.u0W.u.V.u9/cu.W.u9/{u1W.u..}u1W.u9/xu1W.uRich0W.u........................PE..L......T...........!.........N...............0...............................P.......c....@..........................b.......B...........1......................./..pq..................................@............0...............................text... ........................... ..`.rdata...5...0...6... ..............@..@.data...\....p...l...V..............@....rsrc....1.......2..................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1305600
                                                              Entropy (8bit):6.804982979697153
                                                              Encrypted:false
                                                              SSDEEP:24576:emdh6XRecOlYMksUqYMSMvm+YNqwngZRa5R+joLzydTEfCSoIkNyi220BTpdAd:emdhnc3lgZRa7+jo6YR8eXBT3Ad
                                                              MD5:6330B1294C40518F7C6363F97338A0A9
                                                              SHA1:350E07281719E55659F74884387FA072C0D53F52
                                                              SHA-256:4D100667AD119AD52D1172173C97EB9EC30B7C378070DFD2D07A2A04767B4D86
                                                              SHA-512:97E1D71881663496011E5B3D70E817D62EB39CD484CB091A633D6329BFF2900029B04D0086358A522C3BFDA187FC7AEBEEDACC16003FCD2937DF047A89D4E54F
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~.3.:.].:.].:.].7.....].7.....].7....]..3..3.].:.\..].G....].G...;.].7...;.].G...;.].Rich:.].........................PE..L....g.`...........!.................o.......................................P............@.........................p3.../...c..d................................w..................................P...@............................................text...@........................... ..`.rdata..............................@..@.data....8...p.......Z..............@....tls....)............p..............@....rsrc................r..............@..@.reloc...w.......x...t..............@..B........................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:MS Windows icon resource - 1 icon, 48x48, 32 bits/pixel
                                                              Category:dropped
                                                              Size (bytes):9662
                                                              Entropy (8bit):3.094437085779786
                                                              Encrypted:false
                                                              SSDEEP:48:9TCyyyyyyyyyyyyyyyyyyyyyy6cm42Et3YgXvv1D+dHHud9W7EJoQNgR/vq7rKvs:9Nc/lDNzEOoQm/C7rKvMWi97V
                                                              MD5:13E0BBCC5841FC0EDBCDFF9045756F0E
                                                              SHA1:F5358A85C3CCEEF7D78F71BDC687F6DA7C29A43C
                                                              SHA-256:83826F74E2A4D0A6D13F8215D7F90F2C50BB4A148DCCEF7E76C0E4FA48548ADD
                                                              SHA-512:21B70BC72E2C7648A368FBC40E39D53D87B432760C1C42D1E15F3E1312776E17343B6CE8A59E48902A1BFBB6992C475E0425938B707C9870070774C7E581433B
                                                              Malicious:false
                                                              Preview:......00.... ..%......(...0...`..... ......%......................................................uuuJ\\\.YYY.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.YYY.]]].uuuH....................................................................vvvE999.................................................................................................................:::.xxxB............................................................tttO................................................................................................................................uuuJ....................................................sssP===.....KKK.................................................................................................................JJJ.....???.tttM................................................___.........................................................................................................................................aaa...
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:modified
                                                              Size (bytes):4320256
                                                              Entropy (8bit):6.643044428314729
                                                              Encrypted:false
                                                              SSDEEP:49152:tNKVmL2fbrwtT6O4QwUc37eGQCs10CbdLBv5ci4:tNSmL2fkT6O/wUcjrs10Cb5B5ci
                                                              MD5:3E5665842EDF692C5DA51975BEA8BE54
                                                              SHA1:DF865EFAAA7DE117B983588FEFD7474053CF3BFF
                                                              SHA-256:21E988AA820894FAEB5F57171734501A444BE9AC2758A2B17BCC9A4B677BA495
                                                              SHA-512:75B721CB68C254C6BA26D82CBBB38ACE5928A386D5428F651E56734A1A70DE55C315378E8BC2D95B26F90B51095229E1CE5F239C177DFF1204E31D18CC4A486D
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 88%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......L..........'......."..*........".......#...@..........................@B.....e.B.......................................#.......#..............................................................................#..............................text...Z.".......".................`....rdata...2....#..4....".............@..@.data....T...@#..2....#.............@....rsrc.........#......L#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PDF document, version 1.6 (zip deflate encoded)
                                                              Category:dropped
                                                              Size (bytes):1360891
                                                              Entropy (8bit):7.974159148087012
                                                              Encrypted:false
                                                              SSDEEP:24576:F3ZH1hmhsjpGswgZZa6exedw2LulKWDHr9TJ2kRoMKEWt4KNucL8jgJL:F51EhwGEZZa6rEKWbrKkeF94K3LvJL
                                                              MD5:C871E4C9E9C0FCFE60CDB675B89A1501
                                                              SHA1:A6BD175BAC7305296A16F3F3D0E48CD98249DBFA
                                                              SHA-256:714BDCDFC56A37194012D78F7CF064E1E36ED228341230CC8318A1F1EC65F8E5
                                                              SHA-512:A4EA4A68B74137317761325D79AC1A3BA22FAD0A078633C9FB8B823E639B0E7F530033ED35265C08F4CDD8C5D3777371AF3A87309B3A6F96C94A2D57077E132A
                                                              Malicious:false
                                                              Preview:%PDF-1.6.%......1360 0 obj.<</Linearized 1/L 1360891/O 1362/E 89624/N 71/T 1358784/H [ 480 892]>>.endobj. .1369 0 obj.<</DecodeParms<</Columns 5/Predictor 12>>/Filter/FlateDecode/ID[<199AD1A9301D48F38B5B5CB1F220F56B><F1B8847A9F1144D5AC18C33BACE848B0>]/Index[1360 19]/Info 1359 0 R/Length 69/Prev 1358785/Root 1361 0 R/Size 1379/Type/XRef/W[1 3 1]>>stream..h.bbd`.``b``..... ..-.d....."'?...;..eAj./......z.....(.?.......!...endstream.endobj.startxref.0.%%EOF. .1378 0 obj.<</E 1066/Filter/FlateDecode/I 1082/Length 787/O 1028/S 899/V 1044>>stream..h..S.KSQ.?....kmm.R)-.Y.....'M.[.m.......r..!1e.*.....9.b..z.-V......a_]..b..6...z..s>.....;.@.....P..G........%.8..a...bm...i..`...zyM.PY.^..c[.....S.,.j %.....uc.mW.a.]........;d...'..G.+.|..7..2/..5^*..9.y.y..dV..gSy.F+9..>.x SH.........s..6=.yuAW$.\.i.k?RP.....8&.u...&.v[S3Qv}..<.}.1T.......*x.b{y...y...E.=x.........7.40...,....}..I3...MEAZP..[..ONEd.2.B...&$96L*....g$e.-n.....)a.[........D......T.6..
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):237936
                                                              Entropy (8bit):6.776166825916798
                                                              Encrypted:false
                                                              SSDEEP:6144:oLUeZ7KbhLZvCpadLienYHWQ848hBk74T5:oL7sPdLi7HsFT5
                                                              MD5:19FC40297C9E3D52079BDAFBC5EB37A3
                                                              SHA1:6CD28252CBF7308DCDFB15AF337F26D06BF3161D
                                                              SHA-256:71F76548B10974C46B69063DC7EE9D3C19DD3FEC408C7720DEB00C9FCBDCC0A7
                                                              SHA-512:A1435A9E2040FBC0470E701633FBD7B3619BB0ADEEA2ED841813F888E9413827AD316A04D11E46B33AC1224A253C3D92F01809F481B8A1871D2C184526B958E8
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..........................................V...............................................Rich............PE..L......<...........!.....F...H...............`....-..................................{..............................p....4..p........p..@...............p.......t4...................................................................................text....D.......F.................. ..`.data........`.......J..............@....rsrc...@....p.......L..............@..@.reloc...5.......6...R..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1305600
                                                              Entropy (8bit):6.804982979697153
                                                              Encrypted:false
                                                              SSDEEP:24576:emdh6XRecOlYMksUqYMSMvm+YNqwngZRa5R+joLzydTEfCSoIkNyi220BTpdAd:emdhnc3lgZRa7+jo6YR8eXBT3Ad
                                                              MD5:6330B1294C40518F7C6363F97338A0A9
                                                              SHA1:350E07281719E55659F74884387FA072C0D53F52
                                                              SHA-256:4D100667AD119AD52D1172173C97EB9EC30B7C378070DFD2D07A2A04767B4D86
                                                              SHA-512:97E1D71881663496011E5B3D70E817D62EB39CD484CB091A633D6329BFF2900029B04D0086358A522C3BFDA187FC7AEBEEDACC16003FCD2937DF047A89D4E54F
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~.3.:.].:.].:.].7.....].7.....].7....]..3..3.].:.\..].G....].G...;.].7...;.].G...;.].Rich:.].........................PE..L....g.`...........!.................o.......................................P............@.........................p3.../...c..d................................w..................................P...@............................................text...@........................... ..`.rdata..............................@..@.data....8...p.......Z..............@....tls....)............p..............@....rsrc................r..............@..@.reloc...w.......x...t..............@..B........................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1142272
                                                              Entropy (8bit):6.575328533778386
                                                              Encrypted:false
                                                              SSDEEP:24576:JjNy0cphFIlPXI9RTczazoP2l0iS65WQ1jGb8JcBCu98xvtQ/U:JY0MhO+louaizR1jGb8iBCu98xvtQ/U
                                                              MD5:21CF2233F94BF81E22737E2CAE984FD1
                                                              SHA1:428951E7391B7CFCA62624C11E24B361CAD9D2E0
                                                              SHA-256:FCB2DC122AD93E88AA07B99DB1292CF5B8F04F7F5125C7A9AD98E8790E0F7366
                                                              SHA-512:F033174BB79D1F0E9D23FBE983A5D5849AE7CC99BA52D7CB5480F55F25CDDAE0EADE184FBF7DF970DE39B6FA315A049A13234D8379C72DC5AE2E8DDBABA13772
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t6.&0W.u0W.u0W.u9/|u.W.u9/mu.W.u9/ju.W.u...u:W.u...u'W.u0W.u.V.u9/cu.W.u9/{u1W.u..}u1W.u9/xu1W.uRich0W.u........................PE..L......T...........!.........N...............0...............................P.......c....@..........................b.......B...........1......................./..pq..................................@............0...............................text... ........................... ..`.rdata...5...0...6... ..............@..@.data...\....p...l...V..............@....rsrc....1.......2..................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:ISO-8859 text, with very long lines (912), with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):5420
                                                              Entropy (8bit):4.956744606432396
                                                              Encrypted:false
                                                              SSDEEP:96:KepTimpPqWVrKXkvP68rHIXzicpOcGlg53IXxnX1DB64aL:K0ThpP5gkvyEHQzLpOcMg53OxlDB648
                                                              MD5:89137911F2987C15370269DF851479BC
                                                              SHA1:603CFB36D56A9E7D2019254BC8AFD5AD7017673E
                                                              SHA-256:0E550CDC9D4172183102F9B9BE0952F82393006C01CD5936444787EDE2F663EA
                                                              SHA-512:3140210CA44250388D983D5620AF1C6853F2117C59DBA452478B184D525AFF7E54ED95C3BDE64D6208AC5EC3F9F3801CB53F50148F8EF1546892422CA4BBED3D
                                                              Malicious:false
                                                              Preview:Easy Cut Studio..End User License Agreement....Please read this License Agreement carefully before proceeding. This Agreement licenses Software to you [either an individual or single entity] from Craft Edge and contains warrant and liability disclaimers. By installing, copying or otherwise using this Software, you are confirming that you have read and understand this Agreement and agree to be bound by the terms of this Agreement. If you do not agree with the terms of this Agreement, you should not install or use this Software.....1. Definitions.."Software" means all of the contents of the files, disk(s), CD-ROM(s) or other media with which this Agreement is provided..."Use", "Used" or "Using" means to access, install, download, copy or otherwise benefit from using the functionality of the Software in accordance with the Documentation..."Computer" means one central processing unit (CPU) that accepts information in digital or similar form and manipulates it for a specific result based on
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):499712
                                                              Entropy (8bit):6.414789978441117
                                                              Encrypted:false
                                                              SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                              MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                              SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                              SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                              SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):79
                                                              Entropy (8bit):4.871394476074933
                                                              Encrypted:false
                                                              SSDEEP:3:wFWWMNHU8LdgC1BEJ6MiRgLoxRY9iK:w7MVBdUgq8xRY4K
                                                              MD5:F25C7A35A68742D5DC0BCC7BB396D62B
                                                              SHA1:12CDFC54E6C8E4BD39FDD9EB429BB34754F1DDDC
                                                              SHA-256:2E7746E47AB1FEB0F5E7F3EE31B83329BF6241C64154CCE00A60F99D96D63E2C
                                                              SHA-512:E38B3A2FDDA23D06DD32779E316C15BF288E7B41BB353083FDF615D56FB246F2994CC47CAA4C7673526EA743C2CA6FC9C9F5925EFC763EEBB0ACBDE34FA5EA93
                                                              Malicious:false
                                                              Preview:<xml version="1.0" encoding="UTF-8">..<scal_install product="scal3" />..</xml>
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1669
                                                              Entropy (8bit):5.015582857937245
                                                              Encrypted:false
                                                              SSDEEP:48:4WFF/9Vd4tOsxOG037++Wi3ai/K/pqcMZxLfMyuVyI1:xF/PmOTS+V3aie1S7Mr1
                                                              MD5:819E0C5D20AF24006EC534274A71D4B8
                                                              SHA1:2AE22F4DCB8AA2CEA89CCA69E70C5C4AABF11A79
                                                              SHA-256:2884EBC96851AB8C3123D2ACBD121D9A8FF56CC577FF5B4FC385BA77C64136D2
                                                              SHA-512:774CAD6F30D3C59B23936119092B0DA9F4BB38534831FA4121E6CDF2EB223EAAAADCEC2084CDE912AEB139967A50970B790BA2055200B6FA36DBE380B7C21CC2
                                                              Malicious:false
                                                              Preview:Easy Cut Studio 6 Read Me....1. General Information..Easy Cut Studio is the world's most popular sign-making and vinyl cutting software for vinyl cutters and cutting plotters.....- Works with your installed TrueType & OpenType fonts on your computer...- Full control over editing and cutting your artwork...- Import various file formats, including SVG, AI, WPC, GSD, EPS & PDF...- Drawing tools to draw and edit shapes...- Easily place text and objects on bezier paths...- Weld overlapping letters and shapes together...- Select styles, including Shadow and Blackout...- Auto tracing feature to automatically convert images for cutting...- Various special effects for text and shapes...- Create rhinestone templates and lattice shapes...- Print & Cut (Contour Cutting)...- Cut additional shapes from the "Easy Cut Studio" Library...- WYSIWYG Interface - What you see is what you cut...- Save your design layouts, so you can save your work to allow you to make changes over time...- Works with Graphte
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):4320256
                                                              Entropy (8bit):6.643044411132289
                                                              Encrypted:false
                                                              SSDEEP:49152:ENKVmL2fbrwtT6O4QwUc37eGQCs10CbdLBv5ci4:ENSmL2fkT6O/wUcjrs10Cb5B5ci
                                                              MD5:579C6B4A6674F53C01EBD3BFEF1CE37E
                                                              SHA1:7809FB5E7E6C2736B0C251584DAC30234898A306
                                                              SHA-256:768AB0A74716ECF94D8737A0C3C59E9786B6580CC6B285AA5E60AA61BE045598
                                                              SHA-512:65479C62EC8572DFF9186B388AD3B939E75D1EC6766826B9642380889C353A28CFB6940DF77C4E430C9DF064C9558D98BD374E9182890D0F8D690A45D44FD156
                                                              Malicious:false
                                                              Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......L..........'......."..*........".......#...@..........................@B.....e.B.......................................#.......#..............................................................................#..............................text...Z.".......".................`....rdata...2....#..4....".............@..@.data....T...@#..2....#.............@....rsrc.........#......L#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):581632
                                                              Entropy (8bit):6.4401636086781
                                                              Encrypted:false
                                                              SSDEEP:12288:PoQuMsxdY0osAEI8GM44VMvjGK1Yj+/4LY5hucPS+iNnV9oEYgxn/:GVWGK1Y6/4LSXP3iNnV9oEYgxn/
                                                              MD5:815BE7DB7AD25D4B70556DE470563C18
                                                              SHA1:E896C6442F1A5250C47D71CBA9A0E25C05983960
                                                              SHA-256:11591734358F45B8028DC17DDD75E5BFB3C7D3B58EBF03F4F87A926942A1263D
                                                              SHA-512:5094E779BEB26BCDC4B1772B5BC9B78D7E2E0EB1C978538724F065375B4E99C37BB9229620A0E3068A95FA88B3237A089FF6EFAE93B5822BDF67A67179508D67
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A..g...4...4...4...4...4...4...4...4...4...4[..4...4...4...4...4...4"..4...4...4.4...4...4...4Rich...4........PE..L....1.@...........!................^....................................................................................{......P................................6..................................p7..H............................................text............................... ..`.rdata..56.......@..................@..@.data........P... ...P..............@...STLPORT_ ............p..............@....rsrc...............................@..@.reloc.."F.......P..................@..B................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):15864
                                                              Entropy (8bit):5.446150628226878
                                                              Encrypted:false
                                                              SSDEEP:384:zVQEjoZ7ooLzDCccymQx/9DSpNAJemtjf0Ncl08:zV1joxLH1SpKJtTF08
                                                              MD5:43F2BC6828B177477C2F98B8973460E8
                                                              SHA1:F0A3C975346AF66A843E8B49574DC9083CD32E02
                                                              SHA-256:3B578B15AD0D0747E8A3D958A0E7BF1FF6D5C335B8894FF7A020604DA008D79D
                                                              SHA-512:2449C3D615E5BCECE4C1B773FE629A75061A3E1488F6D3D743D7D209F1D687F26997937AB13B3A1B89B650D122DB030D2188E1E89BC1AB03CF2DF9A29CAA456C
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................l.......^...............Rich............PE..L.....C (.........!.........................0....@..........................`......B}...............................'.......$..P....@..H....................P..<.......T...............................................|............................text............................... ..`.data........0....... ..............@....rsrc...H....@......."..............@..@.reloc.......P.......&..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:MS Windows icon resource - 1 icon, 48x48, 32 bits/pixel
                                                              Category:dropped
                                                              Size (bytes):9662
                                                              Entropy (8bit):3.094437085779786
                                                              Encrypted:false
                                                              SSDEEP:48:9TCyyyyyyyyyyyyyyyyyyyyyy6cm42Et3YgXvv1D+dHHud9W7EJoQNgR/vq7rKvs:9Nc/lDNzEOoQm/C7rKvMWi97V
                                                              MD5:13E0BBCC5841FC0EDBCDFF9045756F0E
                                                              SHA1:F5358A85C3CCEEF7D78F71BDC687F6DA7C29A43C
                                                              SHA-256:83826F74E2A4D0A6D13F8215D7F90F2C50BB4A148DCCEF7E76C0E4FA48548ADD
                                                              SHA-512:21B70BC72E2C7648A368FBC40E39D53D87B432760C1C42D1E15F3E1312776E17343B6CE8A59E48902A1BFBB6992C475E0425938B707C9870070774C7E581433B
                                                              Malicious:false
                                                              Preview:......00.... ..%......(...0...`..... ......%......................................................uuuJ\\\.YYY.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.\\\.YYY.]]].uuuH....................................................................vvvE999.................................................................................................................:::.xxxB............................................................tttO................................................................................................................................uuuJ....................................................sssP===.....KKK.................................................................................................................JJJ.....???.tttM................................................___.........................................................................................................................................aaa...
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):720033
                                                              Entropy (8bit):6.522446638126557
                                                              Encrypted:false
                                                              SSDEEP:12288:sQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidbJgUHayxyFr:sQPh1eLSSKrPD37zzH2A6QD/srqggEf7
                                                              MD5:BBBE4DA1D0D53828B6301E66B4D41E33
                                                              SHA1:431616CE9EDCA6E2D30C7456150B507885EEA085
                                                              SHA-256:6F7DFF55C694C342C021ABADDB73FA38D7863A72890FAB94EB3FBA2BBBA86B57
                                                              SHA-512:3763F960B156A160BCA29967F4FECC69F8813B216E90B99E9ED948B74FADC2DA5EBC4A9742AF7894034AC3150DBBD4C38E819FF699BD0042A65EACFF4DF2E175
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):348160
                                                              Entropy (8bit):6.542655141037356
                                                              Encrypted:false
                                                              SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                              MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                              SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                              SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                              SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):499712
                                                              Entropy (8bit):6.414789978441117
                                                              Encrypted:false
                                                              SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                              MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                              SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                              SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                              SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):348160
                                                              Entropy (8bit):6.542655141037356
                                                              Encrypted:false
                                                              SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                              MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                              SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                              SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                              SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):581632
                                                              Entropy (8bit):6.4401636086781
                                                              Encrypted:false
                                                              SSDEEP:12288:PoQuMsxdY0osAEI8GM44VMvjGK1Yj+/4LY5hucPS+iNnV9oEYgxn/:GVWGK1Y6/4LSXP3iNnV9oEYgxn/
                                                              MD5:815BE7DB7AD25D4B70556DE470563C18
                                                              SHA1:E896C6442F1A5250C47D71CBA9A0E25C05983960
                                                              SHA-256:11591734358F45B8028DC17DDD75E5BFB3C7D3B58EBF03F4F87A926942A1263D
                                                              SHA-512:5094E779BEB26BCDC4B1772B5BC9B78D7E2E0EB1C978538724F065375B4E99C37BB9229620A0E3068A95FA88B3237A089FF6EFAE93B5822BDF67A67179508D67
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A..g...4...4...4...4...4...4...4...4...4...4[..4...4...4...4...4...4"..4...4...4.4...4...4...4Rich...4........PE..L....1.@...........!................^....................................................................................{......P................................6..................................p7..H............................................text............................... ..`.rdata..56.......@..................@..@.data........P... ...P..............@...STLPORT_ ............p..............@....rsrc...............................@..@.reloc.."F.......P..................@..B................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):237936
                                                              Entropy (8bit):6.776166825916798
                                                              Encrypted:false
                                                              SSDEEP:6144:oLUeZ7KbhLZvCpadLienYHWQ848hBk74T5:oL7sPdLi7HsFT5
                                                              MD5:19FC40297C9E3D52079BDAFBC5EB37A3
                                                              SHA1:6CD28252CBF7308DCDFB15AF337F26D06BF3161D
                                                              SHA-256:71F76548B10974C46B69063DC7EE9D3C19DD3FEC408C7720DEB00C9FCBDCC0A7
                                                              SHA-512:A1435A9E2040FBC0470E701633FBD7B3619BB0ADEEA2ED841813F888E9413827AD316A04D11E46B33AC1224A253C3D92F01809F481B8A1871D2C184526B958E8
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..........................................V...............................................Rich............PE..L......<...........!.....F...H...............`....-..................................{..............................p....4..p........p..@...............p.......t4...................................................................................text....D.......F.................. ..`.data........`.......J..............@....rsrc...@....p.......L..............@..@.reloc...5.......6...R..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:InnoSetup Log HD Video Converter Fox, version 0x30, 7352 bytes, 618321\user, "C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5"
                                                              Category:dropped
                                                              Size (bytes):7352
                                                              Entropy (8bit):5.019465292349253
                                                              Encrypted:false
                                                              SSDEEP:96:ShmAVPWu/8LprdJX9t+eOIhi94cVSQs0Lni2t5mjQU2tsSaXFv3f4DgGli5zYPkb:ShjPWu/gprSHIhBcVSQ1nijMsIdE
                                                              MD5:63729DCA5782CFE0CFCDC09DF05D4F04
                                                              SHA1:78589567B22A9B18596B07EB2025AD1CCDB71BB0
                                                              SHA-256:65EA838C9E34B66E91D2F87489F5E89C94CACA13168BF70863D9433EB55CFC33
                                                              SHA-512:528373403B23B36B0A46EB4E8C2D178BC5995A738A05389A20C94E1EDE4F0567311AF2327BEAAEE4DCBB8306EEFF5288AE0B26CFBAC6ED08DB10500311E586DE
                                                              Malicious:false
                                                              Preview:Inno Setup Uninstall Log (b)....................................HD Video Converter Fox..........................................................................................................HD Video Converter Fox..........................................................................................................0...'.......%..................................................................................................................J..........O......_....618321.user<C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5...........!.;.... ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess.......
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):720033
                                                              Entropy (8bit):6.522446638126557
                                                              Encrypted:false
                                                              SSDEEP:12288:sQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidbJgUHayxyFr:sQPh1eLSSKrPD37zzH2A6QD/srqggEf7
                                                              MD5:BBBE4DA1D0D53828B6301E66B4D41E33
                                                              SHA1:431616CE9EDCA6E2D30C7456150B507885EEA085
                                                              SHA-256:6F7DFF55C694C342C021ABADDB73FA38D7863A72890FAB94EB3FBA2BBBA86B57
                                                              SHA-512:3763F960B156A160BCA29967F4FECC69F8813B216E90B99E9ED948B74FADC2DA5EBC4A9742AF7894034AC3150DBBD4C38E819FF699BD0042A65EACFF4DF2E175
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):2560
                                                              Entropy (8bit):2.8818118453929262
                                                              Encrypted:false
                                                              SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                              MD5:A69559718AB506675E907FE49DEB71E9
                                                              SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                              SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                              SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):6144
                                                              Entropy (8bit):4.720366600008286
                                                              Encrypted:false
                                                              SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                              MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                              SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                              SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                              SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                              Category:dropped
                                                              Size (bytes):23312
                                                              Entropy (8bit):4.596242908851566
                                                              Encrypted:false
                                                              SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                              MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                              SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                              SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                              SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\stail.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):708608
                                                              Entropy (8bit):6.514150201170946
                                                              Encrypted:false
                                                              SSDEEP:12288:UQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidbJgUHayxyF:UQPh1eLSSKrPD37zzH2A6QD/srqggEfX
                                                              MD5:3C6AFF88C22351BCB786883117AB81D7
                                                              SHA1:F848E3560FF4343B5756F440681D4C0B9628B066
                                                              SHA-256:21BD2A3387ABB64F55D96E6D1C62F32A386D4431701BAFFC51A0282C490076AD
                                                              SHA-512:B7F9C7E24239129AC98F3D6F27CE63B95909000838CAAA5BB9DBCD6A1A65448478F3633726F01F98708C2E65D06FF5C3F086A1D2D2E5A91DBBC7E2703FF0AB74
                                                              Malicious:true
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):7.999237828973053
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 98.73%
                                                              • Inno Setup installer (109748/4) 1.08%
                                                              • Windows Screen Saver (13104/52) 0.13%
                                                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              File name:stail.exe
                                                              File size:6'228'338 bytes
                                                              MD5:5ce6dc42328ec1134eb1af7ceb781608
                                                              SHA1:8c62c89a91b5372530617d5135aa7e3a08374a21
                                                              SHA256:4519ffb96ab3e8a4746518455911475f459685fc4174251a17552f1f100c93b5
                                                              SHA512:4d0a63bd1221f1abba3456e2620d1bf8b60e17909d106fa1413d2bbf764fc643733006e84e3536d9459539f55794ba0eabd6d1cc46a657e3c96cdbbd7e670e78
                                                              SSDEEP:98304:4ZRChvOv4yzF7CW7NEwaT3/fKg2LCvkU2fxr4ZsbAqzJao8PmXKQZUX2L9JTg:0Cs35JEwaj/12OsU2fB+hqkxP6KIUGLA
                                                              TLSH:655633169D9BDC37E7D286384B3239AEB153E10868345E5C43D723AD8F66B7240DD26C
                                                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                              Icon Hash:2d2e3797b32b2b99
                                                              Entrypoint:0x40a5f8
                                                              Entrypoint Section:CODE
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:1
                                                              OS Version Minor:0
                                                              File Version Major:1
                                                              File Version Minor:0
                                                              Subsystem Version Major:1
                                                              Subsystem Version Minor:0
                                                              Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                              Instruction
                                                              push ebp
                                                              mov ebp, esp
                                                              add esp, FFFFFFC4h
                                                              push ebx
                                                              push esi
                                                              push edi
                                                              xor eax, eax
                                                              mov dword ptr [ebp-10h], eax
                                                              mov dword ptr [ebp-24h], eax
                                                              call 00007F1FA8F1C353h
                                                              call 00007F1FA8F1D55Ah
                                                              call 00007F1FA8F1D7E9h
                                                              call 00007F1FA8F1D88Ch
                                                              call 00007F1FA8F1F82Bh
                                                              call 00007F1FA8F22196h
                                                              call 00007F1FA8F222FDh
                                                              xor eax, eax
                                                              push ebp
                                                              push 0040ACC9h
                                                              push dword ptr fs:[eax]
                                                              mov dword ptr fs:[eax], esp
                                                              xor edx, edx
                                                              push ebp
                                                              push 0040AC92h
                                                              push dword ptr fs:[edx]
                                                              mov dword ptr fs:[edx], esp
                                                              mov eax, dword ptr [0040C014h]
                                                              call 00007F1FA8F22DABh
                                                              call 00007F1FA8F22996h
                                                              cmp byte ptr [0040B234h], 00000000h
                                                              je 00007F1FA8F2388Eh
                                                              call 00007F1FA8F22EA8h
                                                              xor eax, eax
                                                              call 00007F1FA8F1D049h
                                                              lea edx, dword ptr [ebp-10h]
                                                              xor eax, eax
                                                              call 00007F1FA8F1FE3Bh
                                                              mov edx, dword ptr [ebp-10h]
                                                              mov eax, 0040CE2Ch
                                                              call 00007F1FA8F1C3EAh
                                                              push 00000002h
                                                              push 00000000h
                                                              push 00000001h
                                                              mov ecx, dword ptr [0040CE2Ch]
                                                              mov dl, 01h
                                                              mov eax, 0040738Ch
                                                              call 00007F1FA8F206CAh
                                                              mov dword ptr [0040CE30h], eax
                                                              xor edx, edx
                                                              push ebp
                                                              push 0040AC4Ah
                                                              push dword ptr fs:[edx]
                                                              mov dword ptr fs:[edx], esp
                                                              call 00007F1FA8F22E06h
                                                              mov dword ptr [0040CE38h], eax
                                                              mov eax, dword ptr [0040CE38h]
                                                              cmp dword ptr [eax+0Ch], 00000000h
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              CODE0x10000x9d300x9e0004ffdb46e50716ec8cb7db42819802fdFalse0.6052956882911392data6.631603395825714IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              DATA0xb0000x2500x400beee52f18301950f82460d9ffe5aec7eFalse0.306640625data2.7547169534996403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              BSS0xc0000xe900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                              .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                              .rsrc0x110000x2c000x2c00a9fe4044bcaa2a149ddd332e2c781c0bFalse0.33203125data4.584708502037484IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                              RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                              RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                              RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                              RT_STRING0x125740x2f2data0.35543766578249336
                                                              RT_STRING0x128680x30cdata0.3871794871794872
                                                              RT_STRING0x12b740x2cedata0.42618384401114207
                                                              RT_STRING0x12e440x68data0.75
                                                              RT_STRING0x12eac0xb4data0.6277777777777778
                                                              RT_STRING0x12f600xaedata0.5344827586206896
                                                              RT_RCDATA0x130100x2cdata1.1818181818181819
                                                              RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                              RT_VERSION0x1307c0x4f4dataEnglishUnited States0.26498422712933756
                                                              RT_MANIFEST0x135700x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                                              DLLImport
                                                              kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                              user32.dllMessageBoxA
                                                              oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                              kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                              user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                              comctl32.dllInitCommonControls
                                                              advapi32.dllAdjustTokenPrivileges
                                                              Language of compilation systemCountry where language is spokenMap
                                                              DutchNetherlands
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-11-30T02:34:57.033614+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649817185.208.158.20280TCP
                                                              2024-11-30T02:34:58.665038+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649821185.208.158.20280TCP
                                                              2024-11-30T02:35:00.228636+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649827185.208.158.20280TCP
                                                              2024-11-30T02:35:01.864211+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649832185.208.158.20280TCP
                                                              2024-11-30T02:35:03.652327+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649836185.208.158.20280TCP
                                                              2024-11-30T02:35:05.341725+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649841185.208.158.20280TCP
                                                              2024-11-30T02:35:07.003734+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649846185.208.158.20280TCP
                                                              2024-11-30T02:35:07.588978+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649846185.208.158.20280TCP
                                                              2024-11-30T02:35:09.152220+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649852185.208.158.20280TCP
                                                              2024-11-30T02:35:10.717905+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649856185.208.158.20280TCP
                                                              2024-11-30T02:35:12.323026+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649860185.208.158.20280TCP
                                                              2024-11-30T02:35:13.935963+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649864185.208.158.20280TCP
                                                              2024-11-30T02:35:15.656100+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649869185.208.158.20280TCP
                                                              2024-11-30T02:35:17.259069+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649875185.208.158.20280TCP
                                                              2024-11-30T02:35:18.869673+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649879185.208.158.20280TCP
                                                              2024-11-30T02:35:20.545279+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649883185.208.158.20280TCP
                                                              2024-11-30T02:35:22.149466+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649888185.208.158.20280TCP
                                                              2024-11-30T02:35:22.719543+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649888185.208.158.20280TCP
                                                              2024-11-30T02:35:24.442259+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649895185.208.158.20280TCP
                                                              2024-11-30T02:35:25.009649+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649895185.208.158.20280TCP
                                                              2024-11-30T02:35:26.671923+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649901185.208.158.20280TCP
                                                              2024-11-30T02:35:28.281307+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649905185.208.158.20280TCP
                                                              2024-11-30T02:35:30.005298+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649910185.208.158.20280TCP
                                                              2024-11-30T02:35:30.578850+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649910185.208.158.20280TCP
                                                              2024-11-30T02:35:32.183048+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649915185.208.158.20280TCP
                                                              2024-11-30T02:35:33.983119+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649920185.208.158.20280TCP
                                                              2024-11-30T02:35:35.634165+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649925185.208.158.20280TCP
                                                              2024-11-30T02:35:37.288908+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649930185.208.158.20280TCP
                                                              2024-11-30T02:35:37.868929+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649930185.208.158.20280TCP
                                                              2024-11-30T02:35:39.479467+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649935185.208.158.20280TCP
                                                              2024-11-30T02:35:41.042501+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649939185.208.158.20280TCP
                                                              2024-11-30T02:35:42.756374+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649945185.208.158.20280TCP
                                                              2024-11-30T02:35:44.374299+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649949185.208.158.20280TCP
                                                              2024-11-30T02:35:45.930793+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649954185.208.158.20280TCP
                                                              2024-11-30T02:35:47.546586+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649958185.208.158.20280TCP
                                                              2024-11-30T02:35:49.108392+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649963185.208.158.20280TCP
                                                              2024-11-30T02:35:50.759308+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649966185.208.158.20280TCP
                                                              2024-11-30T02:35:52.367198+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649972185.208.158.20280TCP
                                                              2024-11-30T02:35:52.938280+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649972185.208.158.20280TCP
                                                              2024-11-30T02:35:54.588871+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649977185.208.158.20280TCP
                                                              2024-11-30T02:35:56.197359+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649982185.208.158.20280TCP
                                                              2024-11-30T02:35:57.930245+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649987185.208.158.20280TCP
                                                              2024-11-30T02:35:59.528205+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649991185.208.158.20280TCP
                                                              2024-11-30T02:36:01.184309+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.649995185.208.158.20280TCP
                                                              2024-11-30T02:36:02.800375+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.650001185.208.158.20280TCP
                                                              2024-11-30T02:36:04.421697+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.650006185.208.158.20280TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 30, 2024 02:34:55.536520958 CET4981780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:55.656481981 CET8049817185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:55.656579018 CET4981780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:55.657440901 CET4981780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:55.777376890 CET8049817185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:57.031182051 CET8049817185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:57.033613920 CET4981780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:57.188853025 CET4981780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:57.189296007 CET4982180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:57.309113026 CET8049817185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:57.309391022 CET8049821185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:57.309451103 CET4981780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:57.309515953 CET4982180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:57.310672998 CET4982180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:57.430552959 CET8049821185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:58.664848089 CET8049821185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:58.665038109 CET4982180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:58.788619041 CET4982180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:58.788928986 CET4982780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:58.908847094 CET8049827185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:58.908894062 CET8049821185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:34:58.908967972 CET4982780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:58.909007072 CET4982180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:58.909274101 CET4982780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:34:59.029092073 CET8049827185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:00.228415012 CET8049827185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:00.228636026 CET4982780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:00.348517895 CET4982780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:00.348809958 CET4983280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:00.468703032 CET8049827185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:00.468746901 CET8049832185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:00.468955994 CET4982780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:00.468961954 CET4983280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:00.469176054 CET4983280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:00.589019060 CET8049832185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:01.862272024 CET8049832185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:01.864211082 CET4983280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:02.162497997 CET4983280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:02.162791967 CET4983680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:02.282646894 CET8049836185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:02.282726049 CET8049832185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:02.282830954 CET4983680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:02.282833099 CET4983280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:02.285615921 CET4983680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:02.405503035 CET8049836185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:03.652264118 CET8049836185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:03.652327061 CET4983680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:03.770342112 CET4983680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:03.770550966 CET4984180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:03.890433073 CET8049841185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:03.890454054 CET8049836185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:03.890691996 CET4984180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:03.890693903 CET4983680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:03.890886068 CET4984180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:04.010674953 CET8049841185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:05.341659069 CET8049841185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:05.341725111 CET4984180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:05.457889080 CET4984180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:05.458935976 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:05.578166008 CET8049841185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:05.578267097 CET4984180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:05.578860998 CET8049846185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:05.578977108 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:05.579246044 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:05.699136972 CET8049846185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:07.003503084 CET8049846185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:07.003734112 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.114306927 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.234178066 CET8049846185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:07.588860035 CET8049846185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:07.588978052 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.708408117 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.708765984 CET4985280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.828727007 CET8049852185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:07.828747988 CET8049846185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:07.828869104 CET4984680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.828891039 CET4985280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.829996109 CET4985280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:07.949872017 CET8049852185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:09.152013063 CET8049852185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:09.152220011 CET4985280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:09.270229101 CET4985280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:09.270951986 CET4985680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:09.390784025 CET8049852185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:09.390886068 CET4985280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:09.390957117 CET8049856185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:09.391041994 CET4985680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:09.391252041 CET4985680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:09.511137009 CET8049856185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:10.717816114 CET8049856185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:10.717905045 CET4985680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:10.832808971 CET4985680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:10.833165884 CET4986080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:10.953159094 CET8049860185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:10.953315973 CET4986080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:10.953341007 CET8049856185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:10.953399897 CET4985680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:10.953547955 CET4986080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:11.073435068 CET8049860185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:12.322870970 CET8049860185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:12.323025942 CET4986080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:12.442260027 CET4986080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:12.442584991 CET4986480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:12.563059092 CET8049864185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:12.563075066 CET8049860185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:12.563230038 CET4986480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:12.563232899 CET4986080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:12.563528061 CET4986480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:12.683970928 CET8049864185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:13.935753107 CET8049864185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:13.935962915 CET4986480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:14.051541090 CET4986480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:14.051860094 CET4986980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:14.171782970 CET8049864185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:14.171802998 CET8049869185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:14.171859980 CET4986480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:14.171911955 CET4986980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:14.172202110 CET4986980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:14.292049885 CET8049869185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:15.655977011 CET8049869185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:15.656100035 CET4986980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:15.769905090 CET4986980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:15.770201921 CET4987580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:15.890084982 CET8049875185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:15.890158892 CET8049869185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:15.890217066 CET4987580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:15.890235901 CET4986980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:15.890445948 CET4987580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:16.010289907 CET8049875185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:17.258918047 CET8049875185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:17.259068966 CET4987580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:17.379916906 CET4987580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:17.380254984 CET4987980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:17.500271082 CET8049879185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:17.500397921 CET4987980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:17.500416040 CET8049875185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:17.500474930 CET4987580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:17.500663042 CET4987980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:17.621159077 CET8049879185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:18.869560957 CET8049879185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:18.869673014 CET4987980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:18.989022017 CET4987980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:18.989393950 CET4988380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:19.109730959 CET8049883185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:19.109848976 CET8049879185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:19.109878063 CET4988380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:19.109903097 CET4987980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:19.110116959 CET4988380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:19.230200052 CET8049883185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:20.545166016 CET8049883185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:20.545279026 CET4988380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:20.661283970 CET4988380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:20.661668062 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:20.781443119 CET8049883185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:20.781544924 CET8049888185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:20.781606913 CET4988380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:20.781846046 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:20.781846046 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:20.901798964 CET8049888185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:22.149403095 CET8049888185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:22.149466038 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:22.255105972 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:22.375075102 CET8049888185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:22.719472885 CET8049888185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:22.719542980 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:22.832664967 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:22.833000898 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:22.952975988 CET8049895185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:22.953234911 CET8049888185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:22.953341961 CET4988880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:22.953597069 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:22.953597069 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:23.073442936 CET8049895185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:24.442181110 CET8049895185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:24.442259073 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:24.551405907 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:24.671308994 CET8049895185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:25.007778883 CET8049895185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:25.009649038 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:25.129515886 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:25.129827976 CET4990180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:25.249866962 CET8049895185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:25.249880075 CET8049901185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:25.249968052 CET4989580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:25.250006914 CET4990180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:25.250170946 CET4990180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:25.370023966 CET8049901185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:26.671864986 CET8049901185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:26.671922922 CET4990180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:26.785705090 CET4990180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:26.786004066 CET4990580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:26.905937910 CET8049901185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:26.905952930 CET8049905185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:26.906109095 CET4990180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:26.906150103 CET4990580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:26.906352043 CET4990580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:27.026237965 CET8049905185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:28.281233072 CET8049905185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:28.281306982 CET4990580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:28.395222902 CET4990580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:28.395524025 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:28.515398026 CET8049910185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:28.515470028 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:28.515511990 CET8049905185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:28.515559912 CET4990580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:28.515748978 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:28.635608912 CET8049910185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:30.005083084 CET8049910185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:30.005297899 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.113930941 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.233998060 CET8049910185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:30.578649044 CET8049910185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:30.578850031 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.692122936 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.692441940 CET4991580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.812293053 CET8049910185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:30.812319994 CET8049915185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:30.812433958 CET4991080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.812463999 CET4991580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.812659025 CET4991580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:30.932549000 CET8049915185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:32.182940006 CET8049915185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:32.183048010 CET4991580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:32.301490068 CET4991580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:32.301774025 CET4992080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:32.421933889 CET8049915185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:32.421984911 CET4991580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:32.422077894 CET8049920185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:32.422158003 CET4992080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:32.422329903 CET4992080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:32.542242050 CET8049920185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:33.983035088 CET8049920185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:33.983119011 CET4992080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:34.098380089 CET4992080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:34.098669052 CET4992580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:34.218566895 CET8049925185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:34.218620062 CET8049920185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:34.218693018 CET4992580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:34.218729973 CET4992080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:34.218947887 CET4992580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:34.338819981 CET8049925185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:35.634079933 CET8049925185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:35.634165049 CET4992580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:35.754581928 CET4992580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:35.754911900 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:35.874918938 CET8049930185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:35.875046015 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:35.875231981 CET8049925185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:35.875255108 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:35.875292063 CET4992580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:35.996891975 CET8049930185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:37.288844109 CET8049930185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:37.288908005 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:37.395448923 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:37.515561104 CET8049930185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:37.868855000 CET8049930185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:37.868928909 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:37.988997936 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:37.989361048 CET4993580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:38.109488964 CET8049930185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:38.109551907 CET8049935185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:38.109568119 CET4993080192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:38.109627962 CET4993580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:38.109816074 CET4993580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:38.229659081 CET8049935185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:39.479336023 CET8049935185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:39.479466915 CET4993580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:39.598685980 CET4993580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:39.598997116 CET4993980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:39.719034910 CET8049939185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:39.719053984 CET8049935185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:39.719151020 CET4993580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:39.719161987 CET4993980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:39.719374895 CET4993980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:39.839231968 CET8049939185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:41.042371035 CET8049939185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:41.042500973 CET4993980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:41.204503059 CET4993980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:41.208647966 CET4994580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:41.324817896 CET8049939185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:41.324949026 CET4993980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:41.328612089 CET8049945185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:41.328708887 CET4994580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:41.348792076 CET4994580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:41.468691111 CET8049945185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:42.756308079 CET8049945185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:42.756373882 CET4994580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:42.874603987 CET4994580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:42.874917984 CET4994980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:42.994868994 CET8049945185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:42.994899035 CET8049949185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:42.995027065 CET4994580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:42.995048046 CET4994980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:42.995279074 CET4994980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:43.115222931 CET8049949185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:44.374214888 CET8049949185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:44.374299049 CET4994980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:44.489083052 CET4994980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:44.489413977 CET4995480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:44.609368086 CET8049954185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:44.609392881 CET8049949185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:44.609549046 CET4994980192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:44.609647036 CET4995480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:44.609724045 CET4995480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:44.729602098 CET8049954185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:45.930594921 CET8049954185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:45.930793047 CET4995480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:46.051552057 CET4995480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:46.051868916 CET4995880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:46.171860933 CET8049958185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:46.171972990 CET8049954185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:46.172105074 CET4995880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:46.172107935 CET4995480192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:46.172363997 CET4995880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:46.292294979 CET8049958185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:47.546540976 CET8049958185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:47.546586037 CET4995880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:47.660999060 CET4995880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:47.661335945 CET4996380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:47.781157017 CET8049958185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:47.781204939 CET8049963185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:47.781264067 CET4995880192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:47.781429052 CET4996380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:47.781544924 CET4996380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:47.901683092 CET8049963185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:49.108264923 CET8049963185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:49.108392000 CET4996380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:49.225558043 CET4996380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:49.225900888 CET4996680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:49.345911026 CET8049963185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:49.345926046 CET8049966185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:49.345992088 CET4996380192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:49.346065044 CET4996680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:49.355451107 CET4996680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:49.475366116 CET8049966185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:50.759254932 CET8049966185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:50.759308100 CET4996680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:50.879542112 CET4996680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:50.879832983 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:50.999685049 CET8049966185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:50.999727011 CET8049972185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:50.999766111 CET4996680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:50.999818087 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:51.000026941 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:51.119884968 CET8049972185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:52.367068052 CET8049972185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:52.367197990 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:52.473905087 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:52.593765020 CET8049972185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:52.938131094 CET8049972185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:52.938280106 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:53.052124023 CET4997780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:53.052129984 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:53.172291994 CET8049977185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:53.172357082 CET4997780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:53.172708035 CET4997780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:53.172723055 CET8049972185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:53.172782898 CET4997280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:53.292649984 CET8049977185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:54.588757992 CET8049977185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:54.588871002 CET4997780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:54.707822084 CET4997780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:54.708136082 CET4998280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:54.827965021 CET8049977185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:54.828140020 CET8049982185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:54.828167915 CET4997780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:54.828239918 CET4998280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:54.828454018 CET4998280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:54.948287010 CET8049982185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:56.197293997 CET8049982185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:56.197359085 CET4998280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:56.344079971 CET4998280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:56.344398022 CET4998780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:56.464344978 CET8049987185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:56.464386940 CET8049982185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:56.464430094 CET4998780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:56.464452982 CET4998280192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:56.467680931 CET4998780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:56.587555885 CET8049987185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:57.930179119 CET8049987185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:57.930244923 CET4998780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:58.038084030 CET4998780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:58.038382053 CET4999180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:58.158304930 CET8049987185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:58.158329010 CET8049991185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:58.158350945 CET4998780192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:58.158405066 CET4999180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:58.158544064 CET4999180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:58.278510094 CET8049991185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:59.528147936 CET8049991185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:59.528204918 CET4999180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:59.646871090 CET4999180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:59.647214890 CET4999580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:59.767178059 CET8049995185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:59.767193079 CET8049991185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:35:59.767247915 CET4999580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:59.767278910 CET4999180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:59.767481089 CET4999580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:35:59.887310028 CET8049995185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:01.184245110 CET8049995185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:01.184309006 CET4999580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:01.312799931 CET4999580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:01.313359976 CET5000180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:01.433064938 CET8049995185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:01.433126926 CET4999580192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:01.433260918 CET8050001185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:01.433337927 CET5000180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:01.434000015 CET5000180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:01.553879023 CET8050001185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:02.800297022 CET8050001185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:02.800374985 CET5000180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:02.912540913 CET5000180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:02.912882090 CET5000680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:03.032799006 CET8050001185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:03.032810926 CET8050006185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:03.032854080 CET5000180192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:03.032906055 CET5000680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:03.033119917 CET5000680192.168.2.6185.208.158.202
                                                              Nov 30, 2024 02:36:03.152956963 CET8050006185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:04.418824911 CET8050006185.208.158.202192.168.2.6
                                                              Nov 30, 2024 02:36:04.421696901 CET5000680192.168.2.6185.208.158.202
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 30, 2024 02:34:54.734477997 CET6041853192.168.2.645.155.250.90
                                                              Nov 30, 2024 02:34:54.986118078 CET536041845.155.250.90192.168.2.6
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Nov 30, 2024 02:34:54.734477997 CET192.168.2.645.155.250.900x2d7Standard query (0)beogbve.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Nov 30, 2024 02:34:54.986118078 CET45.155.250.90192.168.2.60x2d7No error (0)beogbve.com185.208.158.202A (IP address)IN (0x0001)false
                                                              • beogbve.com
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.649817185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:34:55.657440901 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:34:57.031182051 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:34:56 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.649821185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:34:57.310672998 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:34:58.664848089 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:34:58 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.649827185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:34:58.909274101 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:00.228415012 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:00 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.649832185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:00.469176054 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:01.862272024 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:01 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.649836185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:02.285615921 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:03.652264118 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:03 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              5192.168.2.649841185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:03.890886068 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:05.341659069 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:05 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              6192.168.2.649846185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:05.579246044 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:07.003503084 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:06 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20
                                                              Nov 30, 2024 02:35:07.114306927 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:07.588860035 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:07 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              7192.168.2.649852185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:07.829996109 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:09.152013063 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:08 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              8192.168.2.649856185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:09.391252041 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:10.717816114 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:10 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              9192.168.2.649860185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:10.953547955 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:12.322870970 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:12 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              10192.168.2.649864185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:12.563528061 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:13.935753107 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:13 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              11192.168.2.649869185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:14.172202110 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:15.655977011 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:15 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              12192.168.2.649875185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:15.890445948 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:17.258918047 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:17 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              13192.168.2.649879185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:17.500663042 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:18.869560957 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:18 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              14192.168.2.649883185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:19.110116959 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:20.545166016 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:20 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              15192.168.2.649888185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:20.781846046 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:22.149403095 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:21 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20
                                                              Nov 30, 2024 02:35:22.255105972 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:22.719472885 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:22 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              16192.168.2.649895185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:22.953597069 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:24.442181110 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:24 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20
                                                              Nov 30, 2024 02:35:24.551405907 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:25.007778883 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:24 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              17192.168.2.649901185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:25.250170946 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:26.671864986 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:26 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              18192.168.2.649905185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:26.906352043 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:28.281233072 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:28 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              19192.168.2.649910185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:28.515748978 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:30.005083084 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:29 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20
                                                              Nov 30, 2024 02:35:30.113930941 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:30.578649044 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:30 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              20192.168.2.649915185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:30.812659025 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:32.182940006 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:31 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              21192.168.2.649920185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:32.422329903 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:33.983035088 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:33 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              22192.168.2.649925185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:34.218947887 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:35.634079933 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:35 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              23192.168.2.649930185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:35.875255108 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:37.288844109 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:37 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20
                                                              Nov 30, 2024 02:35:37.395448923 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:37.868855000 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:37 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              24192.168.2.649935185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:38.109816074 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:39.479336023 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:39 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              25192.168.2.649939185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:39.719374895 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:41.042371035 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:40 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              26192.168.2.649945185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:41.348792076 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:42.756308079 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:42 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              27192.168.2.649949185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:42.995279074 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:44.374214888 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:44 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              28192.168.2.649954185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:44.609724045 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:45.930594921 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:45 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              29192.168.2.649958185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:46.172363997 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:47.546540976 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:47 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              30192.168.2.649963185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:47.781544924 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:49.108264923 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:48 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              31192.168.2.649966185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:49.355451107 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:50.759254932 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:50 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              32192.168.2.649972185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:51.000026941 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:52.367068052 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:52 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20
                                                              Nov 30, 2024 02:35:52.473905087 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:52.938131094 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:52 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              33192.168.2.649977185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:53.172708035 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:54.588757992 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:54 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              34192.168.2.649982185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:54.828454018 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:56.197293997 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:55 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              35192.168.2.649987185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:56.467680931 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:57.930179119 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:57 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              36192.168.2.649991185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:58.158544064 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:35:59.528147936 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:35:59 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              37192.168.2.649995185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:35:59.767481089 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:36:01.184245110 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:36:00 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              38192.168.2.650001185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:36:01.434000015 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:36:02.800297022 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:36:02 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              39192.168.2.650006185.208.158.202805056C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              TimestampBytes transferredDirectionData
                                                              Nov 30, 2024 02:36:03.033119917 CET314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c446db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386587fc11c5ef94 HTTP/1.1
                                                              Host: beogbve.com
                                                              User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                              Nov 30, 2024 02:36:04.418824911 CET220INHTTP/1.1 200 OK
                                                              Server: nginx/1.20.1
                                                              Date: Sat, 30 Nov 2024 01:36:04 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: keep-alive
                                                              X-Powered-By: PHP/7.4.33
                                                              Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                              Data Ascii: e67b680813008c20


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:20:33:58
                                                              Start date:29/11/2024
                                                              Path:C:\Users\user\Desktop\stail.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\stail.exe"
                                                              Imagebase:0x400000
                                                              File size:6'228'338 bytes
                                                              MD5 hash:5CE6DC42328EC1134EB1AF7CEB781608
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:false

                                                              Target ID:1
                                                              Start time:20:33:58
                                                              Start date:29/11/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\is-PNJS3.tmp\stail.tmp" /SL5="$203B6,5977381,56832,C:\Users\user\Desktop\stail.exe"
                                                              Imagebase:0x400000
                                                              File size:708'608 bytes
                                                              MD5 hash:3C6AFF88C22351BCB786883117AB81D7
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:false

                                                              Target ID:3
                                                              Start time:20:34:00
                                                              Start date:29/11/2024
                                                              Path:C:\Windows\SysWOW64\net.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\system32\net.exe" pause hd_video_converter_fox_125
                                                              Imagebase:0x350000
                                                              File size:47'104 bytes
                                                              MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:20:34:00
                                                              Start date:29/11/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff66e660000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:20:34:01
                                                              Start date:29/11/2024
                                                              Path:C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\HD Video Converter Fox 1.2.5\hdvideoconverterfox125.exe" -i
                                                              Imagebase:0x400000
                                                              File size:4'320'256 bytes
                                                              MD5 hash:3E5665842EDF692C5DA51975BEA8BE54
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000005.00000002.3372157942.0000000002D63000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 88%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:false

                                                              Target ID:6
                                                              Start time:20:34:01
                                                              Start date:29/11/2024
                                                              Path:C:\Windows\SysWOW64\net1.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\system32\net1 pause hd_video_converter_fox_125
                                                              Imagebase:0x7d0000
                                                              File size:139'776 bytes
                                                              MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:21.5%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:2.4%
                                                                Total number of Nodes:1520
                                                                Total number of Limit Nodes:22
                                                                execution_graph 5445 407548 5446 407554 CloseHandle 5445->5446 5447 40755d 5445->5447 5446->5447 6682 402b48 RaiseException 5887 407749 5888 4076dc WriteFile 5887->5888 5893 407724 5887->5893 5889 4076e8 5888->5889 5890 4076ef 5888->5890 5891 40748c 35 API calls 5889->5891 5892 407700 5890->5892 5894 4073ec 34 API calls 5890->5894 5891->5890 5893->5887 5895 4077e0 5893->5895 5894->5892 5896 4078db InterlockedExchange 5895->5896 5898 407890 5895->5898 5897 4078e7 5896->5897 6683 40294a 6684 402952 6683->6684 6685 402967 6684->6685 6686 403554 4 API calls 6684->6686 6686->6684 6687 403f4a 6688 403f53 6687->6688 6689 403f5c 6687->6689 6691 403f07 6688->6691 6694 403f09 6691->6694 6693 403f3c 6693->6689 6695 403154 4 API calls 6694->6695 6697 403e9c 6694->6697 6700 403f3d 6694->6700 6714 403e9c 6694->6714 6695->6694 6696 403ef2 6699 402674 4 API calls 6696->6699 6697->6693 6697->6696 6702 403ea9 6697->6702 6705 403e8e 6697->6705 6704 403ecf 6699->6704 6700->6689 6703 402674 4 API calls 6702->6703 6702->6704 6703->6704 6704->6689 6706 403e4c 6705->6706 6707 403e62 6706->6707 6708 403e7b 6706->6708 6710 403e67 6706->6710 6709 403cc8 4 API calls 6707->6709 6711 402674 4 API calls 6708->6711 6709->6710 6712 403e78 6710->6712 6713 402674 4 API calls 6710->6713 6711->6712 6712->6696 6712->6702 6713->6712 6715 403ed7 6714->6715 6721 403ea9 6714->6721 6716 403ef2 6715->6716 6718 403e8e 4 API calls 6715->6718 6719 402674 4 API calls 6716->6719 6717 403ecf 6717->6694 6720 403ee6 6718->6720 6719->6717 6720->6716 6720->6721 6721->6717 6722 402674 4 API calls 6721->6722 6722->6717 6241 40ac4f 6242 40abc1 6241->6242 6243 4094d8 9 API calls 6242->6243 6245 40abed 6242->6245 6243->6245 6244 40ac06 6246 40ac1a 6244->6246 6247 40ac0f DestroyWindow 6244->6247 6245->6244 6248 40ac00 RemoveDirectoryA 6245->6248 6249 40ac42 6246->6249 6250 40357c 4 API calls 6246->6250 6247->6246 6248->6244 6251 40ac38 6250->6251 6252 4025ac 4 API calls 6251->6252 6252->6249 6253 403a52 6254 403a74 6253->6254 6255 403a5a WriteFile 6253->6255 6255->6254 6256 403a78 GetLastError 6255->6256 6256->6254 6257 402654 6258 403154 4 API calls 6257->6258 6259 402614 6258->6259 6260 402632 6259->6260 6261 403154 4 API calls 6259->6261 6260->6260 6261->6260 6262 40ac56 6263 40ac5d 6262->6263 6265 40ac88 6262->6265 6272 409448 6263->6272 6267 403198 4 API calls 6265->6267 6266 40ac62 6266->6265 6269 40ac80 MessageBoxA 6266->6269 6268 40acc0 6267->6268 6270 403198 4 API calls 6268->6270 6269->6265 6271 40acc8 6270->6271 6273 409454 GetCurrentProcess OpenProcessToken 6272->6273 6274 4094af ExitWindowsEx 6272->6274 6275 409466 6273->6275 6276 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6273->6276 6274->6275 6275->6266 6276->6274 6276->6275 6731 40995e 6733 409960 6731->6733 6732 409982 6733->6732 6734 40999e CallWindowProcA 6733->6734 6734->6732 6735 409960 6736 409982 6735->6736 6738 40996f 6735->6738 6737 40999e CallWindowProcA 6737->6736 6738->6736 6738->6737 6739 405160 6740 405173 6739->6740 6741 404e58 33 API calls 6740->6741 6742 405187 6741->6742 6277 402e64 6278 402e69 6277->6278 6279 402e7a RtlUnwind 6278->6279 6280 402e5e 6278->6280 6281 402e9d 6279->6281 5899 40766c SetFilePointer 5900 4076a3 5899->5900 5901 407693 GetLastError 5899->5901 5901->5900 5902 40769c 5901->5902 5903 40748c 35 API calls 5902->5903 5903->5900 6294 40667c IsDBCSLeadByte 6295 406694 6294->6295 6755 403f7d 6756 403fa2 6755->6756 6759 403f84 6755->6759 6758 403e8e 4 API calls 6756->6758 6756->6759 6757 403f8c 6758->6759 6759->6757 6760 402674 4 API calls 6759->6760 6761 403fca 6760->6761 6762 403d02 6768 403d12 6762->6768 6763 403ddf ExitProcess 6764 403db8 6765 403cc8 4 API calls 6764->6765 6767 403dc2 6765->6767 6766 403dea 6769 403cc8 4 API calls 6767->6769 6768->6763 6768->6764 6768->6766 6768->6768 6772 403da4 6768->6772 6773 403d8f MessageBoxA 6768->6773 6770 403dcc 6769->6770 6782 4019dc 6770->6782 6778 403fe4 6772->6778 6773->6764 6774 403dd1 6774->6763 6774->6766 6779 403fe8 6778->6779 6780 403f07 4 API calls 6779->6780 6781 404006 6780->6781 6783 401abb 6782->6783 6784 4019ed 6782->6784 6783->6774 6785 401a04 RtlEnterCriticalSection 6784->6785 6786 401a0e LocalFree 6784->6786 6785->6786 6787 401a41 6786->6787 6788 401a2f VirtualFree 6787->6788 6789 401a49 6787->6789 6788->6787 6790 401a70 LocalFree 6789->6790 6791 401a87 6789->6791 6790->6790 6790->6791 6792 401aa9 RtlDeleteCriticalSection 6791->6792 6793 401a9f RtlLeaveCriticalSection 6791->6793 6792->6774 6793->6792 6300 404206 6301 4041cc 6300->6301 6304 40420a 6300->6304 6302 404282 6303 403154 4 API calls 6305 404323 6303->6305 6304->6302 6304->6303 6306 402c08 6307 402c82 6306->6307 6310 402c19 6306->6310 6308 402c56 RtlUnwind 6309 403154 4 API calls 6308->6309 6309->6307 6310->6307 6310->6308 6313 402b28 6310->6313 6314 402b31 RaiseException 6313->6314 6315 402b47 6313->6315 6314->6315 6315->6308 6316 408c10 6317 408c17 6316->6317 6318 403198 4 API calls 6317->6318 6326 408cb1 6318->6326 6319 408cdc 6320 4031b8 4 API calls 6319->6320 6321 408d69 6320->6321 6322 408cc8 6324 4032fc 18 API calls 6322->6324 6323 403278 18 API calls 6323->6326 6324->6319 6325 4032fc 18 API calls 6325->6326 6326->6319 6326->6322 6326->6323 6326->6325 6331 40a814 6332 40a839 6331->6332 6333 40993c 29 API calls 6332->6333 6336 40a83e 6333->6336 6334 40a891 6365 4026c4 GetSystemTime 6334->6365 6336->6334 6339 408dd8 18 API calls 6336->6339 6337 40a896 6338 409330 46 API calls 6337->6338 6340 40a89e 6338->6340 6341 40a86d 6339->6341 6342 4031e8 18 API calls 6340->6342 6345 40a875 MessageBoxA 6341->6345 6343 40a8ab 6342->6343 6344 406928 19 API calls 6343->6344 6346 40a8b8 6344->6346 6345->6334 6347 40a882 6345->6347 6348 4066c0 19 API calls 6346->6348 6349 405864 19 API calls 6347->6349 6350 40a8c8 6348->6350 6349->6334 6351 406638 19 API calls 6350->6351 6352 40a8d9 6351->6352 6353 403340 18 API calls 6352->6353 6354 40a8e7 6353->6354 6355 4031e8 18 API calls 6354->6355 6356 40a8f7 6355->6356 6357 4074e0 37 API calls 6356->6357 6358 40a936 6357->6358 6359 402594 18 API calls 6358->6359 6360 40a956 6359->6360 6361 407a28 19 API calls 6360->6361 6362 40a998 6361->6362 6363 407cb8 35 API calls 6362->6363 6364 40a9bf 6363->6364 6365->6337 5443 407017 5444 407008 SetErrorMode 5443->5444 6366 403018 6367 403070 6366->6367 6368 403025 6366->6368 6369 40302a RtlUnwind 6368->6369 6370 40304e 6369->6370 6372 402f78 6370->6372 6373 402be8 6370->6373 6374 402bf1 RaiseException 6373->6374 6375 402c04 6373->6375 6374->6375 6375->6367 6380 40901e 6381 409010 6380->6381 6382 408fac Wow64RevertWow64FsRedirection 6381->6382 6383 409018 6382->6383 6384 409020 SetLastError 6385 409029 6384->6385 6400 403a28 ReadFile 6401 403a46 6400->6401 6402 403a49 GetLastError 6400->6402 5904 40762c ReadFile 5905 407663 5904->5905 5906 40764c 5904->5906 5907 407652 GetLastError 5906->5907 5908 40765c 5906->5908 5907->5905 5907->5908 5909 40748c 35 API calls 5908->5909 5909->5905 6804 40712e 6805 407118 6804->6805 6806 403198 4 API calls 6805->6806 6807 407120 6806->6807 6808 403198 4 API calls 6807->6808 6809 407128 6808->6809 5924 40a82f 5925 409ae8 18 API calls 5924->5925 5926 40a834 5925->5926 5927 40a839 5926->5927 5928 402f24 5 API calls 5926->5928 5961 40993c 5927->5961 5928->5927 5930 40a891 5966 4026c4 GetSystemTime 5930->5966 5932 40a83e 5932->5930 6027 408dd8 5932->6027 5933 40a896 5967 409330 5933->5967 5937 40a86d 5941 40a875 MessageBoxA 5937->5941 5938 4031e8 18 API calls 5939 40a8ab 5938->5939 5985 406928 5939->5985 5941->5930 5943 40a882 5941->5943 6030 405864 5943->6030 5948 40a8d9 6012 403340 5948->6012 5950 40a8e7 5951 4031e8 18 API calls 5950->5951 5952 40a8f7 5951->5952 5953 4074e0 37 API calls 5952->5953 5954 40a936 5953->5954 5955 402594 18 API calls 5954->5955 5956 40a956 5955->5956 5957 407a28 19 API calls 5956->5957 5958 40a998 5957->5958 5959 407cb8 35 API calls 5958->5959 5960 40a9bf 5959->5960 6034 40953c 5961->6034 5964 4098cc 19 API calls 5965 40995c 5964->5965 5965->5932 5966->5933 5976 409350 5967->5976 5970 409375 CreateDirectoryA 5971 4093ed 5970->5971 5972 40937f GetLastError 5970->5972 5973 40322c 4 API calls 5971->5973 5972->5976 5974 4093f7 5973->5974 5977 4031b8 4 API calls 5974->5977 5975 408dd8 18 API calls 5975->5976 5976->5970 5976->5975 5978 404c94 33 API calls 5976->5978 5981 407284 19 API calls 5976->5981 5983 408da8 18 API calls 5976->5983 5984 405890 18 API calls 5976->5984 6090 406cf4 5976->6090 6113 409224 5976->6113 5979 409411 5977->5979 5978->5976 5980 4031b8 4 API calls 5979->5980 5982 40941e 5980->5982 5981->5976 5982->5938 5983->5976 5984->5976 6219 406820 5985->6219 5988 403454 18 API calls 5989 40694a 5988->5989 5990 4066c0 5989->5990 6224 4068e4 5990->6224 5993 4066f0 5995 403340 18 API calls 5993->5995 5994 4066fe 5996 403454 18 API calls 5994->5996 5998 4066fc 5995->5998 5997 406711 5996->5997 5999 403340 18 API calls 5997->5999 6000 403198 4 API calls 5998->6000 5999->5998 6001 406733 6000->6001 6002 406638 6001->6002 6003 406642 6002->6003 6004 406665 6002->6004 6230 406950 6003->6230 6006 40322c 4 API calls 6004->6006 6008 40666e 6006->6008 6007 406649 6007->6004 6009 406654 6007->6009 6008->5948 6010 403340 18 API calls 6009->6010 6011 406662 6010->6011 6011->5948 6013 403344 6012->6013 6016 4033a5 6012->6016 6014 4031e8 6013->6014 6015 40334c 6013->6015 6019 403254 18 API calls 6014->6019 6022 4031fc 6014->6022 6015->6016 6018 40335b 6015->6018 6020 4031e8 18 API calls 6015->6020 6017 403228 6017->5950 6021 403254 18 API calls 6018->6021 6019->6022 6020->6018 6024 403375 6021->6024 6022->6017 6023 4025ac 4 API calls 6022->6023 6023->6017 6025 4031e8 18 API calls 6024->6025 6026 4033a1 6025->6026 6026->5950 6028 408da8 18 API calls 6027->6028 6029 408df4 6028->6029 6029->5937 6031 405869 6030->6031 6032 405940 19 API calls 6031->6032 6033 40587b 6032->6033 6033->6033 6041 40955b 6034->6041 6035 409590 6037 40959d GetUserDefaultLangID 6035->6037 6042 409592 6035->6042 6036 409594 6046 407024 GetModuleHandleA GetProcAddress 6036->6046 6037->6042 6040 40956f 6040->5964 6041->6035 6041->6036 6041->6040 6042->6040 6043 4095cb GetACP 6042->6043 6044 4095ef 6042->6044 6043->6040 6043->6042 6044->6040 6045 409615 GetACP 6044->6045 6045->6040 6045->6044 6047 407067 6046->6047 6048 40705e 6046->6048 6049 407070 6047->6049 6050 4070a8 6047->6050 6057 403198 4 API calls 6048->6057 6067 406f68 6049->6067 6051 406f68 RegOpenKeyExA 6050->6051 6055 4070c1 6051->6055 6053 407089 6054 4070de 6053->6054 6070 406f5c 6053->6070 6059 40322c 4 API calls 6054->6059 6055->6054 6058 406f5c 20 API calls 6055->6058 6061 407120 6057->6061 6062 4070d5 RegCloseKey 6058->6062 6063 4070eb 6059->6063 6064 403198 4 API calls 6061->6064 6062->6054 6065 4032fc 18 API calls 6063->6065 6066 407128 6064->6066 6065->6048 6066->6042 6068 406f73 6067->6068 6069 406f79 RegOpenKeyExA 6067->6069 6068->6069 6069->6053 6073 406e10 6070->6073 6074 406e36 RegQueryValueExA 6073->6074 6075 406e59 6074->6075 6080 406e7b 6074->6080 6076 406e73 6075->6076 6075->6080 6081 403278 18 API calls 6075->6081 6082 403420 18 API calls 6075->6082 6078 403198 4 API calls 6076->6078 6077 403198 4 API calls 6079 406f47 RegCloseKey 6077->6079 6078->6080 6079->6054 6080->6077 6081->6075 6083 406eb0 RegQueryValueExA 6082->6083 6083->6074 6084 406ecc 6083->6084 6084->6080 6085 4034f0 18 API calls 6084->6085 6086 406f0e 6085->6086 6087 406f20 6086->6087 6089 403420 18 API calls 6086->6089 6088 4031e8 18 API calls 6087->6088 6088->6080 6089->6087 6132 406a58 6090->6132 6094 406a58 19 API calls 6096 406d36 6094->6096 6095 406d26 6095->6094 6097 406d72 6095->6097 6098 406d42 6096->6098 6100 406a34 21 API calls 6096->6100 6140 406888 6097->6140 6098->6097 6101 406d67 6098->6101 6104 406a58 19 API calls 6098->6104 6100->6098 6101->6097 6152 406cc8 GetWindowsDirectoryA 6101->6152 6106 406d5b 6104->6106 6105 406638 19 API calls 6107 406d87 6105->6107 6106->6101 6108 406a34 21 API calls 6106->6108 6109 40322c 4 API calls 6107->6109 6108->6101 6110 406d91 6109->6110 6111 4031b8 4 API calls 6110->6111 6112 406dab 6111->6112 6112->5976 6114 409244 6113->6114 6115 406638 19 API calls 6114->6115 6116 40925d 6115->6116 6117 40322c 4 API calls 6116->6117 6122 409268 6117->6122 6119 406978 20 API calls 6119->6122 6120 4033b4 18 API calls 6120->6122 6121 408dd8 18 API calls 6121->6122 6122->6119 6122->6120 6122->6121 6123 405890 18 API calls 6122->6123 6125 4092e4 6122->6125 6192 4091b0 6122->6192 6200 409034 6122->6200 6123->6122 6126 40322c 4 API calls 6125->6126 6127 4092ef 6126->6127 6128 4031b8 4 API calls 6127->6128 6129 409309 6128->6129 6130 403198 4 API calls 6129->6130 6131 409311 6130->6131 6131->5976 6133 4034f0 18 API calls 6132->6133 6135 406a6b 6133->6135 6134 406a82 GetEnvironmentVariableA 6134->6135 6136 406a8e 6134->6136 6135->6134 6139 406a95 6135->6139 6154 406dec 6135->6154 6137 403198 4 API calls 6136->6137 6137->6139 6139->6095 6149 406a34 6139->6149 6141 403414 6140->6141 6142 4068ab GetFullPathNameA 6141->6142 6143 4068b7 6142->6143 6144 4068ce 6142->6144 6143->6144 6145 4068bf 6143->6145 6146 40322c 4 API calls 6144->6146 6147 403278 18 API calls 6145->6147 6148 4068cc 6146->6148 6147->6148 6148->6105 6158 4069dc 6149->6158 6153 406ce9 6152->6153 6153->6097 6155 406dfa 6154->6155 6156 4034f0 18 API calls 6155->6156 6157 406e08 6156->6157 6157->6135 6165 406978 6158->6165 6160 4069fe 6161 406a06 GetFileAttributesA 6160->6161 6162 406a1b 6161->6162 6163 403198 4 API calls 6162->6163 6164 406a23 6163->6164 6164->6095 6175 406744 6165->6175 6167 4069b0 6170 4069c6 6167->6170 6171 4069bb 6167->6171 6169 406989 6169->6167 6182 406970 CharPrevA 6169->6182 6183 403454 6170->6183 6172 40322c 4 API calls 6171->6172 6174 4069c4 6172->6174 6174->6160 6179 406755 6175->6179 6176 4067b9 6177 406680 IsDBCSLeadByte 6176->6177 6178 4067b4 6176->6178 6177->6178 6178->6169 6179->6176 6181 406773 6179->6181 6181->6178 6190 406680 IsDBCSLeadByte 6181->6190 6182->6169 6184 403486 6183->6184 6185 403459 6183->6185 6186 403198 4 API calls 6184->6186 6185->6184 6188 40346d 6185->6188 6187 40347c 6186->6187 6187->6174 6189 403278 18 API calls 6188->6189 6189->6187 6191 406694 6190->6191 6191->6181 6193 403198 4 API calls 6192->6193 6195 4091d1 6193->6195 6197 4091fe 6195->6197 6209 4032a8 6195->6209 6212 403494 6195->6212 6198 403198 4 API calls 6197->6198 6199 409213 6198->6199 6199->6122 6201 408f70 2 API calls 6200->6201 6202 40904a 6201->6202 6203 40904e 6202->6203 6216 406a48 6202->6216 6203->6122 6206 409081 6207 408fac Wow64RevertWow64FsRedirection 6206->6207 6208 409089 6207->6208 6208->6122 6210 403278 18 API calls 6209->6210 6211 4032b5 6210->6211 6211->6195 6213 403498 6212->6213 6215 4034c3 6212->6215 6214 4034f0 18 API calls 6213->6214 6214->6215 6215->6195 6217 4069dc 21 API calls 6216->6217 6218 406a52 GetLastError 6217->6218 6218->6206 6220 406744 IsDBCSLeadByte 6219->6220 6222 406835 6220->6222 6221 40687f 6221->5988 6222->6221 6223 406680 IsDBCSLeadByte 6222->6223 6223->6222 6225 4068f3 6224->6225 6226 406820 IsDBCSLeadByte 6225->6226 6228 4068fe 6226->6228 6227 4066ea 6227->5993 6227->5994 6228->6227 6229 406680 IsDBCSLeadByte 6228->6229 6229->6228 6231 406957 6230->6231 6232 40695b 6230->6232 6231->6007 6235 406970 CharPrevA 6232->6235 6234 40696c 6234->6007 6235->6234 6810 408f30 6813 408dfc 6810->6813 6814 408e05 6813->6814 6815 403198 4 API calls 6814->6815 6816 408e13 6814->6816 6815->6814 6817 403932 6818 403924 6817->6818 6819 40374c VariantClear 6818->6819 6820 40392c 6819->6820 5380 4075c4 SetFilePointer 5381 4075f7 5380->5381 5382 4075e7 GetLastError 5380->5382 5382->5381 5383 4075f0 5382->5383 5385 40748c GetLastError 5383->5385 5388 4073ec 5385->5388 5389 407284 19 API calls 5388->5389 5390 407414 5389->5390 5391 407434 5390->5391 5392 405194 33 API calls 5390->5392 5393 405890 18 API calls 5391->5393 5392->5391 5394 407443 5393->5394 5395 403198 4 API calls 5394->5395 5396 407460 5395->5396 5396->5381 6411 4076c8 WriteFile 6412 4076e8 6411->6412 6413 4076ef 6411->6413 6414 40748c 35 API calls 6412->6414 6415 407700 6413->6415 6416 4073ec 34 API calls 6413->6416 6414->6413 6416->6415 6417 402ccc 6420 402cfe 6417->6420 6421 402cdd 6417->6421 6418 402d88 RtlUnwind 6419 403154 4 API calls 6418->6419 6419->6420 6421->6418 6421->6420 6422 402b28 RaiseException 6421->6422 6423 402d7f 6422->6423 6423->6418 6829 403fcd 6830 403f07 4 API calls 6829->6830 6831 403fd6 6830->6831 6832 403e9c 4 API calls 6831->6832 6833 403fe2 6832->6833 6430 4024d0 6431 4024e4 6430->6431 6432 4024e9 6430->6432 6435 401918 4 API calls 6431->6435 6433 402518 6432->6433 6434 40250e RtlEnterCriticalSection 6432->6434 6437 4024ed 6432->6437 6445 402300 6433->6445 6434->6433 6435->6432 6438 402525 6441 402581 6438->6441 6442 402577 RtlLeaveCriticalSection 6438->6442 6440 401fd4 14 API calls 6443 402531 6440->6443 6442->6441 6443->6438 6444 40215c 9 API calls 6443->6444 6444->6438 6446 402314 6445->6446 6448 4023b8 6446->6448 6450 402335 6446->6450 6447 402344 6447->6438 6447->6440 6448->6447 6449 401d80 9 API calls 6448->6449 6453 402455 6448->6453 6455 401e84 6448->6455 6449->6448 6450->6447 6452 401b74 9 API calls 6450->6452 6452->6447 6453->6447 6454 401d00 9 API calls 6453->6454 6454->6447 6460 401768 6455->6460 6457 401e99 6458 401ea6 6457->6458 6459 401dcc 9 API calls 6457->6459 6458->6448 6459->6458 6461 401787 6460->6461 6462 40183b 6461->6462 6463 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6461->6463 6465 40132c LocalAlloc 6461->6465 6466 401821 6461->6466 6468 4017d6 6461->6468 6464 4015c4 VirtualAlloc 6462->6464 6469 4017e7 6462->6469 6463->6461 6464->6469 6465->6461 6467 40150c VirtualFree 6466->6467 6467->6469 6470 40150c VirtualFree 6468->6470 6469->6457 6470->6469 6471 4028d2 6472 4028da 6471->6472 6473 403554 4 API calls 6472->6473 6474 4028ef 6472->6474 6473->6472 6475 4025ac 4 API calls 6474->6475 6476 4028f4 6475->6476 6834 4019d3 6835 4019ba 6834->6835 6836 4019c3 RtlLeaveCriticalSection 6835->6836 6837 4019cd 6835->6837 6836->6837 5397 407fd4 5398 407fe6 5397->5398 5400 407fed 5397->5400 5408 407f10 5398->5408 5402 408017 5400->5402 5404 408015 5400->5404 5407 408021 5400->5407 5401 40804e 5419 407d7c 5402->5419 5403 407d7c 33 API calls 5403->5401 5422 407e2c 5404->5422 5407->5401 5407->5403 5409 407f25 5408->5409 5410 407d7c 33 API calls 5409->5410 5411 407f34 5409->5411 5410->5411 5412 407f6e 5411->5412 5413 407d7c 33 API calls 5411->5413 5414 407f82 5412->5414 5415 407d7c 33 API calls 5412->5415 5413->5412 5418 407fae 5414->5418 5429 407eb8 5414->5429 5415->5414 5418->5400 5432 4058c4 5419->5432 5421 407d9e 5421->5407 5423 405194 33 API calls 5422->5423 5424 407e57 5423->5424 5440 407de4 5424->5440 5426 407e5f 5427 403198 4 API calls 5426->5427 5428 407e74 5427->5428 5428->5407 5430 407ec7 VirtualFree 5429->5430 5431 407ed9 VirtualAlloc 5429->5431 5430->5431 5431->5418 5434 4058d0 5432->5434 5433 405194 33 API calls 5435 4058fd 5433->5435 5434->5433 5436 4031e8 18 API calls 5435->5436 5437 405908 5436->5437 5438 403198 4 API calls 5437->5438 5439 40591d 5438->5439 5439->5421 5441 4058c4 33 API calls 5440->5441 5442 407e06 5441->5442 5442->5426 6477 405ad4 6478 405adc 6477->6478 6480 405ae4 6477->6480 6479 405aeb 6478->6479 6481 405ae2 6478->6481 6482 405940 19 API calls 6479->6482 6484 405a4c 6481->6484 6482->6480 6485 405a54 6484->6485 6486 405a6e 6485->6486 6487 403154 4 API calls 6485->6487 6488 405a73 6486->6488 6489 405a8a 6486->6489 6487->6485 6491 405940 19 API calls 6488->6491 6490 403154 4 API calls 6489->6490 6493 405a8f 6490->6493 6492 405a86 6491->6492 6495 403154 4 API calls 6492->6495 6494 4059b0 33 API calls 6493->6494 6494->6492 6496 405ab8 6495->6496 6497 403154 4 API calls 6496->6497 6498 405ac6 6497->6498 6498->6480 5910 40a9de 5911 40aa03 5910->5911 5912 407918 InterlockedExchange 5911->5912 5913 40aa2d 5912->5913 5914 409ae8 18 API calls 5913->5914 5915 40aa3d 5913->5915 5914->5915 5920 4076ac SetEndOfFile 5915->5920 5917 40aa59 5918 4025ac 4 API calls 5917->5918 5919 40aa90 5918->5919 5921 4076c3 5920->5921 5922 4076bc 5920->5922 5921->5917 5923 40748c 35 API calls 5922->5923 5923->5921 6841 402be9 RaiseException 6842 402c04 6841->6842 6509 402af2 6510 402afe 6509->6510 6513 402ed0 6510->6513 6514 403154 4 API calls 6513->6514 6516 402ee0 6514->6516 6515 402b03 6516->6515 6518 402b0c 6516->6518 6519 402b25 6518->6519 6520 402b15 RaiseException 6518->6520 6519->6515 6520->6519 5448 40a5f8 5491 4030dc 5448->5491 5450 40a60e 5494 4042e8 5450->5494 5452 40a613 5497 40457c GetModuleHandleA GetProcAddress 5452->5497 5456 40a61d 5505 4065c8 5456->5505 5458 40a622 5514 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5458->5514 5468 40a665 5536 406c2c 5468->5536 5469 4031e8 18 API calls 5470 40a683 5469->5470 5550 4074e0 5470->5550 5476 407918 InterlockedExchange 5479 40a6d2 5476->5479 5477 40a710 5570 4074a0 5477->5570 5479->5477 5607 409ae8 5479->5607 5480 40a751 5574 407a28 5480->5574 5481 40a736 5481->5480 5482 409ae8 18 API calls 5481->5482 5482->5480 5484 40a776 5584 408b08 5484->5584 5488 40a7bc 5489 408b08 35 API calls 5488->5489 5490 40a7f5 5488->5490 5489->5488 5617 403094 5491->5617 5493 4030e1 GetModuleHandleA GetCommandLineA 5493->5450 5495 403154 4 API calls 5494->5495 5496 404323 5494->5496 5495->5496 5496->5452 5498 404598 5497->5498 5499 40459f GetProcAddress 5497->5499 5498->5499 5500 4045b5 GetProcAddress 5499->5500 5501 4045ae 5499->5501 5502 4045c4 SetProcessDEPPolicy 5500->5502 5503 4045c8 5500->5503 5501->5500 5502->5503 5504 404624 6F9C1CD0 5503->5504 5504->5456 5618 405ca8 5505->5618 5515 4090f7 5514->5515 5702 406fa0 SetErrorMode 5515->5702 5518 407284 19 API calls 5519 409127 5518->5519 5520 403198 4 API calls 5519->5520 5521 40913c 5520->5521 5522 409b78 GetSystemInfo VirtualQuery 5521->5522 5523 409c2c 5522->5523 5526 409ba2 5522->5526 5528 409768 5523->5528 5524 409c0d VirtualQuery 5524->5523 5524->5526 5525 409bcc VirtualProtect 5525->5526 5526->5523 5526->5524 5526->5525 5527 409bfb VirtualProtect 5526->5527 5527->5524 5708 406bd0 GetCommandLineA 5528->5708 5530 409785 5531 409850 5530->5531 5532 406c2c 20 API calls 5530->5532 5535 403454 18 API calls 5530->5535 5533 4031b8 4 API calls 5531->5533 5532->5530 5534 40986a 5533->5534 5534->5468 5600 409c88 5534->5600 5535->5530 5537 406c53 GetModuleFileNameA 5536->5537 5538 406c77 GetCommandLineA 5536->5538 5539 403278 18 API calls 5537->5539 5546 406c7c 5538->5546 5540 406c75 5539->5540 5544 406ca4 5540->5544 5541 406c81 5542 403198 4 API calls 5541->5542 5545 406c89 5542->5545 5543 406af0 18 API calls 5543->5546 5547 403198 4 API calls 5544->5547 5548 40322c 4 API calls 5545->5548 5546->5541 5546->5543 5546->5545 5549 406cb9 5547->5549 5548->5544 5549->5469 5551 4074ea 5550->5551 5715 407576 5551->5715 5718 407578 5551->5718 5552 407516 5553 40752a 5552->5553 5554 40748c 35 API calls 5552->5554 5557 409c34 FindResourceA 5553->5557 5554->5553 5558 409c49 5557->5558 5559 409c4e SizeofResource 5557->5559 5560 409ae8 18 API calls 5558->5560 5561 409c60 LoadResource 5559->5561 5562 409c5b 5559->5562 5560->5559 5564 409c73 LockResource 5561->5564 5565 409c6e 5561->5565 5563 409ae8 18 API calls 5562->5563 5563->5561 5567 409c84 5564->5567 5568 409c7f 5564->5568 5566 409ae8 18 API calls 5565->5566 5566->5564 5567->5476 5567->5479 5569 409ae8 18 API calls 5568->5569 5569->5567 5571 4074b4 5570->5571 5572 4074c4 5571->5572 5573 4073ec 34 API calls 5571->5573 5572->5481 5573->5572 5575 407a35 5574->5575 5576 405890 18 API calls 5575->5576 5577 407a89 5575->5577 5576->5577 5578 407918 InterlockedExchange 5577->5578 5579 407a9b 5578->5579 5580 405890 18 API calls 5579->5580 5581 407ab1 5579->5581 5580->5581 5582 405890 18 API calls 5581->5582 5583 407af4 5581->5583 5582->5583 5583->5484 5596 408b39 5584->5596 5598 408b82 5584->5598 5585 408bcd 5721 407cb8 5585->5721 5586 407cb8 35 API calls 5586->5596 5588 408be4 5591 4031b8 4 API calls 5588->5591 5589 4034f0 18 API calls 5589->5596 5590 4034f0 18 API calls 5590->5598 5593 408bfe 5591->5593 5592 4031e8 18 API calls 5592->5596 5614 404c20 5593->5614 5594 403420 18 API calls 5594->5596 5595 4031e8 18 API calls 5595->5598 5596->5586 5596->5589 5596->5592 5596->5594 5596->5598 5597 403420 18 API calls 5597->5598 5598->5585 5598->5590 5598->5595 5598->5597 5599 407cb8 35 API calls 5598->5599 5599->5598 5601 40322c 4 API calls 5600->5601 5602 409cab 5601->5602 5603 409cba MessageBoxA 5602->5603 5604 409ccf 5603->5604 5605 403198 4 API calls 5604->5605 5606 409cd7 5605->5606 5606->5468 5608 409af1 5607->5608 5609 409b09 5607->5609 5610 405890 18 API calls 5608->5610 5611 405890 18 API calls 5609->5611 5612 409b03 5610->5612 5613 409b1a 5611->5613 5612->5477 5613->5477 5743 402594 5614->5743 5616 404c2b 5616->5488 5617->5493 5619 405940 19 API calls 5618->5619 5620 405cb9 5619->5620 5621 405280 GetSystemDefaultLCID 5620->5621 5624 4052b6 5621->5624 5622 4031e8 18 API calls 5622->5624 5623 404cdc 19 API calls 5623->5624 5624->5622 5624->5623 5625 40520c 19 API calls 5624->5625 5626 405318 5624->5626 5625->5624 5627 404cdc 19 API calls 5626->5627 5628 40520c 19 API calls 5626->5628 5629 4031e8 18 API calls 5626->5629 5630 40539b 5626->5630 5627->5626 5628->5626 5629->5626 5631 4031b8 4 API calls 5630->5631 5632 4053b5 5631->5632 5633 4053c4 GetSystemDefaultLCID 5632->5633 5690 40520c GetLocaleInfoA 5633->5690 5636 4031e8 18 API calls 5637 405404 5636->5637 5638 40520c 19 API calls 5637->5638 5639 405419 5638->5639 5640 40520c 19 API calls 5639->5640 5641 40543d 5640->5641 5696 405258 GetLocaleInfoA 5641->5696 5644 405258 GetLocaleInfoA 5645 40546d 5644->5645 5646 40520c 19 API calls 5645->5646 5647 405487 5646->5647 5648 405258 GetLocaleInfoA 5647->5648 5649 4054a4 5648->5649 5650 40520c 19 API calls 5649->5650 5651 4054be 5650->5651 5652 4031e8 18 API calls 5651->5652 5653 4054cb 5652->5653 5654 40520c 19 API calls 5653->5654 5655 4054e0 5654->5655 5656 4031e8 18 API calls 5655->5656 5657 4054ed 5656->5657 5658 405258 GetLocaleInfoA 5657->5658 5659 4054fb 5658->5659 5660 40520c 19 API calls 5659->5660 5661 405515 5660->5661 5662 4031e8 18 API calls 5661->5662 5663 405522 5662->5663 5664 40520c 19 API calls 5663->5664 5665 405537 5664->5665 5666 4031e8 18 API calls 5665->5666 5667 405544 5666->5667 5668 40520c 19 API calls 5667->5668 5669 405559 5668->5669 5670 405576 5669->5670 5671 405567 5669->5671 5673 40322c 4 API calls 5670->5673 5698 40322c 5671->5698 5674 405574 5673->5674 5675 40520c 19 API calls 5674->5675 5676 405598 5675->5676 5677 4055b5 5676->5677 5678 4055a6 5676->5678 5679 403198 4 API calls 5677->5679 5680 40322c 4 API calls 5678->5680 5681 4055b3 5679->5681 5680->5681 5682 4033b4 18 API calls 5681->5682 5683 4055d7 5682->5683 5684 4033b4 18 API calls 5683->5684 5685 4055f1 5684->5685 5686 4031b8 4 API calls 5685->5686 5687 40560b 5686->5687 5688 405cf4 GetVersionExA 5687->5688 5689 405d0b 5688->5689 5689->5458 5691 405233 5690->5691 5692 405245 5690->5692 5693 403278 18 API calls 5691->5693 5694 40322c 4 API calls 5692->5694 5695 405243 5693->5695 5694->5695 5695->5636 5697 405274 5696->5697 5697->5644 5700 403230 5698->5700 5699 403252 5699->5674 5700->5699 5701 4025ac 4 API calls 5700->5701 5701->5699 5706 403414 5702->5706 5705 406fee 5705->5518 5707 403418 LoadLibraryA 5706->5707 5707->5705 5709 406af0 18 API calls 5708->5709 5710 406bf3 5709->5710 5711 406c05 5710->5711 5712 406af0 18 API calls 5710->5712 5713 403198 4 API calls 5711->5713 5712->5710 5714 406c1a 5713->5714 5714->5530 5716 407578 5715->5716 5717 4075b7 CreateFileA 5716->5717 5717->5552 5719 403414 5718->5719 5720 4075b7 CreateFileA 5719->5720 5720->5552 5722 407cd3 5721->5722 5724 407cc8 5721->5724 5727 407c5c 5722->5727 5724->5588 5726 405890 18 API calls 5726->5724 5728 407c70 5727->5728 5729 407caf 5727->5729 5728->5729 5731 407bac 5728->5731 5729->5724 5729->5726 5732 407bb7 5731->5732 5736 407bc8 5731->5736 5734 405890 18 API calls 5732->5734 5733 4074a0 34 API calls 5735 407bdc 5733->5735 5734->5736 5737 4074a0 34 API calls 5735->5737 5736->5733 5738 407bfd 5737->5738 5739 407918 InterlockedExchange 5738->5739 5740 407c12 5739->5740 5741 407c28 5740->5741 5742 405890 18 API calls 5740->5742 5741->5728 5742->5741 5744 402598 5743->5744 5746 4025a2 5743->5746 5749 401fd4 5744->5749 5745 40259e 5745->5746 5747 403154 4 API calls 5745->5747 5746->5616 5746->5746 5747->5746 5750 401fe8 5749->5750 5751 401fed 5749->5751 5760 401918 RtlInitializeCriticalSection 5750->5760 5753 402012 RtlEnterCriticalSection 5751->5753 5754 40201c 5751->5754 5759 401ff1 5751->5759 5753->5754 5754->5759 5767 401ee0 5754->5767 5757 402147 5757->5745 5758 40213d RtlLeaveCriticalSection 5758->5757 5759->5745 5761 40193c RtlEnterCriticalSection 5760->5761 5762 401946 5760->5762 5761->5762 5763 401964 LocalAlloc 5762->5763 5764 40197e 5763->5764 5765 4019c3 RtlLeaveCriticalSection 5764->5765 5766 4019cd 5764->5766 5765->5766 5766->5751 5770 401ef0 5767->5770 5768 401f1c 5772 401f40 5768->5772 5778 401d00 5768->5778 5770->5768 5770->5772 5773 401e58 5770->5773 5772->5757 5772->5758 5782 4016d8 5773->5782 5776 401e75 5776->5770 5779 401d4e 5778->5779 5780 401d1e 5778->5780 5779->5780 5851 401c68 5779->5851 5780->5772 5785 4016f4 5782->5785 5784 4016fe 5807 4015c4 5784->5807 5785->5784 5787 40175b 5785->5787 5789 40174f 5785->5789 5799 401430 5785->5799 5811 40132c 5785->5811 5787->5776 5792 401dcc 5787->5792 5815 40150c 5789->5815 5790 40170a 5790->5787 5825 401d80 5792->5825 5795 40132c LocalAlloc 5796 401df0 5795->5796 5798 401df8 5796->5798 5829 401b44 5796->5829 5798->5776 5800 40143f VirtualAlloc 5799->5800 5802 40146c 5800->5802 5803 40148f 5800->5803 5819 4012e4 5802->5819 5803->5785 5806 40147c VirtualFree 5806->5803 5809 40160a 5807->5809 5808 40163a 5808->5790 5809->5808 5810 401626 VirtualAlloc 5809->5810 5810->5808 5810->5809 5812 401348 5811->5812 5813 4012e4 LocalAlloc 5812->5813 5814 40138f 5813->5814 5814->5785 5818 40153b 5815->5818 5816 401594 5816->5787 5817 401568 VirtualFree 5817->5818 5818->5816 5818->5817 5822 40128c 5819->5822 5823 401298 LocalAlloc 5822->5823 5824 4012aa 5822->5824 5823->5824 5824->5803 5824->5806 5826 401d89 5825->5826 5828 401d92 5825->5828 5826->5828 5834 401b74 5826->5834 5828->5795 5830 401b61 5829->5830 5831 401b52 5829->5831 5830->5798 5832 401d00 9 API calls 5831->5832 5833 401b5f 5832->5833 5833->5798 5837 40215c 5834->5837 5836 401b95 5836->5828 5838 40217a 5837->5838 5839 402175 5837->5839 5841 4021ab RtlEnterCriticalSection 5838->5841 5842 40217e 5838->5842 5849 4021b5 5838->5849 5840 401918 4 API calls 5839->5840 5840->5838 5841->5849 5842->5836 5843 4021c1 5845 4022e3 RtlLeaveCriticalSection 5843->5845 5846 4022ed 5843->5846 5844 402244 5844->5842 5847 401d80 7 API calls 5844->5847 5845->5846 5846->5836 5847->5842 5848 402270 5848->5843 5850 401d00 7 API calls 5848->5850 5849->5843 5849->5844 5849->5848 5850->5843 5852 401c7a 5851->5852 5853 401c9d 5852->5853 5854 401caf 5852->5854 5864 40188c 5853->5864 5856 40188c 3 API calls 5854->5856 5857 401cad 5856->5857 5858 401b44 9 API calls 5857->5858 5863 401cc5 5857->5863 5859 401cd4 5858->5859 5860 401cee 5859->5860 5874 401b98 5859->5874 5879 4013a0 5860->5879 5863->5780 5865 4018b2 5864->5865 5873 40190b 5864->5873 5883 401658 5865->5883 5868 40132c LocalAlloc 5869 4018cf 5868->5869 5870 40150c VirtualFree 5869->5870 5871 4018e6 5869->5871 5870->5871 5872 4013a0 LocalAlloc 5871->5872 5871->5873 5872->5873 5873->5857 5875 401bab 5874->5875 5876 401b9d 5874->5876 5875->5860 5877 401b74 9 API calls 5876->5877 5878 401baa 5877->5878 5878->5860 5881 4013ab 5879->5881 5880 4013c6 5880->5863 5881->5880 5882 4012e4 LocalAlloc 5881->5882 5882->5880 5885 40168f 5883->5885 5884 4016cf 5884->5868 5885->5884 5886 4016a9 VirtualFree 5885->5886 5886->5885 6843 402dfa 6844 402e26 6843->6844 6845 402e0d 6843->6845 6847 402ba4 6845->6847 6848 402bc9 6847->6848 6849 402bad 6847->6849 6848->6844 6850 402bb5 RaiseException 6849->6850 6850->6848 6851 4075fa GetFileSize 6852 407626 6851->6852 6853 407616 GetLastError 6851->6853 6853->6852 6854 40761f 6853->6854 6855 40748c 35 API calls 6854->6855 6855->6852 6856 406ffb 6857 407008 SetErrorMode 6856->6857 6525 403a80 CloseHandle 6526 403a90 6525->6526 6527 403a91 GetLastError 6525->6527 6528 404283 6529 4042c3 6528->6529 6530 403154 4 API calls 6529->6530 6531 404323 6530->6531 6858 404185 6859 4041ff 6858->6859 6860 4041cc 6859->6860 6861 403154 4 API calls 6859->6861 6862 404323 6861->6862 6532 403e87 6533 403e4c 6532->6533 6534 403e62 6533->6534 6535 403e7b 6533->6535 6538 403e67 6533->6538 6541 403cc8 6534->6541 6537 402674 4 API calls 6535->6537 6539 403e78 6537->6539 6538->6539 6545 402674 6538->6545 6542 403cd6 6541->6542 6543 402674 4 API calls 6542->6543 6544 403ceb 6542->6544 6543->6544 6544->6538 6546 403154 4 API calls 6545->6546 6547 40267a 6546->6547 6547->6539 6556 407e90 6557 407eb8 VirtualFree 6556->6557 6558 407e9d 6557->6558 6561 403e95 6562 403e4c 6561->6562 6563 403e67 6562->6563 6564 403e62 6562->6564 6565 403e7b 6562->6565 6568 403e78 6563->6568 6569 402674 4 API calls 6563->6569 6566 403cc8 4 API calls 6564->6566 6567 402674 4 API calls 6565->6567 6566->6563 6567->6568 6569->6568 6570 40ac97 6579 4096fc 6570->6579 6573 402f24 5 API calls 6574 40aca1 6573->6574 6575 403198 4 API calls 6574->6575 6576 40acc0 6575->6576 6577 403198 4 API calls 6576->6577 6578 40acc8 6577->6578 6588 4056ac 6579->6588 6581 409717 6582 409745 6581->6582 6594 40720c 6581->6594 6585 403198 4 API calls 6582->6585 6584 409735 6587 40973d MessageBoxA 6584->6587 6586 40975a 6585->6586 6586->6573 6586->6574 6587->6582 6589 403154 4 API calls 6588->6589 6590 4056b1 6589->6590 6591 4056c9 6590->6591 6592 403154 4 API calls 6590->6592 6591->6581 6593 4056bf 6592->6593 6593->6581 6595 4056ac 4 API calls 6594->6595 6596 40721b 6595->6596 6597 407221 6596->6597 6598 40722f 6596->6598 6599 40322c 4 API calls 6597->6599 6600 40724b 6598->6600 6601 40723f 6598->6601 6603 40722d 6599->6603 6612 4032b8 6600->6612 6605 4071d0 6601->6605 6603->6584 6606 40322c 4 API calls 6605->6606 6607 4071df 6606->6607 6608 4071fc 6607->6608 6609 406950 CharPrevA 6607->6609 6608->6603 6610 4071eb 6609->6610 6610->6608 6611 4032fc 18 API calls 6610->6611 6611->6608 6613 403278 18 API calls 6612->6613 6614 4032c2 6613->6614 6614->6603 6615 403a97 6616 403aac 6615->6616 6617 403bbc GetStdHandle 6616->6617 6618 403b0e CreateFileA 6616->6618 6626 403ab2 6616->6626 6619 403c17 GetLastError 6617->6619 6632 403bba 6617->6632 6618->6619 6620 403b2c 6618->6620 6619->6626 6622 403b3b GetFileSize 6620->6622 6620->6632 6622->6619 6623 403b4e SetFilePointer 6622->6623 6623->6619 6628 403b6a ReadFile 6623->6628 6624 403be7 GetFileType 6625 403c02 CloseHandle 6624->6625 6624->6626 6625->6626 6628->6619 6629 403b8c 6628->6629 6630 403b9f SetFilePointer 6629->6630 6629->6632 6630->6619 6631 403bb0 SetEndOfFile 6630->6631 6631->6619 6631->6632 6632->6624 6632->6626 6637 40aaa2 6638 40aad2 6637->6638 6639 40aadc CreateWindowExA SetWindowLongA 6638->6639 6640 405194 33 API calls 6639->6640 6641 40ab5f 6640->6641 6642 4032fc 18 API calls 6641->6642 6643 40ab6d 6642->6643 6644 4032fc 18 API calls 6643->6644 6645 40ab7a 6644->6645 6646 406b7c 19 API calls 6645->6646 6647 40ab86 6646->6647 6648 4032fc 18 API calls 6647->6648 6649 40ab8f 6648->6649 6650 4099ec 43 API calls 6649->6650 6651 40aba1 6650->6651 6652 4098cc 19 API calls 6651->6652 6653 40abb4 6651->6653 6652->6653 6654 40abed 6653->6654 6655 4094d8 9 API calls 6653->6655 6656 40ac06 6654->6656 6659 40ac00 RemoveDirectoryA 6654->6659 6655->6654 6657 40ac1a 6656->6657 6658 40ac0f DestroyWindow 6656->6658 6660 40ac42 6657->6660 6661 40357c 4 API calls 6657->6661 6658->6657 6659->6656 6662 40ac38 6661->6662 6663 4025ac 4 API calls 6662->6663 6663->6660 6875 405ba2 6877 405ba4 6875->6877 6876 405be0 6880 405940 19 API calls 6876->6880 6877->6876 6878 405bf7 6877->6878 6879 405bda 6877->6879 6884 404cdc 19 API calls 6878->6884 6879->6876 6881 405c4c 6879->6881 6882 405bf3 6880->6882 6883 4059b0 33 API calls 6881->6883 6885 403198 4 API calls 6882->6885 6883->6882 6886 405c20 6884->6886 6887 405c86 6885->6887 6888 4059b0 33 API calls 6886->6888 6888->6882 6889 408da4 6890 408dc8 6889->6890 6891 408c80 18 API calls 6890->6891 6892 408dd1 6891->6892 6664 402caa 6665 403154 4 API calls 6664->6665 6666 402caf 6665->6666 6907 4011aa 6908 4011ac GetStdHandle 6907->6908 6667 4028ac 6668 402594 18 API calls 6667->6668 6669 4028b6 6668->6669 4979 40aab4 4980 40aab8 SetLastError 4979->4980 5011 409648 GetLastError 4980->5011 4983 40aad2 4985 40aadc CreateWindowExA SetWindowLongA 4983->4985 5024 405194 4985->5024 4989 40ab6d 4990 4032fc 18 API calls 4989->4990 4991 40ab7a 4990->4991 5041 406b7c GetCommandLineA 4991->5041 4994 4032fc 18 API calls 4995 40ab8f 4994->4995 5046 4099ec 4995->5046 4997 40aba1 4999 40abb4 4997->4999 5067 4098cc 4997->5067 5000 40abd4 4999->5000 5001 40abed 4999->5001 5073 4094d8 5000->5073 5003 40ac06 5001->5003 5006 40ac00 RemoveDirectoryA 5001->5006 5004 40ac1a 5003->5004 5005 40ac0f DestroyWindow 5003->5005 5007 40ac42 5004->5007 5081 40357c 5004->5081 5005->5004 5006->5003 5009 40ac38 5094 4025ac 5009->5094 5098 404c94 5011->5098 5019 4096c3 5113 4031b8 5019->5113 5025 4051a8 33 API calls 5024->5025 5026 4051a3 5025->5026 5027 4032fc 5026->5027 5028 403300 5027->5028 5029 40333f 5027->5029 5030 4031e8 5028->5030 5031 40330a 5028->5031 5029->4989 5037 403254 18 API calls 5030->5037 5038 4031fc 5030->5038 5032 403334 5031->5032 5033 40331d 5031->5033 5034 4034f0 18 API calls 5032->5034 5274 4034f0 5033->5274 5040 403322 5034->5040 5035 403228 5035->4989 5037->5038 5038->5035 5039 4025ac 4 API calls 5038->5039 5039->5035 5040->4989 5300 406af0 5041->5300 5043 406ba1 5044 403198 4 API calls 5043->5044 5045 406bbf 5044->5045 5045->4994 5314 4033b4 5046->5314 5048 409a27 5049 409a59 CreateProcessA 5048->5049 5050 409a65 5049->5050 5051 409a6c CloseHandle 5049->5051 5052 409648 35 API calls 5050->5052 5053 409a75 5051->5053 5052->5051 5054 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5053->5054 5055 409a7a MsgWaitForMultipleObjects 5054->5055 5055->5053 5056 409a91 5055->5056 5057 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5056->5057 5058 409a96 GetExitCodeProcess CloseHandle 5057->5058 5059 409ab6 5058->5059 5060 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5059->5060 5061 409abe 5060->5061 5061->4997 5062 402f24 5063 403154 4 API calls 5062->5063 5064 402f29 5063->5064 5320 402bcc 5064->5320 5066 402f51 5066->5066 5068 40990e 5067->5068 5069 4098d4 5067->5069 5068->4999 5069->5068 5070 403420 18 API calls 5069->5070 5071 409908 5070->5071 5323 408e80 5071->5323 5074 409532 5073->5074 5078 4094eb 5073->5078 5074->5001 5075 4094f3 Sleep 5075->5078 5076 409503 Sleep 5076->5078 5078->5074 5078->5075 5078->5076 5079 40951a GetLastError 5078->5079 5346 408fbc 5078->5346 5079->5074 5080 409524 GetLastError 5079->5080 5080->5074 5080->5078 5084 403591 5081->5084 5090 4035a0 5081->5090 5082 4035b1 5085 403198 4 API calls 5082->5085 5083 4035b8 5086 4031b8 4 API calls 5083->5086 5087 4035d0 5084->5087 5088 40359b 5084->5088 5089 4035b6 5084->5089 5085->5089 5086->5089 5087->5089 5092 40357c 4 API calls 5087->5092 5088->5090 5091 4035ec 5088->5091 5089->5009 5090->5082 5090->5083 5091->5089 5363 403554 5091->5363 5092->5087 5095 4025b0 5094->5095 5096 4025ba 5094->5096 5095->5096 5097 403154 4 API calls 5095->5097 5096->5007 5096->5096 5097->5096 5121 4051a8 5098->5121 5101 407284 FormatMessageA 5102 4072aa 5101->5102 5103 403278 18 API calls 5102->5103 5104 4072c7 5103->5104 5105 408da8 5104->5105 5106 408dc8 5105->5106 5264 408c80 5106->5264 5109 405890 5110 405897 5109->5110 5111 4031e8 18 API calls 5110->5111 5112 4058af 5111->5112 5112->5019 5115 4031be 5113->5115 5114 4031e3 5117 403198 5114->5117 5115->5114 5116 4025ac 4 API calls 5115->5116 5116->5115 5118 4031b7 5117->5118 5119 40319e 5117->5119 5118->4983 5118->5062 5119->5118 5120 4025ac 4 API calls 5119->5120 5120->5118 5122 4051c5 5121->5122 5129 404e58 5122->5129 5125 4051f1 5134 403278 5125->5134 5132 404e73 5129->5132 5130 404e85 5130->5125 5139 404be4 5130->5139 5132->5130 5142 404f7a 5132->5142 5149 404e4c 5132->5149 5135 403254 18 API calls 5134->5135 5136 403288 5135->5136 5137 403198 4 API calls 5136->5137 5138 4032a0 5137->5138 5138->5101 5256 405940 5139->5256 5141 404bf5 5141->5125 5143 404f8b 5142->5143 5147 404fd9 5142->5147 5146 40505f 5143->5146 5143->5147 5145 404ff7 5145->5132 5146->5145 5156 404e38 5146->5156 5147->5145 5152 404df4 5147->5152 5150 403198 4 API calls 5149->5150 5151 404e56 5150->5151 5151->5132 5153 404e02 5152->5153 5159 404bfc 5153->5159 5155 404e30 5155->5147 5186 4039a4 5156->5186 5162 4059b0 5159->5162 5161 404c15 5161->5155 5163 4059be 5162->5163 5172 404cdc LoadStringA 5163->5172 5166 405194 33 API calls 5167 4059f6 5166->5167 5175 4031e8 5167->5175 5170 4031b8 4 API calls 5171 405a1b 5170->5171 5171->5161 5173 403278 18 API calls 5172->5173 5174 404d09 5173->5174 5174->5166 5176 4031ec 5175->5176 5179 4031fc 5175->5179 5176->5179 5181 403254 5176->5181 5177 403228 5177->5170 5179->5177 5180 4025ac 4 API calls 5179->5180 5180->5177 5182 403274 5181->5182 5183 403258 5181->5183 5182->5179 5184 402594 18 API calls 5183->5184 5185 403261 5184->5185 5185->5179 5187 4039ab 5186->5187 5192 4038b4 5187->5192 5189 4039cb 5190 403198 4 API calls 5189->5190 5191 4039d2 5190->5191 5191->5145 5193 4038d5 5192->5193 5194 4038c8 5192->5194 5196 403934 5193->5196 5197 4038db 5193->5197 5220 403780 5194->5220 5198 403993 5196->5198 5199 40393b 5196->5199 5200 4038e1 5197->5200 5201 4038ee 5197->5201 5202 4037f4 3 API calls 5198->5202 5203 403941 5199->5203 5204 40394b 5199->5204 5227 403894 5200->5227 5206 403894 6 API calls 5201->5206 5209 4038d0 5202->5209 5242 403864 5203->5242 5208 4037f4 3 API calls 5204->5208 5210 4038fc 5206->5210 5211 40395d 5208->5211 5209->5189 5232 4037f4 5210->5232 5214 403864 23 API calls 5211->5214 5213 403917 5238 40374c 5213->5238 5215 403976 5214->5215 5218 40374c VariantClear 5215->5218 5217 40392c 5217->5189 5219 40398b 5218->5219 5219->5189 5221 4037f0 5220->5221 5223 403744 5220->5223 5221->5209 5222 403793 VariantClear 5222->5223 5223->5220 5223->5222 5224 4037ab 5223->5224 5225 403198 4 API calls 5223->5225 5226 4037dc VariantCopyInd 5223->5226 5224->5209 5225->5223 5226->5221 5226->5223 5247 4036b8 5227->5247 5230 40374c VariantClear 5231 4038a9 5230->5231 5231->5209 5233 403845 VariantChangeTypeEx 5232->5233 5234 40380a VariantChangeTypeEx 5232->5234 5237 403832 5233->5237 5235 403826 5234->5235 5236 40374c VariantClear 5235->5236 5236->5237 5237->5213 5239 403759 5238->5239 5240 403766 5238->5240 5239->5240 5241 403779 VariantClear 5239->5241 5240->5217 5241->5217 5253 40369c SysStringLen 5242->5253 5245 40374c VariantClear 5246 403882 5245->5246 5246->5209 5248 4036cb 5247->5248 5249 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5248->5249 5250 4036db 5248->5250 5251 40372e 5249->5251 5252 4036ed MultiByteToWideChar SysAllocStringLen 5250->5252 5251->5230 5252->5251 5254 403610 21 API calls 5253->5254 5255 4036b3 5254->5255 5255->5245 5257 40594c 5256->5257 5258 404cdc 19 API calls 5257->5258 5259 405972 5258->5259 5260 4031e8 18 API calls 5259->5260 5261 40597d 5260->5261 5262 403198 4 API calls 5261->5262 5263 405992 5262->5263 5263->5141 5265 403198 4 API calls 5264->5265 5267 408cb1 5264->5267 5265->5267 5266 4031b8 4 API calls 5268 408d69 5266->5268 5269 408cc8 5267->5269 5270 403278 18 API calls 5267->5270 5272 408cdc 5267->5272 5273 4032fc 18 API calls 5267->5273 5268->5109 5271 4032fc 18 API calls 5269->5271 5270->5267 5271->5272 5272->5266 5273->5267 5275 4034fd 5274->5275 5282 40352d 5274->5282 5277 403526 5275->5277 5280 403509 5275->5280 5276 403198 4 API calls 5279 403517 5276->5279 5278 403254 18 API calls 5277->5278 5278->5282 5279->5040 5283 4025c4 5280->5283 5282->5276 5285 4025ca 5283->5285 5284 4025dc 5284->5279 5284->5284 5285->5284 5287 403154 5285->5287 5288 403164 5287->5288 5289 40318c TlsGetValue 5287->5289 5288->5284 5290 403196 5289->5290 5291 40316f 5289->5291 5290->5284 5295 40310c 5291->5295 5293 403174 TlsGetValue 5294 403184 5293->5294 5294->5284 5296 403120 LocalAlloc 5295->5296 5297 403116 5295->5297 5298 40313e TlsSetValue 5296->5298 5299 403132 5296->5299 5297->5296 5298->5299 5299->5293 5301 406b1c 5300->5301 5302 403278 18 API calls 5301->5302 5303 406b29 5302->5303 5310 403420 5303->5310 5305 406b31 5306 4031e8 18 API calls 5305->5306 5307 406b49 5306->5307 5308 403198 4 API calls 5307->5308 5309 406b6b 5308->5309 5309->5043 5311 403426 5310->5311 5313 403437 5310->5313 5312 403254 18 API calls 5311->5312 5311->5313 5312->5313 5313->5305 5315 4033bc 5314->5315 5316 403254 18 API calls 5315->5316 5317 4033cf 5316->5317 5318 4031e8 18 API calls 5317->5318 5319 4033f7 5318->5319 5321 402bd5 RaiseException 5320->5321 5322 402be6 5320->5322 5321->5322 5322->5066 5324 408e8e 5323->5324 5326 408ea6 5324->5326 5336 408e18 5324->5336 5327 408e18 18 API calls 5326->5327 5328 408eca 5326->5328 5327->5328 5339 407918 5328->5339 5330 408ee5 5331 408e18 18 API calls 5330->5331 5333 408ef8 5330->5333 5331->5333 5332 408e18 18 API calls 5332->5333 5333->5332 5334 403278 18 API calls 5333->5334 5335 408f27 5333->5335 5334->5333 5335->5068 5337 405890 18 API calls 5336->5337 5338 408e29 5337->5338 5338->5326 5342 4078c4 5339->5342 5343 4078d6 5342->5343 5344 4078e7 5342->5344 5345 4078db InterlockedExchange 5343->5345 5344->5330 5345->5344 5354 408f70 5346->5354 5348 408fd2 5349 408fd6 5348->5349 5350 408ff2 DeleteFileA GetLastError 5348->5350 5349->5078 5351 409010 5350->5351 5360 408fac 5351->5360 5355 408f7a 5354->5355 5356 408f7e 5354->5356 5355->5348 5357 408fa0 SetLastError 5356->5357 5358 408f87 Wow64DisableWow64FsRedirection 5356->5358 5359 408f9b 5357->5359 5358->5359 5359->5348 5361 408fb1 Wow64RevertWow64FsRedirection 5360->5361 5362 408fbb 5360->5362 5361->5362 5362->5078 5364 403566 5363->5364 5366 403578 5364->5366 5367 403604 5364->5367 5366->5091 5368 40357c 5367->5368 5373 40359b 5368->5373 5374 4035d0 5368->5374 5375 4035a0 5368->5375 5379 4035b6 5368->5379 5369 4035b1 5371 403198 4 API calls 5369->5371 5370 4035b8 5372 4031b8 4 API calls 5370->5372 5371->5379 5372->5379 5373->5375 5376 4035ec 5373->5376 5377 40357c 4 API calls 5374->5377 5374->5379 5375->5369 5375->5370 5378 403554 4 API calls 5376->5378 5376->5379 5377->5374 5378->5376 5379->5364 6670 401ab9 6671 401a96 6670->6671 6672 401aa9 RtlDeleteCriticalSection 6671->6672 6673 401a9f RtlLeaveCriticalSection 6671->6673 6673->6672

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 132 409b78-409b9c GetSystemInfo VirtualQuery 133 409ba2 132->133 134 409c2c-409c33 132->134 135 409c21-409c26 133->135 135->134 136 409ba4-409bab 135->136 137 409c0d-409c1f VirtualQuery 136->137 138 409bad-409bb1 136->138 137->134 137->135 138->137 139 409bb3-409bbb 138->139 140 409bcc-409bdd VirtualProtect 139->140 141 409bbd-409bc0 139->141 143 409be1-409be3 140->143 144 409bdf 140->144 141->140 142 409bc2-409bc5 141->142 142->140 145 409bc7-409bca 142->145 146 409bf2-409bf5 143->146 144->143 145->140 145->143 147 409be5-409bee call 409b70 146->147 148 409bf7-409bf9 146->148 147->146 148->137 150 409bfb-409c08 VirtualProtect 148->150 150->137
                                                                APIs
                                                                • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                                • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                                • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                                • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                                • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Virtual$ProtectQuery$InfoSystem
                                                                • String ID:
                                                                • API String ID: 2441996862-0
                                                                • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                                • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                                APIs
                                                                • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                                • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                                • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModulePolicyProcess
                                                                • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                • API String ID: 3256987805-3653653586
                                                                • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                Control-flow Graph

                                                                APIs
                                                                • SetLastError.KERNEL32 ref: 0040AAC1
                                                                  • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020724D0), ref: 0040966C
                                                                • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                • SetWindowLongA.USER32(000203B6,000000FC,00409960), ref: 0040AB15
                                                                • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                • DestroyWindow.USER32(000203B6,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                                • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                • API String ID: 3757039580-3001827809
                                                                • Opcode ID: 512ba3d6f2e9f1c3867d88fe9cc8f5790ae5845b184f1ae6f41adfa2939ac233
                                                                • Instruction ID: be79b44adbed8f80b53e5612ba2c07cab25871a7655baedeeb07d74425ea1546
                                                                • Opcode Fuzzy Hash: 512ba3d6f2e9f1c3867d88fe9cc8f5790ae5845b184f1ae6f41adfa2939ac233
                                                                • Instruction Fuzzy Hash: 83410070604204DBDB10EBA9EE89B9D37A5EB49304F10467FF114B72E2D7B89845CB9D

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                • API String ID: 1646373207-2130885113
                                                                • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                                • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                                Control-flow Graph

                                                                APIs
                                                                • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                • SetWindowLongA.USER32(000203B6,000000FC,00409960), ref: 0040AB15
                                                                  • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                                  • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724D0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                  • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724D0,00409AD8,00000000), ref: 00409A70
                                                                  • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                  • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                  • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724D0,00409AD8), ref: 00409AA4
                                                                • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                • DestroyWindow.USER32(000203B6,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                • API String ID: 3586484885-3001827809
                                                                • Opcode ID: abbbb59459200108d21b408613378a390e3e047840070f8330146cd7c6fc736f
                                                                • Instruction ID: 3ba592a6bb5a586105fd12ff7794ab8e81bfb13978b6693ff680cbbbd79f3ebd
                                                                • Opcode Fuzzy Hash: abbbb59459200108d21b408613378a390e3e047840070f8330146cd7c6fc736f
                                                                • Instruction Fuzzy Hash: EF410B71604204DFD714EBA9EE89B5A37B5EB48314F20467BF104BB2E1D7B8A844CB9D

                                                                Control-flow Graph

                                                                APIs
                                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724D0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724D0,00409AD8,00000000), ref: 00409A70
                                                                • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020724D0,00409AD8), ref: 00409AA4
                                                                  • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020724D0), ref: 0040966C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                • String ID: D
                                                                • API String ID: 3356880605-2746444292
                                                                • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                                • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 116 401918-40193a RtlInitializeCriticalSection 117 401946-40197c call 4012dc * 3 LocalAlloc 116->117 118 40193c-401941 RtlEnterCriticalSection 116->118 125 4019ad-4019c1 117->125 126 40197e 117->126 118->117 129 4019c3-4019c8 RtlLeaveCriticalSection 125->129 130 4019cd 125->130 128 401983-401995 126->128 128->128 131 401997-4019a6 128->131 129->130 131->125
                                                                APIs
                                                                • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                • String ID: RY
                                                                • API String ID: 730355536-3689137273
                                                                • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                                Control-flow Graph

                                                                APIs
                                                                • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Message
                                                                • String ID: .tmp$y@
                                                                • API String ID: 2030045667-2396523267
                                                                • Opcode ID: d4ac7463dbf5d161e361ca9bc326db0ca40d9a64499bf0d63171a4d21a2c3052
                                                                • Instruction ID: b6b31011a0dd284aafbaa2c2e49cce084e53b2f1e69b481334740b61ed9710c2
                                                                • Opcode Fuzzy Hash: d4ac7463dbf5d161e361ca9bc326db0ca40d9a64499bf0d63171a4d21a2c3052
                                                                • Instruction Fuzzy Hash: DA41A171704200DFD715EF65EED1A1A77A5E749304B61853AF804B73E1C679AC10CBAD

                                                                Control-flow Graph

                                                                APIs
                                                                • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Message
                                                                • String ID: .tmp$y@
                                                                • API String ID: 2030045667-2396523267
                                                                • Opcode ID: 0c9aecb76b7a3e7a11760fd8a915a701fd69e196c0d41de26bbb48f3063f32c7
                                                                • Instruction ID: ebe7ed5bd99e4afc73068d402fc5cc7c846ae42ea211bad011db29787866ec42
                                                                • Opcode Fuzzy Hash: 0c9aecb76b7a3e7a11760fd8a915a701fd69e196c0d41de26bbb48f3063f32c7
                                                                • Instruction Fuzzy Hash: 4B41A070700200DFC711EF65DED6A5A77A5EB49304B61463AF804B73E2CAB9AC10CBAD

                                                                Control-flow Graph

                                                                APIs
                                                                • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID: .tmp
                                                                • API String ID: 1375471231-2986845003
                                                                • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                                • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 342 407749-40774a 343 4076dc-4076e6 WriteFile 342->343 344 40774c-40776f 342->344 345 4076e8-4076ea call 40748c 343->345 346 4076ef-4076f2 343->346 347 407770-407785 344->347 345->346 351 407700-407704 346->351 352 4076f4-4076fb call 4073ec 346->352 348 407787 347->348 349 4077f9 347->349 353 40778a-40778f 348->353 354 4077fd-407802 348->354 355 40783b-40783d 349->355 356 4077fb 349->356 352->351 359 407803-407819 353->359 362 407791-407792 353->362 354->359 360 407841-407843 355->360 356->354 361 40785b-40785c 359->361 370 40781b 359->370 360->361 363 4078d6-4078eb call 407890 InterlockedExchange 361->363 364 40785e-40788c 361->364 365 407724-407741 362->365 366 407794-4077b4 362->366 387 407912-407917 363->387 388 4078ed-407910 363->388 380 407820-407823 364->380 381 407890-407893 364->381 369 4077b5 365->369 372 407743 365->372 366->369 374 4077b6-4077b7 369->374 375 4077f7-4077f8 369->375 376 40781e-40781f 370->376 378 407746-407747 372->378 379 4077b9 372->379 374->379 375->349 376->380 378->342 382 4077bb-4077cd 378->382 379->382 384 407824 380->384 385 407898 380->385 381->385 382->360 386 4077cf-4077d4 382->386 389 407825 384->389 390 40789a 384->390 385->390 386->355 394 4077d6-4077de 386->394 388->387 388->388 392 407896-407897 389->392 393 407826-40782d 389->393 395 40789f 390->395 392->385 396 4078a1 393->396 397 40782f 393->397 394->347 405 4077e0 394->405 395->396 402 4078a3 396->402 403 4078ac 396->403 399 407832-407833 397->399 400 4078a5-4078aa 397->400 399->355 399->376 404 4078ae-4078af 400->404 402->400 403->404 404->395 406 4078b1-4078bd 404->406 405->375 406->385 407 4078bf-4078c0 406->407
                                                                APIs
                                                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                                • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 408 401fd4-401fe6 409 401fe8 call 401918 408->409 410 401ffb-402010 408->410 414 401fed-401fef 409->414 412 402012-402017 RtlEnterCriticalSection 410->412 413 40201c-402025 410->413 412->413 415 402027 413->415 416 40202c-402032 413->416 414->410 417 401ff1-401ff6 414->417 415->416 418 402038-40203c 416->418 419 4020cb-4020d1 416->419 420 40214f-402158 417->420 423 402041-402050 418->423 424 40203e 418->424 421 4020d3-4020e0 419->421 422 40211d-40211f call 401ee0 419->422 425 4020e2-4020ea 421->425 426 4020ef-40211b call 402f54 421->426 429 402124-40213b 422->429 423->419 427 402052-402060 423->427 424->423 425->426 426->420 431 402062-402066 427->431 432 40207c-402080 427->432 440 402147 429->440 441 40213d-402142 RtlLeaveCriticalSection 429->441 433 402068 431->433 434 40206b-40207a 431->434 436 402082 432->436 437 402085-4020a0 432->437 433->434 439 4020a2-4020c6 call 402f54 434->439 436->437 437->439 439->420 441->440
                                                                APIs
                                                                • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                                  • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                  • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                  • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                  • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                • String ID:
                                                                • API String ID: 296031713-0
                                                                • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                                • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 444 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLibraryLoadMode
                                                                • String ID:
                                                                • API String ID: 2987862817-0
                                                                • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                APIs
                                                                • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                  • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$FilePointer
                                                                • String ID:
                                                                • API String ID: 1156039329-0
                                                                • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 448 40762c-40764a ReadFile 449 407663-40766a 448->449 450 40764c-407650 448->450 451 407652-40765a GetLastError 450->451 452 40765c-40765e call 40748c 450->452 451->449 451->452 452->449
                                                                APIs
                                                                • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastRead
                                                                • String ID:
                                                                • API String ID: 1948546556-0
                                                                • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                APIs
                                                                • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                  • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$FilePointer
                                                                • String ID:
                                                                • API String ID: 1156039329-0
                                                                • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree
                                                                • String ID:
                                                                • API String ID: 2087232378-0
                                                                • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                APIs
                                                                • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                                  • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                                  • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DefaultInfoLoadLocaleStringSystem
                                                                • String ID:
                                                                • API String ID: 1658689577-0
                                                                • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                                • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                APIs
                                                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                  • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastWrite
                                                                • String ID:
                                                                • API String ID: 442123175-0
                                                                • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                APIs
                                                                • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FormatMessage
                                                                • String ID:
                                                                • API String ID: 1306739567-0
                                                                • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                APIs
                                                                • SetEndOfFile.KERNEL32(?,02088000,0040AA59,00000000), ref: 004076B3
                                                                  • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020703AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 734332943-0
                                                                • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                APIs
                                                                • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode
                                                                • String ID:
                                                                • API String ID: 2340568224-0
                                                                • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                APIs
                                                                • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode
                                                                • String ID:
                                                                • API String ID: 2340568224-0
                                                                • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                APIs
                                                                • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CharPrev
                                                                • String ID:
                                                                • API String ID: 122130370-0
                                                                • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                • Instruction Fuzzy Hash:
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                                • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                                APIs
                                                                • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FreeVirtual
                                                                • String ID:
                                                                • API String ID: 1263568516-0
                                                                • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                APIs
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FreeVirtual
                                                                • String ID:
                                                                • API String ID: 1263568516-0
                                                                • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                                • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                                • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                • String ID: SeShutdownPrivilege
                                                                • API String ID: 107509674-3733053543
                                                                • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                APIs
                                                                • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                                • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                                • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                                • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Resource$FindLoadLockSizeof
                                                                • String ID:
                                                                • API String ID: 3473537107-0
                                                                • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                                • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                                APIs
                                                                • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                                • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                                APIs
                                                                • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: SystemTime
                                                                • String ID:
                                                                • API String ID: 2656138-0
                                                                • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                APIs
                                                                • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Version
                                                                • String ID:
                                                                • API String ID: 1889659487-0
                                                                • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                                • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressCloseHandleModuleProc
                                                                • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                • API String ID: 4190037839-2401316094
                                                                • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                • String ID:
                                                                • API String ID: 1694776339-0
                                                                • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                APIs
                                                                • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                • LocalFree.KERNEL32(00593C98,00000000,00401AB4), ref: 00401A1B
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,00593C98,00000000,00401AB4), ref: 00401A3A
                                                                • LocalFree.KERNEL32(00594C98,?,00000000,00008000,00593C98,00000000,00401AB4), ref: 00401A79
                                                                • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                • String ID: RY
                                                                • API String ID: 3782394904-3689137273
                                                                • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                APIs
                                                                • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                                  • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                  • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale$DefaultSystem
                                                                • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                • API String ID: 1044490935-665933166
                                                                • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                                • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                                APIs
                                                                • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                • ExitProcess.KERNEL32 ref: 00403DE5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ExitMessageProcess
                                                                • String ID: Error$Runtime error at 00000000$9@
                                                                • API String ID: 1220098344-1503883590
                                                                • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$AllocString
                                                                • String ID:
                                                                • API String ID: 262959230-0
                                                                • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                                • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CommandHandleLineModule
                                                                • String ID: H'X$U1hd.@
                                                                • API String ID: 2123368496-1267642741
                                                                • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                APIs
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID: )q@
                                                                • API String ID: 3660427363-2284170586
                                                                • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                                • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                                APIs
                                                                • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                                Strings
                                                                • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                                • Setup, xrefs: 00409CAD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Message
                                                                • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                                • API String ID: 2030045667-3271211647
                                                                • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                                • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                                APIs
                                                                • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                                • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                                • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                                • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.3370319684.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.3370267390.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370352732.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.3370499475.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastSleep
                                                                • String ID:
                                                                • API String ID: 1458359878-0
                                                                • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                Execution Graph

                                                                Execution Coverage:16.3%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:4.3%
                                                                Total number of Nodes:2000
                                                                Total number of Limit Nodes:66
                                                                execution_graph 50047 40cc44 50050 406f20 WriteFile 50047->50050 50051 406f3d 50050->50051 50052 499280 50110 403344 50052->50110 50054 49928e 50113 4056a0 50054->50113 50056 499293 50116 40632c GetModuleHandleA GetProcAddress 50056->50116 50060 49929d 50124 40995c 50060->50124 50391 4032fc 50110->50391 50112 403349 GetModuleHandleA GetCommandLineA 50112->50054 50115 4056db 50113->50115 50392 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50113->50392 50115->50056 50117 406348 50116->50117 50118 40634f GetProcAddress 50116->50118 50117->50118 50119 406365 GetProcAddress 50118->50119 50120 40635e 50118->50120 50121 406374 SetProcessDEPPolicy 50119->50121 50122 406378 50119->50122 50120->50119 50121->50122 50123 4063d4 6F9C1CD0 50122->50123 50123->50060 50393 409034 50124->50393 50391->50112 50392->50115 50465 408ccc 50393->50465 50396 4085ec GetSystemDefaultLCID 50400 408622 50396->50400 50397 406dfc 19 API calls 50397->50400 50398 408578 19 API calls 50398->50400 50399 403450 18 API calls 50399->50400 50400->50397 50400->50398 50400->50399 50404 408684 50400->50404 50401 408578 19 API calls 50401->50404 50402 403450 18 API calls 50402->50404 50403 406dfc 19 API calls 50403->50404 50404->50401 50404->50402 50404->50403 50405 408707 50404->50405 50541 403420 50405->50541 50408 408730 GetSystemDefaultLCID 50545 408578 GetLocaleInfoA 50408->50545 50411 403450 18 API calls 50412 408770 50411->50412 50413 408578 19 API calls 50412->50413 50414 408785 50413->50414 50415 408578 19 API calls 50414->50415 50416 4087a9 50415->50416 50551 4085c4 GetLocaleInfoA 50416->50551 50419 4085c4 GetLocaleInfoA 50420 4087d9 50419->50420 50421 408578 19 API calls 50420->50421 50422 4087f3 50421->50422 50423 4085c4 GetLocaleInfoA 50422->50423 50424 408810 50423->50424 50425 408578 19 API calls 50424->50425 50426 40882a 50425->50426 50427 403450 18 API calls 50426->50427 50428 408837 50427->50428 50429 408578 19 API calls 50428->50429 50430 40884c 50429->50430 50431 403450 18 API calls 50430->50431 50432 408859 50431->50432 50433 4085c4 GetLocaleInfoA 50432->50433 50434 408867 50433->50434 50435 408578 19 API calls 50434->50435 50436 408881 50435->50436 50437 403450 18 API calls 50436->50437 50438 40888e 50437->50438 50439 408578 19 API calls 50438->50439 50440 4088a3 50439->50440 50441 403450 18 API calls 50440->50441 50442 4088b0 50441->50442 50443 408578 19 API calls 50442->50443 50444 4088c5 50443->50444 50445 4088e2 50444->50445 50446 4088d3 50444->50446 50448 403494 4 API calls 50445->50448 50559 403494 50446->50559 50449 4088e0 50448->50449 50450 408578 19 API calls 50449->50450 50451 408904 50450->50451 50452 408921 50451->50452 50453 408912 50451->50453 50455 403400 4 API calls 50452->50455 50454 403494 4 API calls 50453->50454 50456 40891f 50454->50456 50455->50456 50553 403634 50456->50553 50466 408cd8 50465->50466 50473 406dfc LoadStringA 50466->50473 50486 4034e0 50473->50486 50476 403450 50477 403454 50476->50477 50480 403464 50476->50480 50479 4034bc 18 API calls 50477->50479 50477->50480 50478 403490 50482 403400 50478->50482 50479->50480 50480->50478 50536 402660 50480->50536 50483 403406 50482->50483 50484 40341f 50482->50484 50483->50484 50485 402660 4 API calls 50483->50485 50484->50396 50485->50484 50491 4034bc 50486->50491 50488 4034f0 50489 403400 4 API calls 50488->50489 50490 403508 50489->50490 50490->50476 50492 4034c0 50491->50492 50493 4034dc 50491->50493 50496 402648 50492->50496 50493->50488 50495 4034c9 50495->50488 50497 40264c 50496->50497 50499 402656 50496->50499 50502 402088 50497->50502 50498 402652 50498->50499 50513 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50498->50513 50499->50495 50499->50499 50503 40209c 50502->50503 50504 4020a1 50502->50504 50514 4019cc RtlInitializeCriticalSection 50503->50514 50506 4020c6 RtlEnterCriticalSection 50504->50506 50507 4020d0 50504->50507 50510 4020a5 50504->50510 50506->50507 50507->50510 50521 401f94 50507->50521 50510->50498 50511 4021f1 RtlLeaveCriticalSection 50512 4021fb 50511->50512 50512->50498 50513->50499 50515 4019f0 RtlEnterCriticalSection 50514->50515 50516 4019fa 50514->50516 50515->50516 50517 401a18 LocalAlloc 50516->50517 50518 401a32 50517->50518 50519 401a81 50518->50519 50520 401a77 RtlLeaveCriticalSection 50518->50520 50519->50504 50520->50519 50524 401fa4 50521->50524 50522 401fd0 50526 401ff4 50522->50526 50532 401db4 50522->50532 50524->50522 50524->50526 50527 401f0c 50524->50527 50526->50511 50526->50512 50528 40178c LocalAlloc VirtualAlloc VirtualFree VirtualFree VirtualAlloc 50527->50528 50529 401f1c 50528->50529 50530 401e80 9 API calls 50529->50530 50531 401f29 50529->50531 50530->50531 50531->50524 50533 401e02 50532->50533 50534 401dd2 50532->50534 50533->50534 50535 401d1c 9 API calls 50533->50535 50534->50526 50535->50534 50537 402664 50536->50537 50538 40266e 50536->50538 50537->50538 50540 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50537->50540 50538->50478 50538->50538 50540->50538 50543 403426 50541->50543 50542 40344b 50542->50408 50543->50542 50544 402660 4 API calls 50543->50544 50544->50543 50546 4085b1 50545->50546 50547 40859f 50545->50547 50549 403494 4 API calls 50546->50549 50548 4034e0 18 API calls 50547->50548 50550 4085af 50548->50550 50549->50550 50550->50411 50552 4085e0 50551->50552 50552->50419 50554 40363c 50553->50554 50555 4034bc 18 API calls 50554->50555 50556 40364f 50555->50556 50557 403450 18 API calls 50556->50557 50558 403677 50557->50558 50560 403498 50559->50560 50561 4034ba 50560->50561 50562 402660 4 API calls 50560->50562 50561->50449 50562->50561 52869 441408 52870 44141f WriteFile 52869->52870 52871 441411 52869->52871 52872 44142a 52870->52872 52871->52870 52871->52871 52873 40ce8c 52874 40ce94 52873->52874 52875 40cebe 52874->52875 52876 40cec2 52874->52876 52877 40ceb7 52874->52877 52878 40cec6 52876->52878 52879 40ced8 52876->52879 52886 406298 GlobalHandle GlobalUnlock GlobalFree 52877->52886 52885 40626c GlobalAlloc GlobalLock 52878->52885 52887 40627c GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 52879->52887 52883 40ced4 52883->52875 52884 408ccc 19 API calls 52883->52884 52884->52875 52885->52883 52886->52875 52887->52883 52888 41364c SetWindowLongA GetWindowLongA 52889 4136a9 SetPropA SetPropA 52888->52889 52890 41368b GetWindowLongA 52888->52890 52894 41f3ac 52889->52894 52890->52889 52891 41369a SetWindowLongA 52890->52891 52891->52889 52899 415280 52894->52899 52906 423c1c 52894->52906 53000 423a94 52894->53000 52895 4136f9 52902 41528d 52899->52902 52900 4152f3 53007 424b9c 13 API calls 52900->53007 52902->52900 52903 4152e8 52902->52903 52905 4152f1 52902->52905 52903->52905 53008 41506c 60 API calls 52903->53008 52905->52895 52909 423c52 52906->52909 52925 423c73 52909->52925 53009 423b78 52909->53009 52910 423cfc 52912 423d03 52910->52912 52913 423d37 52910->52913 52911 423c9d 52914 423ca3 52911->52914 52915 423d60 52911->52915 52920 423d09 52912->52920 52956 423fc1 52912->52956 52916 423d42 52913->52916 52917 4240aa IsIconic 52913->52917 52921 423cd5 52914->52921 52922 423ca8 52914->52922 52918 423d72 52915->52918 52919 423d7b 52915->52919 52923 4240e6 52916->52923 52924 423d4b 52916->52924 52917->52925 52929 4240be GetFocus 52917->52929 52926 423d88 52918->52926 52927 423d79 52918->52927 53018 4241a4 11 API calls 52919->53018 52930 423f23 SendMessageA 52920->52930 52931 423d17 52920->52931 52921->52925 52946 423cee 52921->52946 52947 423e4f 52921->52947 52932 423e06 52922->52932 52933 423cae 52922->52933 53038 424860 WinHelpA PostMessageA 52923->53038 52936 4240fd 52924->52936 52957 423cd0 52924->52957 52925->52895 52937 4241ec 11 API calls 52926->52937 53019 423b94 NtdllDefWindowProc_A 52927->53019 52929->52925 52938 4240cf 52929->52938 52930->52925 52931->52925 52931->52957 52968 423f66 52931->52968 53023 423b94 NtdllDefWindowProc_A 52932->53023 52939 423cb7 52933->52939 52940 423e2e PostMessageA 52933->52940 52944 424106 52936->52944 52945 42411b 52936->52945 52937->52925 53037 41f004 GetCurrentThreadId EnumThreadWindows 52938->53037 52941 423cc0 52939->52941 52942 423eb5 52939->52942 53024 423b94 NtdllDefWindowProc_A 52940->53024 52951 423cc9 52941->52951 52952 423dde IsIconic 52941->52952 52953 423ebe 52942->52953 52954 423eef 52942->52954 52943 423e49 52943->52925 52955 4244e4 19 API calls 52944->52955 53039 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 52945->53039 52946->52957 52958 423e1b 52946->52958 53013 423b94 NtdllDefWindowProc_A 52947->53013 52951->52957 52971 423da1 52951->52971 52963 423dfa 52952->52963 52964 423dee 52952->52964 52962 423b24 5 API calls 52953->52962 53014 423b94 NtdllDefWindowProc_A 52954->53014 52955->52925 52956->52925 52973 423fe7 IsWindowEnabled 52956->52973 52957->52925 53017 423b94 NtdllDefWindowProc_A 52957->53017 52967 424188 26 API calls 52958->52967 52961 4240d6 52961->52925 52970 4240de SetFocus 52961->52970 52972 423ec6 52962->52972 53022 423b94 NtdllDefWindowProc_A 52963->53022 53021 423bd0 29 API calls 52964->53021 52967->52925 52968->52925 52990 423f88 IsWindowEnabled 52968->52990 52969 423e55 52977 423e93 52969->52977 52978 423e71 52969->52978 52970->52925 52971->52925 53020 422c5c ShowWindow PostMessageA PostQuitMessage 52971->53020 52981 423ed8 52972->52981 53025 41ef68 52972->53025 52973->52925 52982 423ff5 52973->52982 52976 423ef5 52983 423f0d 52976->52983 53015 41eeb4 GetCurrentThreadId EnumThreadWindows 52976->53015 52979 423a94 6 API calls 52977->52979 52984 423b24 5 API calls 52978->52984 52985 423e9b PostMessageA 52979->52985 53031 423b94 NtdllDefWindowProc_A 52981->53031 52992 423ffc IsWindowVisible 52982->52992 52989 423a94 6 API calls 52983->52989 52991 423e79 PostMessageA 52984->52991 52985->52925 52989->52925 52990->52925 52993 423f96 52990->52993 52991->52925 52992->52925 52995 42400a GetFocus 52992->52995 53032 412320 21 API calls 52993->53032 53033 4181f0 52995->53033 52997 42401f SetFocus 53035 415250 52997->53035 53001 423aa4 53000->53001 53003 423b1d 53000->53003 53002 423aaa EnumWindows 53001->53002 53001->53003 53002->53003 53004 423ac6 GetWindow GetWindowLongA 53002->53004 53040 423a2c GetWindow 53002->53040 53003->52895 53005 423ae5 53004->53005 53005->53003 53006 423b11 SetWindowPos 53005->53006 53006->53003 53006->53005 53007->52905 53008->52905 53010 423b82 53009->53010 53011 423b8d 53009->53011 53010->53011 53012 408730 21 API calls 53010->53012 53011->52910 53011->52911 53012->53011 53013->52969 53014->52976 53016 41ef39 53015->53016 53016->52983 53017->52925 53018->52925 53019->52925 53020->52925 53021->52925 53022->52925 53023->52925 53024->52943 53026 41ef70 IsWindow 53025->53026 53027 41ef9c 53025->53027 53028 41ef7f EnableWindow 53026->53028 53030 41ef8a 53026->53030 53027->52981 53028->53030 53029 402660 4 API calls 53029->53030 53030->53026 53030->53027 53030->53029 53031->52925 53032->52925 53034 4181fa 53033->53034 53034->52997 53036 41526b SetFocus 53035->53036 53036->52925 53037->52961 53038->52943 53039->52943 53041 423a4d GetWindowLongA 53040->53041 53042 423a59 53040->53042 53041->53042 53043 40cd10 53044 40cd22 53043->53044 53045 40cd1d 53043->53045 53047 406f58 CloseHandle 53045->53047 53047->53044 53048 416b52 53049 416bfa 53048->53049 53050 416b6a 53048->53050 53067 41532c 18 API calls 53049->53067 53052 416b84 SendMessageA 53050->53052 53053 416b78 53050->53053 53063 416bd8 53052->53063 53054 416b82 CallWindowProcA 53053->53054 53055 416b9e 53053->53055 53054->53063 53064 41a068 GetSysColor 53055->53064 53058 416ba9 SetTextColor 53059 416bbe 53058->53059 53065 41a068 GetSysColor 53059->53065 53061 416bc3 SetBkColor 53066 41a6f0 GetSysColor CreateBrushIndirect 53061->53066 53064->53058 53065->53061 53066->53063 53067->53063 53068 49219c 53069 4921d6 53068->53069 53070 4921d8 53069->53070 53071 4921e2 53069->53071 53268 4090a8 MessageBeep 53070->53268 53073 49221a 53071->53073 53074 4921f1 53071->53074 53081 492229 53073->53081 53082 492252 53073->53082 53076 44706c 32 API calls 53074->53076 53075 403420 4 API calls 53077 49282e 53075->53077 53078 4921fe 53076->53078 53079 403400 4 API calls 53077->53079 53269 406bc0 53078->53269 53084 492836 53079->53084 53083 44706c 32 API calls 53081->53083 53089 49228a 53082->53089 53090 492261 53082->53090 53086 492236 53083->53086 53277 406c10 18 API calls 53086->53277 53095 492299 53089->53095 53096 4922b2 53089->53096 53092 44706c 32 API calls 53090->53092 53091 492241 53278 4473c0 19 API calls 53091->53278 53094 49226e 53092->53094 53279 406c44 18 API calls 53094->53279 53281 407290 19 API calls 53095->53281 53103 4922c1 53096->53103 53104 4922e6 53096->53104 53099 492279 53280 4473c0 19 API calls 53099->53280 53100 4922a1 53282 4473c0 19 API calls 53100->53282 53105 44706c 32 API calls 53103->53105 53107 49231e 53104->53107 53108 4922f5 53104->53108 53106 4922ce 53105->53106 53283 4072b8 53106->53283 53115 49232d 53107->53115 53116 492356 53107->53116 53110 44706c 32 API calls 53108->53110 53113 492302 53110->53113 53111 4922d6 53286 447144 19 API calls 53111->53286 53114 42c814 19 API calls 53113->53114 53118 49230d 53114->53118 53117 44706c 32 API calls 53115->53117 53122 4923a2 53116->53122 53123 492365 53116->53123 53119 49233a 53117->53119 53287 4473c0 19 API calls 53118->53287 53288 407208 22 API calls 53119->53288 53128 4923da 53122->53128 53129 4923b1 53122->53129 53125 44706c 32 API calls 53123->53125 53124 492345 53289 4473c0 19 API calls 53124->53289 53127 492374 53125->53127 53130 44706c 32 API calls 53127->53130 53136 4923e9 53128->53136 53137 492412 53128->53137 53131 44706c 32 API calls 53129->53131 53132 492385 53130->53132 53133 4923be 53131->53133 53290 491ea0 22 API calls 53132->53290 53135 42c8b4 19 API calls 53133->53135 53141 4923c9 53135->53141 53139 44706c 32 API calls 53136->53139 53145 49244a 53137->53145 53146 492421 53137->53146 53138 492391 53291 4473c0 19 API calls 53138->53291 53142 4923f6 53139->53142 53292 4473c0 19 API calls 53141->53292 53293 42c8dc 53142->53293 53151 492459 53145->53151 53152 492482 53145->53152 53148 44706c 32 API calls 53146->53148 53150 49242e 53148->53150 53302 42c90c 19 API calls 53150->53302 53154 44706c 32 API calls 53151->53154 53159 4924ba 53152->53159 53160 492491 53152->53160 53156 492466 53154->53156 53155 492439 53303 4473c0 19 API calls 53155->53303 53158 42c93c 19 API calls 53156->53158 53161 492471 53158->53161 53166 4924c9 53159->53166 53167 492506 53159->53167 53162 44706c 32 API calls 53160->53162 53304 4473c0 19 API calls 53161->53304 53164 49249e 53162->53164 53305 42c964 53164->53305 53170 44706c 32 API calls 53166->53170 53173 492558 53167->53173 53174 492515 53167->53174 53168 4921dd 53168->53075 53172 4924d8 53170->53172 53175 44706c 32 API calls 53172->53175 53182 4925cb 53173->53182 53183 492567 53173->53183 53176 44706c 32 API calls 53174->53176 53177 4924e9 53175->53177 53178 492528 53176->53178 53311 42c508 19 API calls 53177->53311 53180 44706c 32 API calls 53178->53180 53185 492539 53180->53185 53181 4924f5 53312 4473c0 19 API calls 53181->53312 53189 49260a 53182->53189 53190 4925da 53182->53190 53256 44706c 53183->53256 53313 492098 26 API calls 53185->53313 53201 492649 53189->53201 53202 492619 53189->53202 53193 44706c 32 API calls 53190->53193 53192 492547 53314 4473c0 19 API calls 53192->53314 53196 4925e7 53193->53196 53194 492582 53197 4925bb 53194->53197 53198 492586 53194->53198 53317 45297c Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 53196->53317 53316 447144 19 API calls 53197->53316 53200 44706c 32 API calls 53198->53200 53205 492595 53200->53205 53210 492688 53201->53210 53211 492658 53201->53211 53206 44706c 32 API calls 53202->53206 53204 4925f4 53318 447144 19 API calls 53204->53318 53261 452cf4 53205->53261 53209 492626 53206->53209 53319 4527e4 53209->53319 53221 4926d0 53210->53221 53222 492697 53210->53222 53215 44706c 32 API calls 53211->53215 53212 492605 53212->53168 53213 4925a5 53315 447144 19 API calls 53213->53315 53219 492665 53215->53219 53217 492633 53326 447144 19 API calls 53217->53326 53327 452e84 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 53219->53327 53228 492718 53221->53228 53229 4926df 53221->53229 53223 44706c 32 API calls 53222->53223 53225 4926a6 53223->53225 53224 492672 53328 447144 19 API calls 53224->53328 53227 44706c 32 API calls 53225->53227 53230 4926b7 53227->53230 53233 49272b 53228->53233 53240 4927e1 53228->53240 53231 44706c 32 API calls 53229->53231 53329 4472ec 53230->53329 53232 4926ee 53231->53232 53234 44706c 32 API calls 53232->53234 53236 44706c 32 API calls 53233->53236 53237 4926ff 53234->53237 53238 492758 53236->53238 53241 4472ec 19 API calls 53237->53241 53239 44706c 32 API calls 53238->53239 53242 49276f 53239->53242 53240->53168 53338 447010 32 API calls 53240->53338 53241->53168 53335 407dec 21 API calls 53242->53335 53244 4927fa 53245 42e8d8 19 API calls 53244->53245 53247 492802 53245->53247 53339 4473c0 19 API calls 53247->53339 53249 492791 53250 44706c 32 API calls 53249->53250 53251 4927a5 53250->53251 53336 408518 18 API calls 53251->53336 53253 4927b0 53337 4473c0 19 API calls 53253->53337 53255 4927bc 53257 447074 53256->53257 53340 4360ec 53257->53340 53259 447093 53260 42c618 21 API calls 53259->53260 53260->53194 53262 452798 2 API calls 53261->53262 53264 452d0d 53262->53264 53263 452d11 53263->53213 53264->53263 53265 452d35 MoveFileA GetLastError 53264->53265 53266 4527d4 Wow64RevertWow64FsRedirection 53265->53266 53267 452d5b 53266->53267 53267->53213 53268->53168 53270 406bcf 53269->53270 53271 406bf1 53270->53271 53272 406be8 53270->53272 53275 403778 18 API calls 53271->53275 53273 403400 4 API calls 53272->53273 53274 406bef 53273->53274 53276 4473c0 19 API calls 53274->53276 53275->53274 53276->53168 53277->53091 53278->53168 53279->53099 53280->53168 53281->53100 53282->53168 53284 403738 53283->53284 53285 4072c2 SetCurrentDirectoryA 53284->53285 53285->53111 53286->53168 53287->53168 53288->53124 53289->53168 53290->53138 53291->53168 53292->53168 53366 42c684 53293->53366 53296 42c8f0 53298 403400 4 API calls 53296->53298 53297 42c8f9 53299 403778 18 API calls 53297->53299 53300 42c8f7 53298->53300 53299->53300 53301 4473c0 19 API calls 53300->53301 53301->53168 53302->53155 53303->53168 53304->53168 53306 42c7ac IsDBCSLeadByte 53305->53306 53307 42c974 53306->53307 53308 403778 18 API calls 53307->53308 53309 42c985 53308->53309 53310 4473c0 19 API calls 53309->53310 53310->53168 53311->53181 53312->53168 53313->53192 53314->53168 53315->53168 53316->53168 53317->53204 53318->53212 53320 452798 2 API calls 53319->53320 53321 4527fa 53320->53321 53322 4527fe 53321->53322 53323 45281c CreateDirectoryA GetLastError 53321->53323 53322->53217 53324 4527d4 Wow64RevertWow64FsRedirection 53323->53324 53325 452842 53324->53325 53325->53217 53326->53168 53327->53224 53328->53168 53330 4472f4 53329->53330 53369 436454 VariantClear 53330->53369 53332 447317 53334 44732e 53332->53334 53370 408c1c 18 API calls 53332->53370 53334->53168 53335->53249 53336->53253 53337->53255 53338->53244 53339->53168 53341 4360f8 53340->53341 53342 43611a 53340->53342 53341->53342 53360 408c1c 18 API calls 53341->53360 53343 43619d 53342->53343 53345 436161 53342->53345 53346 436191 53342->53346 53347 436185 53342->53347 53348 436179 53342->53348 53349 43616d 53342->53349 53365 408c1c 18 API calls 53343->53365 53361 403510 53345->53361 53364 4040e8 32 API calls 53346->53364 53351 403494 4 API calls 53347->53351 53348->53259 53355 403510 18 API calls 53349->53355 53356 43618e 53351->53356 53354 4361ae 53354->53259 53359 436176 53355->53359 53356->53259 53357 43619a 53357->53259 53359->53259 53360->53342 53362 4034e0 18 API calls 53361->53362 53363 40351d 53362->53363 53363->53259 53364->53357 53365->53354 53367 42c68c IsDBCSLeadByte 53366->53367 53368 42c68b 53367->53368 53368->53296 53368->53297 53369->53332 53370->53334 53371 416654 53372 416661 53371->53372 53373 4166bb 53371->53373 53378 416560 CreateWindowExA 53372->53378 53374 416668 SetPropA SetPropA 53374->53373 53375 41669b 53374->53375 53376 4166ae SetWindowPos 53375->53376 53376->53373 53378->53374 53379 46bc10 53380 46bc44 53379->53380 53412 46c0ad 53379->53412 53382 46bcdc 53380->53382 53383 46bcba 53380->53383 53384 46bccb 53380->53384 53385 46bc98 53380->53385 53386 46bca9 53380->53386 53392 46bc80 53380->53392 53381 403400 4 API calls 53388 46c0ec 53381->53388 53656 46bba0 60 API calls 53382->53656 53435 46b7d0 53383->53435 53655 46b990 82 API calls 53384->53655 53653 46b520 62 API calls 53385->53653 53654 46b688 57 API calls 53386->53654 53387 468d38 33 API calls 53398 46bd18 53387->53398 53395 403400 4 API calls 53388->53395 53392->53387 53392->53412 53396 46c0f4 53395->53396 53397 46bc9e 53397->53392 53397->53412 53411 46bd5b 53398->53411 53398->53412 53657 495478 53398->53657 53400 468c74 33 API calls 53400->53411 53401 46be7e 53676 483a70 138 API calls 53401->53676 53402 414af8 18 API calls 53402->53411 53405 42cbd0 20 API calls 53405->53411 53406 46be99 53406->53412 53407 46b02c 37 API calls 53407->53411 53408 403450 18 API calls 53408->53411 53411->53400 53411->53401 53411->53402 53411->53405 53411->53407 53411->53408 53411->53412 53413 46bed7 53411->53413 53431 46bf9f 53411->53431 53470 46ad98 53411->53470 53580 483568 53411->53580 53677 46b2dc 33 API calls 53411->53677 53412->53381 53477 469fe0 53413->53477 53414 46b02c 37 API calls 53414->53412 53416 46bf3d 53417 403450 18 API calls 53416->53417 53418 46bf4d 53417->53418 53419 46bfa9 53418->53419 53420 46bf59 53418->53420 53423 46b02c 37 API calls 53419->53423 53425 46c06b 53419->53425 53421 457fc4 38 API calls 53420->53421 53422 46bf78 53421->53422 53424 457fc4 38 API calls 53422->53424 53426 46bfc3 53423->53426 53424->53431 53427 46c004 53426->53427 53428 46bfec SetActiveWindow 53426->53428 53538 46a388 53427->53538 53428->53427 53430 46c02e 53430->53431 53432 46c04e 53430->53432 53431->53414 53433 46aea8 35 API calls 53432->53433 53434 46c063 53433->53434 53678 46c524 53435->53678 53438 46b952 53439 403420 4 API calls 53438->53439 53441 46b96c 53439->53441 53440 414af8 18 API calls 53442 46b81e 53440->53442 53443 403400 4 API calls 53441->53443 53468 46b93e 53442->53468 53681 45602c 27 API calls 53442->53681 53445 46b974 53443->53445 53444 403450 18 API calls 53444->53438 53447 403400 4 API calls 53445->53447 53448 46b97c 53447->53448 53448->53392 53450 46b901 53450->53438 53455 42cd58 21 API calls 53450->53455 53450->53468 53451 46b8a1 53451->53438 53451->53450 53683 42cd58 53451->53683 53452 46b83c 53452->53451 53454 4666a8 33 API calls 53452->53454 53456 46b86b 53454->53456 53458 46b917 53455->53458 53459 4666a8 33 API calls 53456->53459 53457 4514cc 18 API calls 53460 46b8f1 53457->53460 53463 4514cc 18 API calls 53458->53463 53458->53468 53461 46b87c 53459->53461 53686 47f454 57 API calls 53460->53686 53464 45149c 18 API calls 53461->53464 53465 46b92e 53463->53465 53466 46b891 53464->53466 53687 47f454 57 API calls 53465->53687 53682 47f454 57 API calls 53466->53682 53468->53438 53468->53444 53471 46ada4 53470->53471 53472 46ada9 53470->53472 53476 46ada7 53471->53476 53808 46a804 53471->53808 53893 469b44 60 API calls 53472->53893 53474 46adb1 53474->53411 53476->53411 53478 403400 4 API calls 53477->53478 53479 46a00e 53478->53479 53909 47e184 53479->53909 53481 46a071 53482 46a075 53481->53482 53483 46a08e 53481->53483 53484 4668a8 34 API calls 53482->53484 53485 46a07f 53483->53485 53916 495368 18 API calls 53483->53916 53484->53485 53487 46a1ad 53485->53487 53488 46a218 53485->53488 53537 46a322 53485->53537 53491 403494 4 API calls 53487->53491 53492 403494 4 API calls 53488->53492 53489 403420 4 API calls 53493 46a34c 53489->53493 53490 46a0aa 53490->53485 53494 46a0b2 53490->53494 53495 46a1ba 53491->53495 53496 46a225 53492->53496 53493->53416 53497 46b02c 37 API calls 53494->53497 53498 40357c 18 API calls 53495->53498 53499 40357c 18 API calls 53496->53499 53506 46a0bf 53497->53506 53500 46a1c7 53498->53500 53501 46a232 53499->53501 53502 40357c 18 API calls 53500->53502 53503 40357c 18 API calls 53501->53503 53504 46a1d4 53502->53504 53505 46a23f 53503->53505 53507 40357c 18 API calls 53504->53507 53508 40357c 18 API calls 53505->53508 53509 46a100 53506->53509 53510 46a0e8 SetActiveWindow 53506->53510 53511 46a1e1 53507->53511 53512 46a24c 53508->53512 53917 42f5d4 53509->53917 53510->53509 53513 4668a8 34 API calls 53511->53513 53514 40357c 18 API calls 53512->53514 53515 46a1ef 53513->53515 53516 46a25a 53514->53516 53518 40357c 18 API calls 53515->53518 53519 414b28 18 API calls 53516->53519 53521 46a1f8 53518->53521 53522 46a216 53519->53522 53524 40357c 18 API calls 53521->53524 53525 466be0 25 API calls 53522->53525 53527 46a205 53524->53527 53531 46a27c 53525->53531 53526 46a151 53529 46aea8 35 API calls 53526->53529 53528 414b28 18 API calls 53527->53528 53528->53522 53530 46a183 53529->53530 53530->53416 53532 414b28 18 API calls 53531->53532 53531->53537 53533 46a2df 53532->53533 53934 496228 MulDiv 53533->53934 53535 46a2fc 53536 414b28 18 API calls 53535->53536 53536->53537 53537->53489 53539 46a3b4 53538->53539 53542 46a3ef 53539->53542 53989 47e48c 53539->53989 53541 46a6e4 53544 403400 4 API calls 53541->53544 53548 46a564 53542->53548 53553 46a403 53542->53553 53543 46a58b 53550 414b28 18 API calls 53543->53550 53551 46a709 53544->53551 53545 46a541 53552 46a55c 53545->53552 53557 402660 4 API calls 53545->53557 53546 402660 4 API calls 53546->53553 53547 402648 18 API calls 53547->53553 53548->53541 53548->53543 53549 46a5a1 53548->53549 53555 414b28 18 API calls 53549->53555 53554 46a59f 53550->53554 53551->53430 53552->53430 53553->53546 53553->53547 53563 46a476 53553->53563 54005 496228 MulDiv 53554->54005 53555->53554 53556 46a50d 53558 457fc4 38 API calls 53556->53558 53557->53552 53558->53545 53561 46a5c2 53564 466be0 25 API calls 53561->53564 53562 457fc4 38 API calls 53562->53563 53563->53545 53563->53556 53563->53562 53567 40357c 18 API calls 53563->53567 54004 403ba4 21 API calls 53563->54004 53565 46a5f6 53564->53565 54006 466be8 KiUserCallbackDispatcher 53565->54006 53567->53563 53568 46a609 53569 466be0 25 API calls 53568->53569 53570 46a61a 53569->53570 53571 414b28 18 API calls 53570->53571 53572 46a64d 53571->53572 54007 496228 MulDiv 53572->54007 53574 46a66a 53575 414b28 18 API calls 53574->53575 53576 46a6a1 53575->53576 54008 496228 MulDiv 53576->54008 53578 46a6be 53579 414b28 18 API calls 53578->53579 53579->53541 53581 46c524 63 API calls 53580->53581 53582 4835ab 53581->53582 53583 4835b4 53582->53583 54226 408bf0 19 API calls 53582->54226 53585 414af8 18 API calls 53583->53585 53586 4835c4 53585->53586 53587 403450 18 API calls 53586->53587 53588 4835d1 53587->53588 54036 46c87c 53588->54036 53591 4835e1 53593 414af8 18 API calls 53591->53593 53594 4835f1 53593->53594 53595 403450 18 API calls 53594->53595 53596 4835fe 53595->53596 53597 46992c SendMessageA 53596->53597 53598 483617 53597->53598 53599 483668 53598->53599 54228 47a29c 37 API calls 53598->54228 53601 4241ec 11 API calls 53599->53601 53602 483672 53601->53602 53603 483698 53602->53603 53604 483683 SetActiveWindow 53602->53604 54065 482998 53603->54065 53604->53603 53653->53397 53654->53392 53655->53392 53656->53392 55762 43da3c 53657->55762 53660 4954a4 55767 431c44 53660->55767 53661 495539 53661->53411 53662 49552a 53662->53661 55800 494ca0 18 API calls 53662->55800 53671 4954ee 55798 494d34 18 API calls 53671->55798 53673 495502 55799 433e44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53673->55799 53675 495522 53675->53411 53676->53406 53677->53411 53688 46c5bc 53678->53688 53681->53452 53682->53451 53802 42ccdc 53683->53802 53686->53450 53687->53468 53689 414af8 18 API calls 53688->53689 53690 46c5f0 53689->53690 53749 466940 53690->53749 53693 414b28 18 API calls 53694 46c602 53693->53694 53695 46c611 53694->53695 53699 46c62a 53694->53699 53778 47f454 57 API calls 53695->53778 53697 46c625 53698 403420 4 API calls 53697->53698 53701 46b802 53698->53701 53700 46c671 53699->53700 53702 46c658 53699->53702 53703 46c6d6 53700->53703 53716 46c675 53700->53716 53701->53438 53701->53440 53779 47f454 57 API calls 53702->53779 53781 42cb5c CharNextA 53703->53781 53706 46c6e5 53707 46c6e9 53706->53707 53712 46c702 53706->53712 53782 47f454 57 API calls 53707->53782 53709 46c6bd 53780 47f454 57 API calls 53709->53780 53711 46c726 53783 47f454 57 API calls 53711->53783 53712->53711 53758 466ab0 53712->53758 53716->53709 53716->53712 53719 46c73f 53720 403778 18 API calls 53719->53720 53721 46c755 53720->53721 53766 42c9ac 53721->53766 53724 46c766 53784 466b3c 18 API calls 53724->53784 53725 46c797 53726 42c8dc 19 API calls 53725->53726 53728 46c7a2 53726->53728 53730 42c40c 19 API calls 53728->53730 53729 46c779 53731 4514cc 18 API calls 53729->53731 53733 46c7ad 53730->53733 53732 46c786 53731->53732 53785 47f454 57 API calls 53732->53785 53735 42cbd0 20 API calls 53733->53735 53736 46c7b8 53735->53736 53770 46c550 53736->53770 53738 46c7c0 53739 42cd58 21 API calls 53738->53739 53740 46c7c8 53739->53740 53741 46c7e2 53740->53741 53742 46c7cc 53740->53742 53741->53697 53744 46c7ec 53741->53744 53786 47f454 57 API calls 53742->53786 53745 46c7f4 GetDriveTypeA 53744->53745 53745->53697 53746 46c7ff 53745->53746 53787 47f454 57 API calls 53746->53787 53748 46c813 53748->53697 53753 46695a 53749->53753 53750 406bc0 18 API calls 53750->53753 53752 42cbd0 20 API calls 53752->53753 53753->53750 53753->53752 53754 403450 18 API calls 53753->53754 53755 4669a3 53753->53755 53788 42cabc 53753->53788 53754->53753 53756 403420 4 API calls 53755->53756 53757 4669bd 53756->53757 53757->53693 53759 466aba 53758->53759 53760 466acd 53759->53760 53799 42cb4c CharNextA 53759->53799 53760->53711 53762 466ae0 53760->53762 53764 466aea 53762->53764 53763 466b17 53763->53711 53763->53719 53764->53763 53800 42cb4c CharNextA 53764->53800 53767 42ca05 53766->53767 53768 42c9c2 53766->53768 53767->53724 53767->53725 53768->53767 53801 42cb4c CharNextA 53768->53801 53771 46c5b5 53770->53771 53772 46c563 53770->53772 53771->53738 53772->53771 53773 41eeb4 2 API calls 53772->53773 53774 46c573 53773->53774 53775 46c58d SHPathPrepareForWriteA 53774->53775 53776 41ef68 6 API calls 53775->53776 53777 46c5ad 53776->53777 53777->53738 53778->53697 53779->53697 53780->53697 53781->53706 53782->53697 53783->53697 53784->53729 53785->53697 53786->53697 53787->53748 53789 403494 4 API calls 53788->53789 53790 42cacc 53789->53790 53791 403744 18 API calls 53790->53791 53796 42cb02 53790->53796 53797 42c454 IsDBCSLeadByte 53790->53797 53791->53790 53793 42cb46 53793->53753 53795 4037b8 18 API calls 53795->53796 53796->53793 53796->53795 53798 42c454 IsDBCSLeadByte 53796->53798 53797->53790 53798->53796 53799->53759 53800->53764 53801->53768 53803 42cbd0 20 API calls 53802->53803 53804 42ccfe 53803->53804 53805 42cd06 GetFileAttributesA 53804->53805 53806 403400 4 API calls 53805->53806 53807 42cd23 53806->53807 53807->53450 53807->53457 53810 46a84b 53808->53810 53809 46acc3 53811 46acde 53809->53811 53812 46ad0f 53809->53812 53810->53809 53813 46a906 53810->53813 53816 403494 4 API calls 53810->53816 53815 403494 4 API calls 53811->53815 53817 403494 4 API calls 53812->53817 53814 46a927 53813->53814 53818 46a968 53813->53818 53819 403494 4 API calls 53814->53819 53820 46acec 53815->53820 53821 46a88a 53816->53821 53822 46ad1d 53817->53822 53826 403400 4 API calls 53818->53826 53823 46a935 53819->53823 53905 469220 26 API calls 53820->53905 53825 414af8 18 API calls 53821->53825 53906 469220 26 API calls 53822->53906 53828 414af8 18 API calls 53823->53828 53829 46a8ab 53825->53829 53830 46a966 53826->53830 53833 46a956 53828->53833 53834 403634 18 API calls 53829->53834 53851 46aa4c 53830->53851 53894 46992c 53830->53894 53831 46acfa 53832 403400 4 API calls 53831->53832 53835 46ad40 53832->53835 53837 403634 18 API calls 53833->53837 53838 46a8bb 53834->53838 53841 403400 4 API calls 53835->53841 53836 46aad4 53843 403400 4 API calls 53836->53843 53837->53830 53842 414af8 18 API calls 53838->53842 53840 46a988 53845 46a9c6 53840->53845 53846 46a98e 53840->53846 53847 46ad48 53841->53847 53848 46a8cf 53842->53848 53844 46aad2 53843->53844 53900 469d68 57 API calls 53844->53900 53852 403400 4 API calls 53845->53852 53849 403494 4 API calls 53846->53849 53850 403420 4 API calls 53847->53850 53848->53813 53857 414af8 18 API calls 53848->53857 53853 46a99c 53849->53853 53854 46ad55 53850->53854 53851->53836 53855 46aa93 53851->53855 53856 46a9c4 53852->53856 53859 47c6f0 57 API calls 53853->53859 53854->53476 53860 403494 4 API calls 53855->53860 53868 469c20 57 API calls 53856->53868 53861 46a8f6 53857->53861 53864 46a9b4 53859->53864 53865 46aaa1 53860->53865 53862 403634 18 API calls 53861->53862 53862->53813 53863 46aafd 53871 46ab5e 53863->53871 53872 46ab08 53863->53872 53866 403634 18 API calls 53864->53866 53867 414af8 18 API calls 53865->53867 53866->53856 53869 46aac2 53867->53869 53870 46a9ed 53868->53870 53873 403634 18 API calls 53869->53873 53876 46aa4e 53870->53876 53877 46a9f8 53870->53877 53874 403400 4 API calls 53871->53874 53875 403494 4 API calls 53872->53875 53873->53844 53878 46ab66 53874->53878 53883 46ab16 53875->53883 53880 403400 4 API calls 53876->53880 53879 403494 4 API calls 53877->53879 53881 46ab5c 53878->53881 53892 46ac0f 53878->53892 53885 46aa06 53879->53885 53880->53851 53881->53878 53901 495368 18 API calls 53881->53901 53883->53878 53883->53881 53886 403634 18 API calls 53883->53886 53884 46ab89 53884->53892 53902 495614 32 API calls 53884->53902 53885->53851 53888 403634 18 API calls 53885->53888 53886->53883 53888->53885 53890 46acb0 53904 429154 SendMessageA SendMessageA 53890->53904 53903 429104 SendMessageA 53892->53903 53893->53474 53907 42a050 SendMessageA 53894->53907 53896 46993b 53897 46995b 53896->53897 53908 42a050 SendMessageA 53896->53908 53897->53840 53899 46994b 53899->53840 53900->53863 53901->53884 53902->53892 53903->53890 53904->53809 53905->53831 53906->53831 53907->53896 53908->53899 53910 47e19d 53909->53910 53913 47e1da 53909->53913 53935 455db4 53910->53935 53913->53481 53915 47e1f1 53915->53481 53916->53490 53918 42f5e0 53917->53918 53919 42f603 GetActiveWindow GetFocus 53918->53919 53920 41eeb4 2 API calls 53919->53920 53921 42f61a 53920->53921 53922 42f637 53921->53922 53923 42f627 RegisterClassA 53921->53923 53924 42f6c6 SetFocus 53922->53924 53925 42f645 CreateWindowExA 53922->53925 53923->53922 53926 403400 4 API calls 53924->53926 53925->53924 53927 42f678 53925->53927 53928 42f6e2 53926->53928 53983 42428c 53927->53983 53933 495614 32 API calls 53928->53933 53930 42f6a0 53931 42f6a8 CreateWindowExA 53930->53931 53931->53924 53932 42f6be ShowWindow 53931->53932 53932->53924 53933->53526 53934->53535 53936 455dc5 53935->53936 53937 455dd2 53936->53937 53938 455dc9 53936->53938 53968 455b98 43 API calls 53937->53968 53960 455ab8 53938->53960 53941 455dcf 53941->53913 53942 47ddf4 53941->53942 53948 47de34 53942->53948 53954 47def0 53942->53954 53943 403420 4 API calls 53944 47dfd3 53943->53944 53944->53915 53945 479a9c 33 API calls 53945->53954 53946 479bdc 33 API calls 53946->53948 53948->53946 53949 47de9c 53948->53949 53953 47c6f0 57 API calls 53948->53953 53948->53954 53956 47de93 53948->53956 53977 479d58 53948->53977 53949->53948 53951 47c6f0 57 API calls 53949->53951 53955 42c93c 19 API calls 53949->53955 53957 42c964 19 API calls 53949->53957 53959 47dedd 53949->53959 53981 47db00 66 API calls 53949->53981 53950 47c6f0 57 API calls 53950->53954 53951->53949 53952 454174 34 API calls 53952->53954 53953->53948 53954->53945 53954->53950 53954->53952 53954->53956 53955->53949 53956->53943 53957->53949 53959->53956 53961 42de2c RegOpenKeyExA 53960->53961 53962 455ad5 53961->53962 53963 455b23 53962->53963 53969 4559ec 53962->53969 53963->53941 53966 4559ec 20 API calls 53967 455b04 RegCloseKey 53966->53967 53967->53941 53968->53941 53974 42dd68 53969->53974 53971 455a14 53972 403420 4 API calls 53971->53972 53973 455a9e 53972->53973 53973->53966 53975 42dc10 20 API calls 53974->53975 53976 42dd71 53975->53976 53976->53971 53978 479d64 53977->53978 53979 479d7f 53978->53979 53982 4533b8 18 API calls 53978->53982 53979->53948 53981->53949 53982->53979 53984 4242be 53983->53984 53985 42429e GetWindowTextA 53983->53985 53987 403494 4 API calls 53984->53987 53986 4034e0 18 API calls 53985->53986 53988 4242bc 53986->53988 53987->53988 53988->53930 53990 402648 18 API calls 53989->53990 53991 47e4b0 53990->53991 53992 47ddf4 75 API calls 53991->53992 53993 47e4d3 53992->53993 53994 47e4e0 53993->53994 53995 47e568 53993->53995 54032 4953c4 32 API calls 53994->54032 53997 47e57c 53995->53997 54009 47e21c 53995->54009 54000 47e5a8 53997->54000 54003 402660 4 API calls 53997->54003 53998 47e522 53998->53542 54001 402660 4 API calls 54000->54001 54002 47e5b2 54001->54002 54002->53542 54003->53997 54004->53563 54005->53561 54006->53568 54007->53574 54008->53578 54010 403494 4 API calls 54009->54010 54011 47e24b 54010->54011 54012 42c93c 19 API calls 54011->54012 54023 47e2af 54011->54023 54013 47e266 54012->54013 54033 42ca10 21 API calls 54013->54033 54014 47e2bf 54016 403400 4 API calls 54014->54016 54019 47e3f9 54016->54019 54017 47e32b 54017->54014 54018 47e380 54017->54018 54035 453c80 25 API calls 54017->54035 54024 402648 18 API calls 54018->54024 54021 403420 4 API calls 54019->54021 54026 47e406 54021->54026 54022 47e375 54027 403494 4 API calls 54022->54027 54023->54014 54023->54017 54025 402660 4 API calls 54023->54025 54028 47e394 54024->54028 54025->54023 54026->53997 54027->54018 54029 47e3bc MultiByteToWideChar 54028->54029 54029->54014 54030 47e271 54030->54023 54034 42e8b0 CharNextA 54030->54034 54032->53998 54033->54030 54034->54030 54035->54022 54037 46c8a5 54036->54037 54038 46c8f2 54037->54038 54039 414af8 18 API calls 54037->54039 54041 403420 4 API calls 54038->54041 54040 46c8bb 54039->54040 54235 4669cc 20 API calls 54040->54235 54043 46c99c 54041->54043 54043->53591 54227 408bf0 19 API calls 54043->54227 54044 46c8c3 54045 414b28 18 API calls 54044->54045 54046 46c8d1 54045->54046 54047 46c8de 54046->54047 54049 46c8f7 54046->54049 54236 47f454 57 API calls 54047->54236 54050 46c90f 54049->54050 54051 466ab0 CharNextA 54049->54051 54237 47f454 57 API calls 54050->54237 54053 46c90b 54051->54053 54053->54050 54054 46c925 54053->54054 54055 46c941 54054->54055 54056 46c92b 54054->54056 54057 42c9ac CharNextA 54055->54057 54238 47f454 57 API calls 54056->54238 54059 46c94e 54057->54059 54059->54038 54239 466b3c 18 API calls 54059->54239 54061 46c965 54062 4514cc 18 API calls 54061->54062 54063 46c972 54062->54063 54240 47f454 57 API calls 54063->54240 54066 4829e9 54065->54066 54067 4829bb 54065->54067 54069 47600c 54066->54069 54241 4953c4 32 API calls 54067->54241 54070 457db8 38 API calls 54069->54070 54071 476058 54070->54071 54072 4072b8 SetCurrentDirectoryA 54071->54072 54073 476062 54072->54073 54242 46e408 54073->54242 54077 476072 54250 45a1f0 54077->54250 54080 47c6f0 57 API calls 54081 4760c9 54080->54081 54083 4760d9 54081->54083 54670 4533b8 18 API calls 54081->54670 54084 4760fb 54083->54084 54671 4533b8 18 API calls 54083->54671 54086 479260 34 API calls 54084->54086 54087 476106 54086->54087 54254 47992c 54087->54254 54090 403450 18 API calls 54091 47612d 54090->54091 54092 403450 18 API calls 54091->54092 54093 47613b 54092->54093 54258 46eb5c 54093->54258 54228->53599 54235->54044 54236->54038 54237->54038 54238->54038 54239->54061 54240->54038 54241->54066 54243 46e47b 54242->54243 54245 46e425 54242->54245 54246 46e480 54243->54246 54244 479bdc 33 API calls 54244->54245 54245->54243 54245->54244 54247 46e4a6 54246->54247 54679 44fb90 54247->54679 54249 46e502 54249->54077 54251 45a1f6 54250->54251 54252 45a4d8 4 API calls 54251->54252 54253 45a212 54252->54253 54253->54080 54255 479939 54254->54255 54256 47610e 54255->54256 54257 4797d4 33 API calls 54255->54257 54256->54090 54257->54256 54259 46eb9a 54258->54259 54260 46eb8a 54258->54260 54262 403400 4 API calls 54259->54262 54261 403494 4 API calls 54260->54261 54263 46eb98 54261->54263 54262->54263 54264 455608 5 API calls 54263->54264 54265 46ebae 54264->54265 54266 455644 5 API calls 54265->54266 54267 46ebbc 54266->54267 54268 46eb34 19 API calls 54267->54268 54269 46ebd0 54268->54269 54270 45a2ac 18 API calls 54269->54270 54271 46ebe8 54270->54271 54272 403420 4 API calls 54271->54272 54273 46ec02 54272->54273 54274 403400 4 API calls 54273->54274 54275 46ec0a 54274->54275 54276 46ed68 54275->54276 54277 4034e0 18 API calls 54276->54277 54278 46eda5 54277->54278 54279 46edae 54278->54279 54280 46edbd 54278->54280 54281 47c6f0 57 API calls 54279->54281 54282 403400 4 API calls 54280->54282 54283 46edbb 54281->54283 54282->54283 54284 47c6f0 57 API calls 54283->54284 54285 46ede0 54284->54285 54286 46ee0f 54285->54286 54691 46ec1c 19 API calls 54285->54691 54688 46ed54 54286->54688 54670->54083 54671->54084 54682 44fba4 54679->54682 54683 44fbb5 54682->54683 54684 44fba1 54683->54684 54685 44fbdf MulDiv 54683->54685 54684->54249 54686 4181f0 54685->54686 54687 44fc0a SendMessageA 54686->54687 54687->54684 54691->54286 55801 431f60 55762->55801 55764 403400 4 API calls 55765 43daea 55764->55765 55765->53660 55765->53662 55766 43da66 55766->55764 55768 431c4a 55767->55768 55769 402648 18 API calls 55768->55769 55770 431c7a 55769->55770 55771 494ed0 55770->55771 55772 494fa5 55771->55772 55775 494eea 55771->55775 55778 494fe8 55772->55778 55773 433de0 18 API calls 55773->55775 55775->55772 55775->55773 55777 403450 18 API calls 55775->55777 55806 408c1c 18 API calls 55775->55806 55807 431d14 55775->55807 55777->55775 55779 495004 55778->55779 55815 433de0 55779->55815 55781 495009 55782 431d14 18 API calls 55781->55782 55783 495014 55782->55783 55784 43d608 55783->55784 55785 43d635 55784->55785 55790 43d627 55784->55790 55785->53671 55786 43d6b1 55794 43d76b 55786->55794 55818 4470f8 55786->55818 55788 43d6fc 55824 43ddc4 55788->55824 55790->55785 55790->55786 55791 4470f8 18 API calls 55790->55791 55791->55790 55792 43d971 55792->55785 55844 447098 18 API calls 55792->55844 55794->55792 55795 43d952 55794->55795 55842 447098 18 API calls 55794->55842 55843 447098 18 API calls 55795->55843 55798->53673 55799->53675 55800->53661 55802 403494 4 API calls 55801->55802 55804 431f6f 55802->55804 55803 431f99 55803->55766 55804->55803 55805 403744 18 API calls 55804->55805 55805->55804 55806->55775 55808 431d22 55807->55808 55811 431d34 55807->55811 55813 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55808->55813 55810 431d56 55810->55775 55811->55810 55814 431cb4 18 API calls 55811->55814 55813->55811 55814->55810 55816 402648 18 API calls 55815->55816 55817 433def 55816->55817 55817->55781 55819 447117 55818->55819 55820 44711e 55818->55820 55845 446ea4 18 API calls 55819->55845 55822 431d14 18 API calls 55820->55822 55823 44712e 55822->55823 55823->55788 55825 43dde0 55824->55825 55837 43de0d 55824->55837 55826 402660 4 API calls 55825->55826 55825->55837 55826->55825 55827 43de42 55827->55794 55829 43ff19 55829->55827 55850 447098 18 API calls 55829->55850 55830 43c9ac 18 API calls 55830->55837 55832 447098 18 API calls 55832->55837 55836 433d8c 18 API calls 55836->55837 55837->55827 55837->55829 55837->55830 55837->55832 55837->55836 55838 433b8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55837->55838 55839 4366c4 18 API calls 55837->55839 55840 431cb4 18 API calls 55837->55840 55841 446ea4 18 API calls 55837->55841 55846 436ec0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55837->55846 55847 439754 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55837->55847 55848 43dcbc 32 API calls 55837->55848 55849 433da8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55837->55849 55838->55837 55839->55837 55840->55837 55841->55837 55842->55794 55843->55792 55844->55792 55845->55820 55846->55837 55847->55837 55848->55837 55849->55837 55850->55829 55851 42f594 55852 42f5a3 NtdllDefWindowProc_A 55851->55852 55853 42f59f 55851->55853 55852->55853 55854 435954 55855 435969 55854->55855 55859 435983 55855->55859 55860 43533c 55855->55860 55866 435386 55860->55866 55870 43536c 55860->55870 55861 403400 4 API calls 55862 43578b 55861->55862 55862->55859 55873 43579c 18 API calls 55862->55873 55863 446e18 18 API calls 55863->55870 55864 403450 18 API calls 55864->55870 55865 402648 18 API calls 55865->55870 55866->55861 55867 431d14 18 API calls 55867->55870 55869 4038a4 18 API calls 55869->55870 55870->55863 55870->55864 55870->55865 55870->55866 55870->55867 55870->55869 55871 403744 18 API calls 55870->55871 55874 434424 55870->55874 55886 434be8 18 API calls 55870->55886 55871->55870 55873->55859 55875 4344e1 55874->55875 55876 434451 55874->55876 55905 434384 18 API calls 55875->55905 55877 403494 4 API calls 55876->55877 55879 43445f 55877->55879 55880 403778 18 API calls 55879->55880 55884 434480 55880->55884 55881 403400 4 API calls 55882 434531 55881->55882 55882->55870 55883 4344d3 55883->55881 55884->55883 55887 49501c 55884->55887 55886->55870 55888 4950ec 55887->55888 55889 495054 55887->55889 55906 4489a4 55888->55906 55890 403494 4 API calls 55889->55890 55892 49505f 55890->55892 55893 49506f 55892->55893 55896 4037b8 18 API calls 55892->55896 55894 403400 4 API calls 55893->55894 55895 495110 55894->55895 55897 403400 4 API calls 55895->55897 55899 495088 55896->55899 55898 495118 55897->55898 55898->55884 55899->55893 55900 4037b8 18 API calls 55899->55900 55901 4950ab 55900->55901 55902 403778 18 API calls 55901->55902 55903 4950dc 55902->55903 55904 403634 18 API calls 55903->55904 55904->55888 55905->55883 55907 4489c9 55906->55907 55917 448a0c 55906->55917 55908 403494 4 API calls 55907->55908 55909 4489d4 55908->55909 55914 4037b8 18 API calls 55909->55914 55910 448a20 55912 403400 4 API calls 55910->55912 55913 448a53 55912->55913 55913->55893 55915 4489f0 55914->55915 55916 4037b8 18 API calls 55915->55916 55916->55917 55917->55910 55918 4485a0 55917->55918 55919 403494 4 API calls 55918->55919 55920 4485d6 55919->55920 55921 4037b8 18 API calls 55920->55921 55922 4485e8 55921->55922 55923 403778 18 API calls 55922->55923 55924 448609 55923->55924 55925 4037b8 18 API calls 55924->55925 55926 448621 55925->55926 55927 403778 18 API calls 55926->55927 55928 44864c 55927->55928 55929 4037b8 18 API calls 55928->55929 55930 448664 55929->55930 55931 448737 55930->55931 55933 4486d1 LoadLibraryA 55930->55933 55936 4486bf LoadLibraryExA 55930->55936 55938 44869c 55930->55938 55939 403b80 18 API calls 55930->55939 55940 403450 18 API calls 55930->55940 55942 43dafc 18 API calls 55930->55942 55934 44873f GetProcAddress 55931->55934 55932 403420 4 API calls 55935 44877c 55932->55935 55933->55930 55937 448752 55934->55937 55935->55910 55936->55930 55937->55938 55938->55932 55939->55930 55940->55930 55942->55930 55943 44b51c 55944 44b52a 55943->55944 55946 44b549 55943->55946 55945 44b400 25 API calls 55944->55945 55944->55946 55945->55946 55947 44879c 55948 4487d1 55947->55948 55949 4487ca 55947->55949 55950 4487e5 55948->55950 55952 4485a0 21 API calls 55948->55952 55951 403400 4 API calls 55949->55951 55950->55949 55953 403494 4 API calls 55950->55953 55954 44897b 55951->55954 55952->55950 55955 4487fe 55953->55955 55956 4037b8 18 API calls 55955->55956 55957 44881a 55956->55957 55958 4037b8 18 API calls 55957->55958 55959 448836 55958->55959 55959->55949 55960 44884a 55959->55960 55961 4037b8 18 API calls 55960->55961 55962 448864 55961->55962 55963 431c44 18 API calls 55962->55963 55964 448886 55963->55964 55965 431d14 18 API calls 55964->55965 55972 4488a6 55964->55972 55965->55964 55966 4488fc 55979 4423a8 55966->55979 55967 4488e4 55967->55966 55991 443644 18 API calls 55967->55991 55971 448930 GetLastError 55992 448534 18 API calls 55971->55992 55972->55967 55990 443644 18 API calls 55972->55990 55974 44893f 55993 443684 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55974->55993 55976 448954 55994 443694 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55976->55994 55978 44895c 55980 443386 55979->55980 55981 4423e1 55979->55981 55983 403400 4 API calls 55980->55983 55982 403400 4 API calls 55981->55982 55984 4423e9 55982->55984 55985 44339b 55983->55985 55986 431c44 18 API calls 55984->55986 55985->55971 55988 4423f5 55986->55988 55987 443376 55987->55971 55988->55987 55995 441a80 18 API calls 55988->55995 55990->55972 55991->55966 55992->55974 55993->55976 55994->55978 55995->55988 55996 416420 55997 416432 55996->55997 55998 416472 GetClassInfoA 55997->55998 56016 408d3c 33 API calls 55997->56016 55999 41649e 55998->55999 56001 4164fe 55999->56001 56002 4164c0 RegisterClassA 55999->56002 56003 4164b0 UnregisterClassA 55999->56003 56007 4164f9 56001->56007 56011 416527 56001->56011 56002->56001 56005 4164e8 56002->56005 56003->56002 56004 41646d 56004->55998 56006 408ccc 19 API calls 56005->56006 56006->56007 56007->56001 56008 408ccc 19 API calls 56007->56008 56008->56011 56009 407554 4 API calls 56010 416534 56009->56010 56017 418394 7 API calls 56010->56017 56011->56009 56013 416540 56014 41a1f8 19 API calls 56013->56014 56015 41654a 56014->56015 56016->56004 56017->56013 56018 492dec 56019 492e20 56018->56019 56020 492e22 56019->56020 56021 492e36 56019->56021 56154 447010 32 API calls 56020->56154 56024 492e72 56021->56024 56025 492e45 56021->56025 56023 492e2b Sleep 56026 492e6d 56023->56026 56031 492eae 56024->56031 56032 492e81 56024->56032 56027 44706c 32 API calls 56025->56027 56028 403420 4 API calls 56026->56028 56029 492e54 56027->56029 56030 4932e0 56028->56030 56033 492e5c FindWindowA 56029->56033 56037 492ebd 56031->56037 56038 492f04 56031->56038 56034 44706c 32 API calls 56032->56034 56035 4472ec 19 API calls 56033->56035 56036 492e8e 56034->56036 56035->56026 56039 492e96 FindWindowA 56036->56039 56155 447010 32 API calls 56037->56155 56044 492f60 56038->56044 56045 492f13 56038->56045 56041 4472ec 19 API calls 56039->56041 56043 492ea9 56041->56043 56042 492ec9 56156 447010 32 API calls 56042->56156 56043->56026 56051 492fbc 56044->56051 56052 492f6f 56044->56052 56159 447010 32 API calls 56045->56159 56048 492ed6 56157 447010 32 API calls 56048->56157 56049 492f1f 56160 447010 32 API calls 56049->56160 56061 492fcb 56051->56061 56062 492ff6 56051->56062 56164 447010 32 API calls 56052->56164 56054 492ee3 56158 447010 32 API calls 56054->56158 56056 492f2c 56161 447010 32 API calls 56056->56161 56058 492f7b 56165 447010 32 API calls 56058->56165 56060 492eee SendMessageA 56065 4472ec 19 API calls 56060->56065 56066 44706c 32 API calls 56061->56066 56073 493005 56062->56073 56074 493044 56062->56074 56064 492f39 56162 447010 32 API calls 56064->56162 56065->56043 56069 492fd8 56066->56069 56067 492f88 56166 447010 32 API calls 56067->56166 56076 492fe0 RegisterClipboardFormatA 56069->56076 56071 492f44 PostMessageA 56163 447144 19 API calls 56071->56163 56072 492f95 56167 447010 32 API calls 56072->56167 56169 447010 32 API calls 56073->56169 56082 493098 56074->56082 56083 493053 56074->56083 56079 4472ec 19 API calls 56076->56079 56079->56026 56080 492fa0 SendNotifyMessageA 56168 447144 19 API calls 56080->56168 56081 493011 56170 447010 32 API calls 56081->56170 56091 4930ec 56082->56091 56092 4930a7 56082->56092 56172 447010 32 API calls 56083->56172 56087 49301e 56171 447010 32 API calls 56087->56171 56088 49305f 56173 447010 32 API calls 56088->56173 56090 493029 SendMessageA 56094 4472ec 19 API calls 56090->56094 56101 4930fb 56091->56101 56102 49314e 56091->56102 56176 447010 32 API calls 56092->56176 56094->56043 56096 49306c 56174 447010 32 API calls 56096->56174 56097 4930b3 56177 447010 32 API calls 56097->56177 56100 493077 PostMessageA 56175 447144 19 API calls 56100->56175 56105 44706c 32 API calls 56101->56105 56110 49315d 56102->56110 56111 4931d5 56102->56111 56103 4930c0 56178 447010 32 API calls 56103->56178 56106 493108 56105->56106 56108 42e3a4 2 API calls 56106->56108 56112 493115 56108->56112 56109 4930cb SendNotifyMessageA 56179 447144 19 API calls 56109->56179 56114 44706c 32 API calls 56110->56114 56119 49320a 56111->56119 56120 4931e4 56111->56120 56116 49312b GetLastError 56112->56116 56117 49311b 56112->56117 56115 49316c 56114->56115 56180 447010 32 API calls 56115->56180 56121 4472ec 19 API calls 56116->56121 56118 4472ec 19 API calls 56117->56118 56122 493129 56118->56122 56129 493219 56119->56129 56130 49323c 56119->56130 56185 447010 32 API calls 56120->56185 56121->56122 56126 4472ec 19 API calls 56122->56126 56125 4931ee FreeLibrary 56186 447144 19 API calls 56125->56186 56126->56026 56127 49317f GetProcAddress 56131 49318b 56127->56131 56132 4931c5 56127->56132 56133 44706c 32 API calls 56129->56133 56137 49324b 56130->56137 56143 49327f 56130->56143 56181 447010 32 API calls 56131->56181 56184 447144 19 API calls 56132->56184 56134 493225 56133->56134 56139 49322d CreateMutexA 56134->56139 56187 48d220 32 API calls 56137->56187 56138 493197 56182 447010 32 API calls 56138->56182 56139->56026 56142 4931a4 56146 4472ec 19 API calls 56142->56146 56143->56026 56189 48d220 32 API calls 56143->56189 56145 493257 56147 493268 OemToCharBuffA 56145->56147 56148 4931b5 56146->56148 56188 48d238 19 API calls 56147->56188 56183 447144 19 API calls 56148->56183 56151 49329a 56152 4932ab CharToOemBuffA 56151->56152 56190 48d238 19 API calls 56152->56190 56154->56023 56155->56042 56156->56048 56157->56054 56158->56060 56159->56049 56160->56056 56161->56064 56162->56071 56163->56043 56164->56058 56165->56067 56166->56072 56167->56080 56168->56026 56169->56081 56170->56087 56171->56090 56172->56088 56173->56096 56174->56100 56175->56043 56176->56097 56177->56103 56178->56109 56179->56026 56180->56127 56181->56138 56182->56142 56183->56043 56184->56043 56185->56125 56186->56026 56187->56145 56188->56026 56189->56151 56190->56026 56191 41ee64 56192 41ee73 IsWindowVisible 56191->56192 56193 41eea9 56191->56193 56192->56193 56194 41ee7d IsWindowEnabled 56192->56194 56194->56193 56195 41ee87 56194->56195 56196 402648 18 API calls 56195->56196 56197 41ee91 EnableWindow 56196->56197 56197->56193 56198 41fb68 56199 41fb71 56198->56199 56202 41fe0c 56199->56202 56201 41fb7e 56203 41fefe 56202->56203 56204 41fe23 56202->56204 56203->56201 56204->56203 56223 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56204->56223 56206 41fe59 56207 41fe83 56206->56207 56208 41fe5d 56206->56208 56233 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56207->56233 56224 41fbac 56208->56224 56212 41fe91 56213 41fe95 56212->56213 56214 41febb 56212->56214 56216 41fbac 10 API calls 56213->56216 56217 41fbac 10 API calls 56214->56217 56215 41fbac 10 API calls 56218 41fe81 56215->56218 56219 41fea7 56216->56219 56220 41fecd 56217->56220 56218->56201 56221 41fbac 10 API calls 56219->56221 56222 41fbac 10 API calls 56220->56222 56221->56218 56222->56218 56223->56206 56225 41fbc7 56224->56225 56226 41f94c 4 API calls 56225->56226 56227 41fbdd 56225->56227 56226->56227 56234 41f94c 56227->56234 56229 41fc25 56230 41fc48 SetScrollInfo 56229->56230 56242 41faac 56230->56242 56233->56212 56235 4181f0 56234->56235 56236 41f969 GetWindowLongA 56235->56236 56237 41f9a6 56236->56237 56238 41f986 56236->56238 56254 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56237->56254 56253 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56238->56253 56241 41f992 56241->56229 56243 41faba 56242->56243 56244 41fac2 56242->56244 56243->56215 56245 41fb01 56244->56245 56246 41faf1 56244->56246 56251 41faff 56244->56251 56256 417e58 IsWindowVisible ScrollWindow SetWindowPos 56245->56256 56255 417e58 IsWindowVisible ScrollWindow SetWindowPos 56246->56255 56247 41fb41 GetScrollPos 56247->56243 56250 41fb4c 56247->56250 56252 41fb5b SetScrollPos 56250->56252 56251->56247 56252->56243 56253->56241 56254->56241 56255->56251 56256->56251 56257 4205a8 56258 4205bb 56257->56258 56278 415b40 56258->56278 56260 4205f6 56261 420702 56260->56261 56263 420661 56260->56263 56271 420652 MulDiv 56260->56271 56262 420719 56261->56262 56285 4146e4 KiUserCallbackDispatcher 56261->56285 56265 420730 56262->56265 56286 414728 KiUserCallbackDispatcher 56262->56286 56283 420858 34 API calls 56263->56283 56270 420752 56265->56270 56287 420070 12 API calls 56265->56287 56268 42067a 56268->56261 56284 420070 12 API calls 56268->56284 56282 41a314 19 API calls 56271->56282 56274 420697 56275 4206b3 MulDiv 56274->56275 56276 4206d6 56274->56276 56275->56276 56276->56261 56277 4206df MulDiv 56276->56277 56277->56261 56279 415b52 56278->56279 56288 414480 56279->56288 56281 415b6a 56281->56260 56282->56263 56283->56268 56284->56274 56285->56262 56286->56265 56287->56270 56289 41449a 56288->56289 56292 410468 56289->56292 56291 4144b0 56291->56281 56295 40dcb4 56292->56295 56294 41046e 56294->56291 56296 40dd16 56295->56296 56299 40dcc7 56295->56299 56302 40dd24 56296->56302 56300 40dd24 33 API calls 56299->56300 56301 40dcf1 56300->56301 56301->56294 56303 40dd34 56302->56303 56305 40dd4a 56303->56305 56314 40e0ac 56303->56314 56330 40d5f0 56303->56330 56333 40df5c 56305->56333 56308 40d5f0 19 API calls 56309 40dd52 56308->56309 56309->56308 56310 40ddbe 56309->56310 56336 40db70 56309->56336 56311 40df5c 19 API calls 56310->56311 56313 40dd20 56311->56313 56313->56294 56315 40e97c 19 API calls 56314->56315 56317 40e0e7 56315->56317 56316 403778 18 API calls 56316->56317 56317->56316 56318 40e19d 56317->56318 56403 40d784 19 API calls 56317->56403 56404 40e090 19 API calls 56317->56404 56319 40e1c7 56318->56319 56320 40e1b8 56318->56320 56400 40ba34 56319->56400 56350 40e3d0 56320->56350 56325 40e1c5 56327 403400 4 API calls 56325->56327 56328 40e26c 56327->56328 56328->56303 56331 40ea18 19 API calls 56330->56331 56332 40d5fa 56331->56332 56332->56303 56437 40d4cc 56333->56437 56337 40df64 19 API calls 56336->56337 56338 40dba3 56337->56338 56339 40e97c 19 API calls 56338->56339 56340 40dbae 56339->56340 56341 40e97c 19 API calls 56340->56341 56342 40dbb9 56341->56342 56343 40dbd4 56342->56343 56344 40dbcb 56342->56344 56349 40dbd1 56342->56349 56446 40d9e8 56343->56446 56449 40dad8 33 API calls 56344->56449 56347 403420 4 API calls 56348 40dc9f 56347->56348 56348->56309 56349->56347 56351 40e406 56350->56351 56352 40e3fc 56350->56352 56354 40e521 56351->56354 56355 40e4a5 56351->56355 56356 40e506 56351->56356 56357 40e586 56351->56357 56358 40e448 56351->56358 56359 40e4e9 56351->56359 56360 40e479 56351->56360 56361 40e4cb 56351->56361 56391 40e46c 56351->56391 56406 40d450 19 API calls 56352->56406 56363 40d774 19 API calls 56354->56363 56414 40de34 19 API calls 56355->56414 56419 40e8a0 19 API calls 56356->56419 56369 40d774 19 API calls 56357->56369 56407 40d774 56358->56407 56417 40e9b8 19 API calls 56359->56417 56360->56391 56413 40d828 19 API calls 56360->56413 56416 40ddf4 19 API calls 56361->56416 56372 40e529 56363->56372 56365 403400 4 API calls 56373 40e5fb 56365->56373 56376 40e58e 56369->56376 56379 40e533 56372->56379 56389 40e52d 56372->56389 56373->56325 56374 40e4f4 56418 409d48 18 API calls 56374->56418 56375 40e4b0 56415 40d480 19 API calls 56375->56415 56382 40e592 56376->56382 56383 40e5ab 56376->56383 56377 40e471 56412 40dee8 19 API calls 56377->56412 56378 40e454 56410 40de34 19 API calls 56378->56410 56420 40ea18 56379->56420 56384 40ea18 19 API calls 56382->56384 56426 40de34 19 API calls 56383->56426 56384->56391 56388 40e531 56388->56391 56424 40de34 19 API calls 56388->56424 56389->56388 56393 40ea18 19 API calls 56389->56393 56391->56365 56392 40e45f 56411 40e27c 19 API calls 56392->56411 56396 40e554 56393->56396 56423 40d8b0 19 API calls 56396->56423 56397 40e576 56425 40e2e4 18 API calls 56397->56425 56432 40b9e0 56400->56432 56403->56317 56404->56317 56405 40d784 19 API calls 56405->56325 56406->56351 56408 40ea18 19 API calls 56407->56408 56409 40d77e 56408->56409 56409->56377 56409->56378 56410->56392 56411->56391 56412->56360 56413->56391 56414->56375 56415->56391 56416->56391 56417->56374 56418->56391 56419->56391 56427 40d790 56420->56427 56423->56388 56424->56397 56425->56391 56426->56391 56429 40d79b 56427->56429 56428 40d7d5 56428->56391 56429->56428 56431 40d7dc 19 API calls 56429->56431 56431->56429 56433 40b9f2 56432->56433 56434 40ba17 56432->56434 56433->56434 56436 40ba94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56433->56436 56434->56325 56434->56405 56436->56434 56438 40ea18 19 API calls 56437->56438 56439 40d4d9 56438->56439 56440 40d4ec 56439->56440 56444 40eb1c 19 API calls 56439->56444 56440->56309 56442 40d4e7 56445 40d468 19 API calls 56442->56445 56444->56442 56445->56440 56450 40ab8c 33 API calls 56446->56450 56448 40da10 56448->56349 56449->56349 56450->56448 56451 480de4 56452 451078 19 API calls 56451->56452 56453 480df8 56452->56453 56454 47fe90 35 API calls 56453->56454 56455 480e1c 56454->56455 56456 480e7e 56457 480e87 56456->56457 56458 480eb1 56457->56458 56459 480e93 56457->56459 56834 47f7c0 38 API calls 56458->56834 56460 480ea8 56459->56460 56832 47f990 57 API calls 56459->56832 56833 47f7c0 38 API calls 56460->56833 56464 480eaf 56465 480eec 56464->56465 56466 480ede 56464->56466 56469 480f2b 56465->56469 56837 47f928 18 API calls 56465->56837 56835 47708c 203 API calls 56466->56835 56468 480f4f 56471 480f61 56468->56471 56472 480f67 56468->56472 56469->56468 56474 480f42 56469->56474 56475 480f44 56469->56475 56478 480f65 56471->56478 56485 47f96c 57 API calls 56471->56485 56472->56478 56482 47f96c 57 API calls 56472->56482 56473 480f1e 56838 47f990 57 API calls 56473->56838 56481 47f96c 57 API calls 56474->56481 56839 47fa00 57 API calls 56475->56839 56476 480ee3 56476->56465 56836 408bf0 19 API calls 56476->56836 56591 47caf0 56478->56591 56481->56468 56482->56478 56484 480f8e 56665 47d018 56484->56665 56485->56478 56592 42d8a8 GetWindowsDirectoryA 56591->56592 56593 47cb14 56592->56593 56594 403450 18 API calls 56593->56594 56595 47cb21 56594->56595 56596 42d8d4 GetSystemDirectoryA 56595->56596 56597 47cb29 56596->56597 56598 403450 18 API calls 56597->56598 56599 47cb36 56598->56599 56600 42d900 6 API calls 56599->56600 56601 47cb3e 56600->56601 56602 403450 18 API calls 56601->56602 56603 47cb4b 56602->56603 56604 47cb54 56603->56604 56605 47cb70 56603->56605 56873 42d218 56604->56873 56607 403400 4 API calls 56605->56607 56609 47cb6e 56607->56609 56610 47cbb5 56609->56610 56612 42c8dc 19 API calls 56609->56612 56853 47c978 56610->56853 56611 403450 18 API calls 56611->56609 56614 47cb90 56612->56614 56616 403450 18 API calls 56614->56616 56618 47cb9d 56616->56618 56617 403450 18 API calls 56619 47cbd1 56617->56619 56618->56610 56621 403450 18 API calls 56618->56621 56620 47cbef 56619->56620 56622 4035c0 18 API calls 56619->56622 56623 47c978 22 API calls 56620->56623 56621->56610 56622->56620 56624 47cbfe 56623->56624 56625 403450 18 API calls 56624->56625 56626 47cc0b 56625->56626 56627 47cc33 56626->56627 56628 42c40c 19 API calls 56626->56628 56629 47cc9a 56627->56629 56632 47c978 22 API calls 56627->56632 56630 47cc21 56628->56630 56631 47cd62 56629->56631 56636 47ccba SHGetKnownFolderPath 56629->56636 56635 4035c0 18 API calls 56630->56635 56633 47cd8c 56631->56633 56634 47cd6b 56631->56634 56637 47cc4b 56632->56637 56639 42c40c 19 API calls 56633->56639 56638 42c40c 19 API calls 56634->56638 56635->56627 56640 47ccd4 56636->56640 56641 47cd0f SHGetKnownFolderPath 56636->56641 56642 403450 18 API calls 56637->56642 56643 47cd78 56638->56643 56644 47cd99 56639->56644 56883 403ba4 21 API calls 56640->56883 56641->56631 56647 47cd29 56641->56647 56646 47cc58 56642->56646 56648 4035c0 18 API calls 56643->56648 56649 4035c0 18 API calls 56644->56649 56651 47cc6b 56646->56651 56881 4533b8 18 API calls 56646->56881 56884 403ba4 21 API calls 56647->56884 56654 47cd8a 56648->56654 56649->56654 56650 47ccef CoTaskMemFree 56650->56484 56653 47c978 22 API calls 56651->56653 56657 47cc7a 56653->56657 56864 47ca5c 56654->56864 56656 47cd44 CoTaskMemFree 56656->56484 56659 403450 18 API calls 56657->56659 56661 47cc87 56659->56661 56661->56629 56882 4533b8 18 API calls 56661->56882 56662 403400 4 API calls 56663 47cdc5 56662->56663 56663->56484 56666 47d020 56665->56666 56666->56666 56886 453a98 56666->56886 56669 403450 18 API calls 56670 47d04d 56669->56670 56671 403494 4 API calls 56670->56671 56672 47d05a 56671->56672 56673 40357c 18 API calls 56672->56673 56674 47d068 56673->56674 56675 457db8 38 API calls 56674->56675 56676 47d070 56675->56676 56677 47d083 56676->56677 56916 4575b0 20 API calls 56676->56916 56679 42c40c 19 API calls 56677->56679 56680 47d090 56679->56680 56681 4035c0 18 API calls 56680->56681 56682 47d0a0 56681->56682 56683 47d0aa CreateDirectoryA 56682->56683 56684 47d110 56683->56684 56685 47d0b4 GetLastError 56683->56685 56904 4584b8 56684->56904 56687 4514cc 18 API calls 56685->56687 56689 47d0cc 56687->56689 56688 47d11d 56690 47d146 56688->56690 56693 4035c0 18 API calls 56688->56693 56917 406d78 33 API calls 56689->56917 56692 403420 4 API calls 56690->56692 56696 47d160 56692->56696 56697 47d133 56693->56697 56694 47d0dc 56695 42e8d8 19 API calls 56694->56695 56698 47d0ec 56695->56698 56699 403420 4 API calls 56696->56699 56911 47cfc0 56697->56911 56701 45149c 18 API calls 56698->56701 56702 47d16d 56699->56702 56704 47d101 56701->56704 56707 47d2fc 56702->56707 56918 408c1c 18 API calls 56704->56918 56708 42c40c 19 API calls 56707->56708 56709 47d328 56708->56709 56710 4035c0 18 API calls 56709->56710 56711 47d338 56710->56711 56712 47cfc0 39 API calls 56711->56712 56832->56460 56833->56464 56834->56464 56835->56476 56837->56473 56838->56469 56839->56468 56854 42de2c RegOpenKeyExA 56853->56854 56855 47c99e 56854->56855 56856 47c9c4 56855->56856 56857 47c9a2 56855->56857 56858 403400 4 API calls 56856->56858 56859 42dd5c 20 API calls 56857->56859 56860 47c9cb 56858->56860 56861 47c9ae 56859->56861 56860->56617 56862 47c9b9 RegCloseKey 56861->56862 56863 403400 4 API calls 56861->56863 56862->56860 56863->56862 56865 47ca6a 56864->56865 56866 42de2c RegOpenKeyExA 56865->56866 56867 47ca92 56866->56867 56868 47cac3 56867->56868 56869 42dd5c 20 API calls 56867->56869 56868->56662 56870 47caa8 56869->56870 56871 42dd5c 20 API calls 56870->56871 56872 47caba RegCloseKey 56871->56872 56872->56868 56874 4038a4 18 API calls 56873->56874 56875 42d22b 56874->56875 56876 42d242 GetEnvironmentVariableA 56875->56876 56880 42d255 56875->56880 56885 42dbe0 18 API calls 56875->56885 56876->56875 56877 42d24e 56876->56877 56878 403400 4 API calls 56877->56878 56878->56880 56880->56611 56881->56651 56882->56629 56883->56650 56884->56656 56885->56875 56892 453ab8 56886->56892 56888 453824 25 API calls 56888->56892 56889 453add CreateDirectoryA 56890 453b55 56889->56890 56891 453ae7 GetLastError 56889->56891 56893 403494 4 API calls 56890->56893 56891->56892 56892->56888 56892->56889 56895 4514cc 18 API calls 56892->56895 56901 42e8d8 19 API calls 56892->56901 56902 45149c 18 API calls 56892->56902 56920 42da28 56892->56920 56943 406d78 33 API calls 56892->56943 56944 408c1c 18 API calls 56892->56944 56894 453b5f 56893->56894 56896 403420 4 API calls 56894->56896 56895->56892 56897 453b79 56896->56897 56899 403420 4 API calls 56897->56899 56900 453b86 56899->56900 56900->56669 56901->56892 56902->56892 56905 4584c4 56904->56905 56906 4584d2 56904->56906 56907 403494 4 API calls 56905->56907 56908 403400 4 API calls 56906->56908 56909 4584d0 56907->56909 56910 4584d9 56908->56910 56909->56688 56910->56688 56912 40cf5c 37 API calls 56911->56912 56913 47cfdc 56912->56913 56945 47cee4 56913->56945 56916->56677 56917->56694 56918->56684 56921 42d218 19 API calls 56920->56921 56922 42da4e 56921->56922 56923 42da5a 56922->56923 56925 42cd58 21 API calls 56922->56925 56924 42d218 19 API calls 56923->56924 56928 42daa6 56923->56928 56926 42da6a 56924->56926 56925->56923 56927 42da76 56926->56927 56929 42cd58 21 API calls 56926->56929 56927->56928 56930 42da9b 56927->56930 56933 42d218 19 API calls 56927->56933 56931 42c814 19 API calls 56928->56931 56929->56927 56930->56928 56934 42d8a8 GetWindowsDirectoryA 56930->56934 56932 42dab0 56931->56932 56935 42c40c 19 API calls 56932->56935 56936 42da8f 56933->56936 56934->56928 56937 42dabb 56935->56937 56936->56930 56939 42cd58 21 API calls 56936->56939 56938 403494 4 API calls 56937->56938 56940 42dac5 56938->56940 56939->56930 56941 403420 4 API calls 56940->56941 56942 42dadf 56941->56942 56942->56892 56943->56892 56944->56892 56952 40cdb0 56945->56952 56957 40cc60 56952->56957 56958 40cc6d 56957->56958 56959 40cc89 56958->56959 56960 40ccbe 56958->56960 56973 406ed0 56959->56973 56977 406e90 CreateFileA 56960->56977 58362 4222f4 58363 422303 58362->58363 58368 421284 58363->58368 58366 422323 58369 4212f3 58368->58369 58370 421293 58368->58370 58371 421304 58369->58371 58393 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58369->58393 58370->58369 58392 408d3c 33 API calls 58370->58392 58373 421332 58371->58373 58376 4213ca 58371->58376 58374 4213a5 58373->58374 58381 42134d 58373->58381 58375 4213a3 58374->58375 58383 4213b9 58374->58383 58377 4213f6 58375->58377 58395 421e3c 25 API calls 58375->58395 58376->58375 58378 4213de SetMenu 58376->58378 58396 4211cc 24 API calls 58377->58396 58378->58375 58381->58375 58386 421370 GetMenu 58381->58386 58382 4213fd 58382->58366 58391 4221f8 10 API calls 58382->58391 58385 4213c2 SetMenu 58383->58385 58385->58375 58387 421393 58386->58387 58388 42137a 58386->58388 58394 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58387->58394 58390 42138d SetMenu 58388->58390 58390->58387 58391->58366 58392->58370 58393->58371 58394->58375 58395->58377 58396->58382 58397 46e6bc 58398 46e6c7 58397->58398 58401 46e514 58398->58401 58402 46e53d 58401->58402 58403 46e55a 58402->58403 58405 44fba4 2 API calls 58402->58405 58411 46e26c 58403->58411 58405->58403 58408 46e59f 58410 46e5e9 58408->58410 58415 4953c4 32 API calls 58408->58415 58412 46e1e4 2 API calls 58411->58412 58413 46e27a 58412->58413 58413->58410 58414 495368 18 API calls 58413->58414 58414->58408 58415->58410 58416 4165fc DestroyWindow 58417 42e3ff SetErrorMode
                                                                Strings
                                                                • Existing file has a later time stamp. Skipping., xrefs: 00470FC7
                                                                • , xrefs: 00470DC7, 00470F98, 00471016
                                                                • Same time stamp. Skipping., xrefs: 00470F4D
                                                                • User opted not to overwrite the existing file. Skipping., xrefs: 00471045
                                                                • @, xrefs: 004709A8
                                                                • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047108E
                                                                • .tmp, xrefs: 004711AF
                                                                • Dest filename: %s, xrefs: 00470A8C
                                                                • Time stamp of existing file: (failed to read), xrefs: 00470C2F
                                                                • Version of existing file: (none), xrefs: 00470EF2
                                                                • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470EC8
                                                                • Dest file is protected by Windows File Protection., xrefs: 00470AE5
                                                                • Version of our file: (none), xrefs: 00470CF4
                                                                • Incrementing shared file count (64-bit)., xrefs: 00471784
                                                                • Version of our file: %u.%u.%u.%u, xrefs: 00470CE8
                                                                • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470FE4
                                                                • Time stamp of our file: %s, xrefs: 00470B93
                                                                • Uninstaller requires administrator: %s, xrefs: 00471387
                                                                • Same version. Skipping., xrefs: 00470EDD
                                                                • Non-default bitness: 32-bit, xrefs: 00470AB3
                                                                • Skipping due to "onlyifdestfileexists" flag., xrefs: 004710F2
                                                                • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470EAD
                                                                • Couldn't read time stamp. Skipping., xrefs: 00470F2D
                                                                • -- File entry --, xrefs: 004708F3
                                                                • Dest file exists., xrefs: 00470BB3
                                                                • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470EBC
                                                                • Installing into GAC, xrefs: 0047190C
                                                                • Incrementing shared file count (32-bit)., xrefs: 0047179D
                                                                • Time stamp of our file: (failed to read), xrefs: 00470B9F
                                                                • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470BC6
                                                                • Existing file is a newer version. Skipping., xrefs: 00470DFA
                                                                • Will register the file (a DLL/OCX) later., xrefs: 00471717
                                                                • Version of existing file: %u.%u.%u.%u, xrefs: 00470D74
                                                                • Stripped read-only attribute., xrefs: 004710BF
                                                                • Installing the file., xrefs: 00471101
                                                                • Non-default bitness: 64-bit, xrefs: 00470AA7
                                                                • Failed to strip read-only attribute., xrefs: 004710CB
                                                                • Time stamp of existing file: %s, xrefs: 00470C23
                                                                • Will register the file (a type library) later., xrefs: 0047170B
                                                                • InUn, xrefs: 00471357
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                • API String ID: 0-4021121268
                                                                • Opcode ID: 9f2865767024a930b7916cd63da71f425be50596fff11d1e8904fa8c666432a3
                                                                • Instruction ID: 467263080efe338566352cc629e32221acf2e6aeb32e26e45aec936313cc1361
                                                                • Opcode Fuzzy Hash: 9f2865767024a930b7916cd63da71f425be50596fff11d1e8904fa8c666432a3
                                                                • Instruction Fuzzy Hash: AA927434A04288DFDB11DFA9C445BDDBBB4AF05304F1480ABE848BB392D7789E49DB59

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1578 42e0ac-42e0bd 1579 42e0c8-42e0ed AllocateAndInitializeSid 1578->1579 1580 42e0bf-42e0c3 1578->1580 1581 42e297-42e29f 1579->1581 1582 42e0f3-42e110 GetVersion 1579->1582 1580->1581 1583 42e112-42e127 GetModuleHandleA GetProcAddress 1582->1583 1584 42e129-42e12b 1582->1584 1583->1584 1585 42e152-42e16c GetCurrentThread OpenThreadToken 1584->1585 1586 42e12d-42e13b CheckTokenMembership 1584->1586 1589 42e1a3-42e1cb GetTokenInformation 1585->1589 1590 42e16e-42e178 GetLastError 1585->1590 1587 42e141-42e14d 1586->1587 1588 42e279-42e28f FreeSid 1586->1588 1587->1588 1591 42e1e6-42e20a call 402648 GetTokenInformation 1589->1591 1592 42e1cd-42e1d5 GetLastError 1589->1592 1593 42e184-42e197 GetCurrentProcess OpenProcessToken 1590->1593 1594 42e17a-42e17f call 4031bc 1590->1594 1604 42e218-42e220 1591->1604 1605 42e20c-42e216 call 4031bc * 2 1591->1605 1592->1591 1595 42e1d7-42e1e1 call 4031bc * 2 1592->1595 1593->1589 1598 42e199-42e19e call 4031bc 1593->1598 1594->1581 1595->1581 1598->1581 1609 42e222-42e223 1604->1609 1610 42e253-42e271 call 402660 CloseHandle 1604->1610 1605->1581 1611 42e225-42e238 EqualSid 1609->1611 1615 42e23a-42e247 1611->1615 1616 42e24f-42e251 1611->1616 1615->1616 1619 42e249-42e24d 1615->1619 1616->1610 1616->1611 1619->1610
                                                                APIs
                                                                • AllocateAndInitializeSid.ADVAPI32(0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                                • GetVersion.KERNEL32(00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                                • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                                • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                                • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                                • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                • String ID: CheckTokenMembership$advapi32.dll
                                                                • API String ID: 2252812187-1888249752
                                                                • Opcode ID: 7c80af42b102e27edf5db655613db814b4685419315c422c8b7ce9c7c8cae370
                                                                • Instruction ID: b767a2b0357b006b48fec58faac565969e4e2695d2e87526588baf6f991b03ff
                                                                • Opcode Fuzzy Hash: 7c80af42b102e27edf5db655613db814b4685419315c422c8b7ce9c7c8cae370
                                                                • Instruction Fuzzy Hash: 99518371B44615EEEB10EAE6A842B7F7BACDB09304F9404BBB501F7282D5789904867D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1642 450334-450341 1643 450347-450354 GetVersion 1642->1643 1644 4503f0-4503fa 1642->1644 1643->1644 1645 45035a-450370 LoadLibraryA 1643->1645 1645->1644 1646 450372-4503eb GetProcAddress * 6 1645->1646 1646->1644
                                                                APIs
                                                                • GetVersion.KERNEL32(00480FD9), ref: 00450347
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480FD9), ref: 0045035F
                                                                • GetProcAddress.KERNEL32(6E9F0000,RmStartSession), ref: 0045037D
                                                                • GetProcAddress.KERNEL32(6E9F0000,RmRegisterResources), ref: 00450392
                                                                • GetProcAddress.KERNEL32(6E9F0000,RmGetList), ref: 004503A7
                                                                • GetProcAddress.KERNEL32(6E9F0000,RmShutdown), ref: 004503BC
                                                                • GetProcAddress.KERNEL32(6E9F0000,RmRestart), ref: 004503D1
                                                                • GetProcAddress.KERNEL32(6E9F0000,RmEndSession), ref: 004503E6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$LibraryLoadVersion
                                                                • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                • API String ID: 1968650500-3419246398
                                                                • Opcode ID: ba4799ed598e863f1006e140a948279c49c85d1dce31870895334632bea49e72
                                                                • Instruction ID: 01977ea06872d8050a8028e1fd06f6bfd4923f5c9242ba3c4897223f9bd4e12c
                                                                • Opcode Fuzzy Hash: ba4799ed598e863f1006e140a948279c49c85d1dce31870895334632bea49e72
                                                                • Instruction Fuzzy Hash: 2711C9B4550200DBD710FB79ADC5A2A32E4E765717F58163BB940AB1A3C67C4848CF2C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1790 423c1c-423c50 1791 423c52-423c53 1790->1791 1792 423c84-423c9b call 423b78 1790->1792 1793 423c55-423c71 call 40b25c 1791->1793 1798 423cfc-423d01 1792->1798 1799 423c9d 1792->1799 1819 423c73-423c7b 1793->1819 1820 423c80-423c82 1793->1820 1800 423d03 1798->1800 1801 423d37-423d3c 1798->1801 1802 423ca3-423ca6 1799->1802 1803 423d60-423d70 1799->1803 1809 423fc1-423fc9 1800->1809 1810 423d09-423d11 1800->1810 1804 423d42-423d45 1801->1804 1805 4240aa-4240b8 IsIconic 1801->1805 1811 423cd5-423cd8 1802->1811 1812 423ca8 1802->1812 1807 423d72-423d77 1803->1807 1808 423d7b-423d83 call 4241a4 1803->1808 1813 4240e6-4240fb call 424860 1804->1813 1814 423d4b-423d4c 1804->1814 1815 424162-42416a 1805->1815 1824 4240be-4240c9 GetFocus 1805->1824 1821 423d88-423d90 call 4241ec 1807->1821 1822 423d79-423d9c call 423b94 1807->1822 1808->1815 1809->1815 1816 423fcf-423fda call 4181f0 1809->1816 1825 423f23-423f4a SendMessageA 1810->1825 1826 423d17-423d1c 1810->1826 1817 423db9-423dc0 1811->1817 1818 423cde-423cdf 1811->1818 1827 423e06-423e16 call 423b94 1812->1827 1828 423cae-423cb1 1812->1828 1813->1815 1838 423d52-423d55 1814->1838 1839 4240fd-424104 1814->1839 1836 424181-424187 1815->1836 1816->1815 1871 423fe0-423fef call 4181f0 IsWindowEnabled 1816->1871 1817->1815 1831 423dc6-423dcd 1817->1831 1832 423ce5-423ce8 1818->1832 1833 423f4f-423f56 1818->1833 1819->1836 1820->1792 1820->1793 1821->1815 1822->1815 1824->1815 1843 4240cf-4240d8 call 41f004 1824->1843 1825->1815 1834 423d22-423d23 1826->1834 1835 42405a-424065 1826->1835 1827->1815 1844 423cb7-423cba 1828->1844 1845 423e2e-423e4a PostMessageA call 423b94 1828->1845 1831->1815 1852 423dd3-423dd9 1831->1852 1853 423cee-423cf1 1832->1853 1854 423e4f-423e6f call 423b94 1832->1854 1833->1815 1861 423f5c-423f61 call 404e54 1833->1861 1855 424082-42408d 1834->1855 1856 423d29-423d2c 1834->1856 1835->1815 1858 42406b-42407d 1835->1858 1859 424130-424137 1838->1859 1860 423d5b 1838->1860 1849 424106-424119 call 4244e4 1839->1849 1850 42411b-42412e call 42453c 1839->1850 1843->1815 1902 4240de-4240e4 SetFocus 1843->1902 1846 423cc0-423cc3 1844->1846 1847 423eb5-423ebc 1844->1847 1845->1815 1866 423cc9-423cca 1846->1866 1867 423dde-423dec IsIconic 1846->1867 1868 423ebe-423ed1 call 423b24 1847->1868 1869 423eef-423f00 call 423b94 1847->1869 1849->1815 1850->1815 1852->1815 1872 423cf7 1853->1872 1873 423e1b-423e29 call 424188 1853->1873 1913 423e93-423eb0 call 423a94 PostMessageA 1854->1913 1914 423e71-423e8e call 423b24 PostMessageA 1854->1914 1855->1815 1880 424093-4240a5 1855->1880 1877 423d32 1856->1877 1878 423f66-423f6e 1856->1878 1858->1815 1875 42414a-424159 1859->1875 1876 424139-424148 1859->1876 1879 42415b-42415c call 423b94 1860->1879 1861->1815 1886 423cd0 1866->1886 1887 423da1-423da9 1866->1887 1893 423dfa-423e01 call 423b94 1867->1893 1894 423dee-423df5 call 423bd0 1867->1894 1917 423ee3-423eea call 423b94 1868->1917 1918 423ed3-423edd call 41ef68 1868->1918 1922 423f02-423f08 call 41eeb4 1869->1922 1923 423f16-423f1e call 423a94 1869->1923 1871->1815 1919 423ff5-424004 call 4181f0 IsWindowVisible 1871->1919 1872->1879 1873->1815 1875->1815 1876->1815 1877->1879 1878->1815 1900 423f74-423f7b 1878->1900 1909 424161 1879->1909 1880->1815 1886->1879 1887->1815 1903 423daf-423db4 call 422c5c 1887->1903 1893->1815 1894->1815 1900->1815 1912 423f81-423f90 call 4181f0 IsWindowEnabled 1900->1912 1902->1815 1903->1815 1909->1815 1912->1815 1940 423f96-423fac call 412320 1912->1940 1913->1815 1914->1815 1917->1815 1918->1917 1919->1815 1942 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1919->1942 1938 423f0d-423f10 1922->1938 1923->1815 1938->1923 1940->1815 1945 423fb2-423fbc 1940->1945 1942->1815 1945->1815
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 916e76775de900499f1d871d7db5d87db10c105b5577fd268dcf8bb821bf20c9
                                                                • Instruction ID: e16ee7298f114c8dbeebd16f5ebee6ca6ec91daf226906b03d032974817fe50e
                                                                • Opcode Fuzzy Hash: 916e76775de900499f1d871d7db5d87db10c105b5577fd268dcf8bb821bf20c9
                                                                • Instruction Fuzzy Hash: 87E1A130700224DFD704EF59E989A6EB7F5EB94304F9480A6E545AB352C73CEE91DB08
                                                                APIs
                                                                  • Part of subcall function 00495FA4: GetWindowRect.USER32(00000000), ref: 00495FBA
                                                                • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 0046781B
                                                                  • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467835), ref: 0041D6EB
                                                                  • Part of subcall function 00467228: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 004672CB
                                                                  • Part of subcall function 00467228: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004672F1
                                                                  • Part of subcall function 00467228: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467348
                                                                  • Part of subcall function 00466BE8: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004678D0,00000000,00000000,00000000,0000000C,00000000), ref: 00466C00
                                                                  • Part of subcall function 00496228: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00496232
                                                                  • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                  • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                  • Part of subcall function 00495EF4: GetDC.USER32(00000000), ref: 00495F16
                                                                  • Part of subcall function 00495EF4: SelectObject.GDI32(?,00000000), ref: 00495F3C
                                                                  • Part of subcall function 00495EF4: ReleaseDC.USER32(00000000,?), ref: 00495F8D
                                                                  • Part of subcall function 00496218: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00496222
                                                                • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,022AFC28,022B1988,?,?,022B19B8,?,?,022B1A08,?), ref: 004684BF
                                                                • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004684D0
                                                                • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004684E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadProcRectReleaseSelectSystemUserWindow
                                                                • String ID: $(Default)$STOPIMAGE
                                                                • API String ID: 616467991-770201673
                                                                • Opcode ID: 87bcb674c8b66ef52b6acd084ab0e16fc1d5b69bf8698de0b4974f4e12f6faa5
                                                                • Instruction ID: 31ed69900cd485df966db968cea1a759f135fc149481760ad81ee09e41d161c5
                                                                • Opcode Fuzzy Hash: 87bcb674c8b66ef52b6acd084ab0e16fc1d5b69bf8698de0b4974f4e12f6faa5
                                                                • Instruction Fuzzy Hash: 5BF2C5786005209FCB00EB69D4D9F9973F1BF49304F1542BAE5049B36ADB78EC46CB9A
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 0047541D
                                                                • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 004754FA
                                                                • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 00475508
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$File$CloseFirstNext
                                                                • String ID: unins$unins???.*
                                                                • API String ID: 3541575487-1009660736
                                                                • Opcode ID: 006caa83065a4b314e272e4727ac650bfdae0cbda1ab0d326659006c62220b60
                                                                • Instruction ID: 94c2e66123b914be41fb9230d3e0bd96c7eed6bd52dd6cc9b7e2a75fa87f4789
                                                                • Opcode Fuzzy Hash: 006caa83065a4b314e272e4727ac650bfdae0cbda1ab0d326659006c62220b60
                                                                • Instruction Fuzzy Hash: 7D315370600558ABDB10EB69CD41BDEB7B9EF44304F5480B6A40CAB3A6DB78DF819B58
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,00452B37,?,?,-00000001,00000000), ref: 00452B11
                                                                • GetLastError.KERNEL32(00000000,?,00000000,00452B37,?,?,-00000001,00000000), ref: 00452B19
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileFindFirstLast
                                                                • String ID:
                                                                • API String ID: 873889042-0
                                                                • Opcode ID: f2dc6f419a982de125fb7f286a4efffe8647e33f6b471eccd8a31571119839a2
                                                                • Instruction ID: 47a0ca8b87b913a19c884f83f9383acd825b8acbe58efe6d1ea2a1073528362f
                                                                • Opcode Fuzzy Hash: f2dc6f419a982de125fb7f286a4efffe8647e33f6b471eccd8a31571119839a2
                                                                • Instruction Fuzzy Hash: 69F04931A00604AB8B10DF6A9D4189EF7ACEB4632171042BBFC14E3292DAB85E048558
                                                                APIs
                                                                • GetVersion.KERNEL32(0000031E,0046E27A), ref: 0046E1EE
                                                                • CoCreateInstance.OLE32(0049AB98,00000000,00000001,0049ABA8,?,0000031E,0046E27A), ref: 0046E20A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateInstanceVersion
                                                                • String ID:
                                                                • API String ID: 1462612201-0
                                                                • Opcode ID: a4af8d076fcecf17adfdc3d0480ff287c2d0b6366a88815b83ba2acce94f7983
                                                                • Instruction ID: 2583b72e9ff3fb42948badd432de3b99868d7e942e7e47a623e6463d1fe0ae05
                                                                • Opcode Fuzzy Hash: a4af8d076fcecf17adfdc3d0480ff287c2d0b6366a88815b83ba2acce94f7983
                                                                • Instruction Fuzzy Hash: 58F0E5346412009EFB10E77AEC46B4A37CAAB21319F5004BBF144A7292E2ACE495870F
                                                                APIs
                                                                • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: eb14f04c5e02207c2fd5126442fac2e3d3ce4c3ff781734da4d02da34a9f601e
                                                                • Instruction ID: 7c1c2e54cb9be6942265fc2fe4f8d610b96419e03c3bde54798e363261146e82
                                                                • Opcode Fuzzy Hash: eb14f04c5e02207c2fd5126442fac2e3d3ce4c3ff781734da4d02da34a9f601e
                                                                • Instruction Fuzzy Hash: D1E09271700614A6D311A95A9C86AEAB35C9B68314F00427FB944E73C6EDB89E4046E9
                                                                APIs
                                                                • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: NtdllProc_Window
                                                                • String ID:
                                                                • API String ID: 4255912815-0
                                                                • Opcode ID: 1e03a0b95ee3ac50814388fded2f2c100431d5d137ce34ba8ee35217fcdc3973
                                                                • Instruction ID: 626c949ff67c0b5daba62b8ffba664747ea83a29b03f4787c3cb7294a8149fcf
                                                                • Opcode Fuzzy Hash: 1e03a0b95ee3ac50814388fded2f2c100431d5d137ce34ba8ee35217fcdc3973
                                                                • Instruction Fuzzy Hash: 9CF0B379205608AF8B40DF99C588D4ABBE8AB4C260B058295B988CB321C234EE808F94
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: NameUser
                                                                • String ID:
                                                                • API String ID: 2645101109-0
                                                                • Opcode ID: b729cb2c5e6aed0314aaf1ae3f51ea3427620088d531228546b40ff94aa38a59
                                                                • Instruction ID: 1d2ebe8de6f6cfe3948c3fff4a7e090af1b7aca458264ab6234f43f9cc1e19d2
                                                                • Opcode Fuzzy Hash: b729cb2c5e6aed0314aaf1ae3f51ea3427620088d531228546b40ff94aa38a59
                                                                • Instruction Fuzzy Hash: 94D0C2B130460063D700AA689C926AA368C8B84345F00483E3CC9DA2D3EABDDA48169A
                                                                APIs
                                                                • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F5B0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: NtdllProc_Window
                                                                • String ID:
                                                                • API String ID: 4255912815-0
                                                                • Opcode ID: 0f3603468c344ce3f2e9376b2c090f409274960c84c57a5106e539cc1743996a
                                                                • Instruction ID: 438f9cd868ded5fa8976115e55c89a445960fd054612ac8023f685210e8cb482
                                                                • Opcode Fuzzy Hash: 0f3603468c344ce3f2e9376b2c090f409274960c84c57a5106e539cc1743996a
                                                                • Instruction Fuzzy Hash: 52D09E7221010DBB9B00DE99D840D6B33AD9B88754B908925F545C7346D634ED619BB5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 844 46f250-46f282 845 46f284-46f28b 844->845 846 46f29f 844->846 847 46f296-46f29d 845->847 848 46f28d-46f294 845->848 849 46f2a6-46f2de call 403634 call 403738 call 42ded0 846->849 847->849 848->846 848->847 856 46f2e0-46f2f4 call 403738 call 42ded0 849->856 857 46f2f9-46f322 call 403738 call 42ddf4 849->857 856->857 865 46f324-46f32d call 46ef20 857->865 866 46f332-46f35b call 46f03c 857->866 865->866 870 46f36d-46f370 call 403400 866->870 871 46f35d-46f36b call 403494 866->871 875 46f375-46f3c0 call 46f03c call 42c40c call 46f084 call 46f03c 870->875 871->875 884 46f3d6-46f3f7 call 455644 call 46f03c 875->884 885 46f3c2-46f3d5 call 46f0ac 875->885 892 46f44d-46f454 884->892 893 46f3f9-46f44c call 46f03c call 431478 call 46f03c call 431478 call 46f03c 884->893 885->884 894 46f456-46f493 call 431478 call 46f03c call 431478 call 46f03c 892->894 895 46f494-46f49b 892->895 893->892 894->895 899 46f4dc-46f501 call 40b25c call 46f03c 895->899 900 46f49d-46f4db call 46f03c * 3 895->900 919 46f503-46f50e call 47c6f0 899->919 920 46f510-46f519 call 403494 899->920 900->899 929 46f51e-46f529 call 479240 919->929 920->929 934 46f532 929->934 935 46f52b-46f530 929->935 936 46f537-46f701 call 403778 call 46f03c call 47c6f0 call 46f084 call 403494 call 40357c * 2 call 46f03c call 403494 call 40357c * 2 call 46f03c call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 934->936 935->936 999 46f717-46f725 call 46f0ac 936->999 1000 46f703-46f715 call 46f03c 936->1000 1004 46f72a 999->1004 1005 46f72b-46f774 call 46f0ac call 46f0e0 call 46f03c call 47c6f0 call 46f144 1000->1005 1004->1005 1016 46f776-46f799 call 46f0ac * 2 1005->1016 1017 46f79a-46f7a7 1005->1017 1016->1017 1019 46f876-46f87d 1017->1019 1020 46f7ad-46f7b4 1017->1020 1021 46f8d7-46f8ed RegCloseKey 1019->1021 1022 46f87f-46f8b5 call 4953c4 1019->1022 1024 46f7b6-46f7bd 1020->1024 1025 46f821-46f830 1020->1025 1022->1021 1024->1025 1029 46f7bf-46f7e3 call 430c40 1024->1029 1028 46f833-46f840 1025->1028 1032 46f857-46f870 call 430c7c call 46f0ac 1028->1032 1033 46f842-46f84f 1028->1033 1029->1028 1039 46f7e5-46f7e6 1029->1039 1042 46f875 1032->1042 1033->1032 1035 46f851-46f855 1033->1035 1035->1019 1035->1032 1041 46f7e8-46f80e call 40b25c call 479a9c 1039->1041 1047 46f810-46f816 call 430c40 1041->1047 1048 46f81b-46f81d 1041->1048 1042->1019 1047->1048 1048->1041 1050 46f81f 1048->1050 1050->1028
                                                                APIs
                                                                  • Part of subcall function 0046F03C: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,JfG,?,0049D1E0,?,0046F353,?,00000000,0046F8EE,?,_is1), ref: 0046F05F
                                                                  • Part of subcall function 0046F0AC: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F72A,?,?,00000000,0046F8EE,?,_is1,?), ref: 0046F0BF
                                                                • RegCloseKey.ADVAPI32(?,0046F8F5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F940,?,?,0049D1E0,00000000), ref: 0046F8E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Value$Close
                                                                • String ID: " /SILENT$5.5.6 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                • API String ID: 3391052094-4001681900
                                                                • Opcode ID: a16e9e7cc9b65a2e75ab3d1661429793c0d5d2348bba62312aff7163a21646dc
                                                                • Instruction ID: 2d81112130bbfcb2548f8b376684fbb7cc3ec4c1e14eddd466eba1ede3ae6ff4
                                                                • Opcode Fuzzy Hash: a16e9e7cc9b65a2e75ab3d1661429793c0d5d2348bba62312aff7163a21646dc
                                                                • Instruction Fuzzy Hash: DD126735A001089BCB14EF55F881ADE73F5EB48304F60817BE854AB396EB78BD49CB59

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1051 492dec-492e20 call 403684 1054 492e22-492e31 call 447010 Sleep 1051->1054 1055 492e36-492e43 call 403684 1051->1055 1062 4932c6-4932e0 call 403420 1054->1062 1060 492e72-492e7f call 403684 1055->1060 1061 492e45-492e68 call 44706c call 403738 FindWindowA call 4472ec 1055->1061 1070 492eae-492ebb call 403684 1060->1070 1071 492e81-492ea9 call 44706c call 403738 FindWindowA call 4472ec 1060->1071 1080 492e6d 1061->1080 1078 492ebd-492eff call 447010 * 4 SendMessageA call 4472ec 1070->1078 1079 492f04-492f11 call 403684 1070->1079 1071->1062 1078->1062 1089 492f60-492f6d call 403684 1079->1089 1090 492f13-492f5b call 447010 * 4 PostMessageA call 447144 1079->1090 1080->1062 1098 492fbc-492fc9 call 403684 1089->1098 1099 492f6f-492fb7 call 447010 * 4 SendNotifyMessageA call 447144 1089->1099 1090->1062 1110 492fcb-492ff1 call 44706c call 403738 RegisterClipboardFormatA call 4472ec 1098->1110 1111 492ff6-493003 call 403684 1098->1111 1099->1062 1110->1062 1126 493005-49303f call 447010 * 3 SendMessageA call 4472ec 1111->1126 1127 493044-493051 call 403684 1111->1127 1126->1062 1139 493098-4930a5 call 403684 1127->1139 1140 493053-493093 call 447010 * 3 PostMessageA call 447144 1127->1140 1151 4930ec-4930f9 call 403684 1139->1151 1152 4930a7-4930e7 call 447010 * 3 SendNotifyMessageA call 447144 1139->1152 1140->1062 1164 4930fb-493119 call 44706c call 42e3a4 1151->1164 1165 49314e-49315b call 403684 1151->1165 1152->1062 1183 49312b-493139 GetLastError call 4472ec 1164->1183 1184 49311b-493129 call 4472ec 1164->1184 1176 49315d-493189 call 44706c call 403738 call 447010 GetProcAddress 1165->1176 1177 4931d5-4931e2 call 403684 1165->1177 1207 49318b-4931c0 call 447010 * 2 call 4472ec call 447144 1176->1207 1208 4931c5-4931d0 call 447144 1176->1208 1189 49320a-493217 call 403684 1177->1189 1190 4931e4-493205 call 447010 FreeLibrary call 447144 1177->1190 1195 49313e-493149 call 4472ec 1183->1195 1184->1195 1204 493219-493237 call 44706c call 403738 CreateMutexA 1189->1204 1205 49323c-493249 call 403684 1189->1205 1190->1062 1195->1062 1204->1062 1217 49324b-49327d call 48d220 call 403574 call 403738 OemToCharBuffA call 48d238 1205->1217 1218 49327f-49328c call 403684 1205->1218 1207->1062 1208->1062 1217->1062 1227 49328e-4932c0 call 48d220 call 403574 call 403738 CharToOemBuffA call 48d238 1218->1227 1228 4932c2 1218->1228 1227->1062 1228->1062
                                                                APIs
                                                                • Sleep.KERNEL32(00000000,00000000,004932E1,?,?,?,?,00000000,00000000,00000000), ref: 00492E2C
                                                                • FindWindowA.USER32(00000000,00000000), ref: 00492E5D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FindSleepWindow
                                                                • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                • API String ID: 3078808852-3310373309
                                                                • Opcode ID: e8150bb8de847ed86d8c3dfc5438f62503d302965fa1632c010589db978853d8
                                                                • Instruction ID: 0de698378398c76d082fe6c781760205a02602346193583708d777b6c814c377
                                                                • Opcode Fuzzy Hash: e8150bb8de847ed86d8c3dfc5438f62503d302965fa1632c010589db978853d8
                                                                • Instruction Fuzzy Hash: C9C18360B0821067DB14BF7E8C4261E5A999F99B05710CD7FB446EB38BCE3DDE0A425D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1621 483f60-483f85 GetModuleHandleA GetProcAddress 1622 483fec-483ff1 GetSystemInfo 1621->1622 1623 483f87-483f9d GetNativeSystemInfo GetProcAddress 1621->1623 1624 483ff6-483fff 1622->1624 1623->1624 1625 483f9f-483faa GetCurrentProcess 1623->1625 1626 48400f-484016 1624->1626 1627 484001-484005 1624->1627 1625->1624 1632 483fac-483fb0 1625->1632 1631 484031-484036 1626->1631 1629 484018-48401f 1627->1629 1630 484007-48400b 1627->1630 1629->1631 1633 48400d-48402a 1630->1633 1634 484021-484028 1630->1634 1632->1624 1635 483fb2-483fb9 call 452790 1632->1635 1633->1631 1634->1631 1635->1624 1639 483fbb-483fc8 GetProcAddress 1635->1639 1639->1624 1640 483fca-483fe1 GetModuleHandleA GetProcAddress 1639->1640 1640->1624 1641 483fe3-483fea 1640->1641 1641->1624
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483F71
                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483F7E
                                                                • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483F8C
                                                                • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483F94
                                                                • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483FA0
                                                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483FC1
                                                                • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483FD4
                                                                • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483FDA
                                                                • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483FF1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                • API String ID: 2230631259-2623177817
                                                                • Opcode ID: 2201496c5c445ff8090de454bf6ebb37dd8ee277a0fffd9fa5a8cd1afd0d38d8
                                                                • Instruction ID: debdefcd9c900846d3217bdd74a69f8d0e186994afde8710a0eb2db1caaea97a
                                                                • Opcode Fuzzy Hash: 2201496c5c445ff8090de454bf6ebb37dd8ee277a0fffd9fa5a8cd1afd0d38d8
                                                                • Instruction Fuzzy Hash: 9E11E95180C74391D62177784C0676F2A988B92B59F080C377F80692C3DEBCC989A3AF

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1647 468e4c-468e84 call 47c6f0 1650 469066-469080 call 403420 1647->1650 1651 468e8a-468e9a call 479260 1647->1651 1656 468e9f-468ee4 call 407904 call 403738 call 42de2c 1651->1656 1662 468ee9-468eeb 1656->1662 1663 468ef1-468f06 1662->1663 1664 46905c-469060 1662->1664 1665 468f1b-468f22 1663->1665 1666 468f08-468f16 call 42dd5c 1663->1666 1664->1650 1664->1656 1667 468f24-468f46 call 42dd5c call 42dd74 1665->1667 1668 468f4f-468f56 1665->1668 1666->1665 1667->1668 1687 468f48 1667->1687 1671 468faf-468fb6 1668->1671 1672 468f58-468f7d call 42dd5c * 2 1668->1672 1674 468ffc-469003 1671->1674 1675 468fb8-468fca call 42dd5c 1671->1675 1694 468f7f-468f88 call 43156c 1672->1694 1695 468f8d-468f9f call 42dd5c 1672->1695 1677 469005-469039 call 42dd5c * 3 1674->1677 1678 46903e-469054 RegCloseKey 1674->1678 1688 468fcc-468fd5 call 43156c 1675->1688 1689 468fda-468fec call 42dd5c 1675->1689 1677->1678 1687->1668 1688->1689 1689->1674 1702 468fee-468ff7 call 43156c 1689->1702 1694->1695 1695->1671 1703 468fa1-468faa call 43156c 1695->1703 1702->1674 1703->1671
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(?,00469066,?,?,00000001,00000000,00000000,00469081,?,00000000,00000000,?), ref: 0046904F
                                                                Strings
                                                                • Inno Setup: App Path, xrefs: 00468F0E
                                                                • Inno Setup: Deselected Tasks, xrefs: 00468FDD
                                                                • Inno Setup: Selected Tasks, xrefs: 00468FBB
                                                                • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468EAB
                                                                • Inno Setup: User Info: Name, xrefs: 0046900B
                                                                • Inno Setup: Icon Group, xrefs: 00468F2A
                                                                • Inno Setup: Deselected Components, xrefs: 00468F90
                                                                • %s\%s_is1, xrefs: 00468EC9
                                                                • Inno Setup: User Info: Organization, xrefs: 0046901E
                                                                • Inno Setup: Setup Type, xrefs: 00468F5E
                                                                • Inno Setup: Selected Components, xrefs: 00468F6E
                                                                • Inno Setup: No Icons, xrefs: 00468F37
                                                                • Inno Setup: User Info: Serial, xrefs: 00469031
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen
                                                                • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                • API String ID: 47109696-1093091907
                                                                • Opcode ID: 7a93acda2f234d471220428d4004ddf5d74bfeca7ecd8adbdaba36eec9f3c1ba
                                                                • Instruction ID: ec004eca3ef3c75e9be151f7b3ffcc37546afe520acb5c6156e930094c0c3bde
                                                                • Opcode Fuzzy Hash: 7a93acda2f234d471220428d4004ddf5d74bfeca7ecd8adbdaba36eec9f3c1ba
                                                                • Instruction Fuzzy Hash: CA51C630A006089FDB15DB65D941BDEB7F9EF49304F6084ABE840673A1E7786F05CB4A

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0042D8A8: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453E28,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D), ref: 0042D8BB
                                                                  • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                  • Part of subcall function 0042D900: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453BCE,00000000,00453C71,?,?,00000000,00000000,00000000,00000000,00000000,?,00454061,00000000), ref: 0042D91A
                                                                  • Part of subcall function 0042D900: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                • SHGetKnownFolderPath.SHELL32(0049AD30,00008000,00000000,?,00000000,0047CDC6), ref: 0047CCCA
                                                                • CoTaskMemFree.OLE32(?,0047CD0F), ref: 0047CD02
                                                                  • Part of subcall function 0042D218: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA4E,00000000,0042DAE0,?,?,?,0049C628,00000000,00000000), ref: 0042D243
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                                • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                • API String ID: 3771764029-544719455
                                                                • Opcode ID: c632660a73aa2456bea4c2f675731a15cac3be8b36c890987e871e9594b1d94f
                                                                • Instruction ID: 266a5e1eeddd24a6ff800b9f6f3b1db768c176bc66f8c93c3bb1332691642a31
                                                                • Opcode Fuzzy Hash: c632660a73aa2456bea4c2f675731a15cac3be8b36c890987e871e9594b1d94f
                                                                • Instruction Fuzzy Hash: 5C61A235A00204AFDB20FBA5E882A8E7F69EB45718F50C47FE448A7395C73C9A45CB5D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2060 47d2fc-47d352 call 42c40c call 4035c0 call 47cfc0 call 45264c 2069 47d354-47d359 call 4533b8 2060->2069 2070 47d35e-47d36d call 45264c 2060->2070 2069->2070 2074 47d387-47d38d 2070->2074 2075 47d36f-47d375 2070->2075 2078 47d3a4-47d3cc call 42e3a4 * 2 2074->2078 2079 47d38f-47d395 2074->2079 2076 47d397-47d39f call 403494 2075->2076 2077 47d377-47d37d 2075->2077 2076->2078 2077->2074 2081 47d37f-47d385 2077->2081 2086 47d3f3-47d40d GetProcAddress 2078->2086 2087 47d3ce-47d3ee call 407904 call 4533b8 2078->2087 2079->2076 2079->2078 2081->2074 2081->2076 2089 47d40f-47d414 call 4533b8 2086->2089 2090 47d419-47d436 call 403400 * 2 2086->2090 2087->2086 2089->2090
                                                                APIs
                                                                • GetProcAddress.KERNEL32(74A90000,SHGetFolderPathA), ref: 0047D3FE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc
                                                                • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                • API String ID: 190572456-1343262939
                                                                • Opcode ID: 4c4f5370a674afad61a8abff597dcb6413460b1fd753ed450c61900bf845ad3d
                                                                • Instruction ID: d045dd866038c92064cf829f06b82d6aceddf0eaafaeaf0ab83e85e2faf6b2a6
                                                                • Opcode Fuzzy Hash: 4c4f5370a674afad61a8abff597dcb6413460b1fd753ed450c61900bf845ad3d
                                                                • Instruction Fuzzy Hash: 67311B70E10149AFCB10EFA9D9819EEB7B5EF44319F50847BE848E7341D738AE058B69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2098 40632c-406346 GetModuleHandleA GetProcAddress 2099 406348 2098->2099 2100 40634f-40635c GetProcAddress 2098->2100 2099->2100 2101 406365-406372 GetProcAddress 2100->2101 2102 40635e 2100->2102 2103 406374-406376 SetProcessDEPPolicy 2101->2103 2104 406378-406379 2101->2104 2102->2101 2103->2104
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,00499298), ref: 00406332
                                                                • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040633F
                                                                • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406355
                                                                • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040636B
                                                                • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00499298), ref: 00406376
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModulePolicyProcess
                                                                • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                • API String ID: 3256987805-3653653586
                                                                • Opcode ID: 7d7bbe465618e4585c438ef3b206e32c98bc9d4bad24831f1f4b353394e5164f
                                                                • Instruction ID: 9a8e57213fbd449cbda58cf554ac4ead7a6b18060d135b7a086c7f718c4e9984
                                                                • Opcode Fuzzy Hash: 7d7bbe465618e4585c438ef3b206e32c98bc9d4bad24831f1f4b353394e5164f
                                                                • Instruction Fuzzy Hash: C6E02DA1380701A8EA1032B20D82F3B104C8B40B69B2A24377D96B45C7DABEDD6455BD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2105 423884-42388e 2106 4239b7-4239bb 2105->2106 2107 423894-4238b6 call 41f3d4 GetClassInfoA 2105->2107 2110 4238e7-4238f0 GetSystemMetrics 2107->2110 2111 4238b8-4238cf RegisterClassA 2107->2111 2113 4238f2 2110->2113 2114 4238f5-4238ff GetSystemMetrics 2110->2114 2111->2110 2112 4238d1-4238e2 call 408ccc call 40311c 2111->2112 2112->2110 2113->2114 2116 423901 2114->2116 2117 423904-423960 call 403738 call 4062f8 call 403400 call 42365c SetWindowLongA 2114->2117 2116->2117 2128 423962-423975 call 424188 SendMessageA 2117->2128 2129 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2117->2129 2128->2129 2129->2106 2131 4239aa-4239b2 DeleteMenu 2129->2131 2131->2106
                                                                APIs
                                                                  • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                • RegisterClassA.USER32(0049A630), ref: 004238C7
                                                                • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                • SetWindowLongA.USER32(00410470,000000FC,0042369C), ref: 00423954
                                                                • SendMessageA.USER32(00410470,00000080,00000001,00000000), ref: 00423975
                                                                • GetSystemMenu.USER32(00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                • DeleteMenu.USER32(00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                • String ID:
                                                                • API String ID: 183575631-0
                                                                • Opcode ID: c8fcbfd9b9810cc8d346b7bcb1c0b9376f0704ecee460d5245f5952ba894899b
                                                                • Instruction ID: 82f3192e6ade9fc2431bdc17690f87bdde911e200ecbc62aa143bb8a1c16cd18
                                                                • Opcode Fuzzy Hash: c8fcbfd9b9810cc8d346b7bcb1c0b9376f0704ecee460d5245f5952ba894899b
                                                                • Instruction Fuzzy Hash: A93177B17402106AE710BFA5DC82F6636989714709F54017BFA44EF2D7C6BDED40876D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2133 42f5d4-42f5de 2134 42f5e0-42f5e3 call 402d30 2133->2134 2135 42f5e8-42f625 call 402b30 GetActiveWindow GetFocus call 41eeb4 2133->2135 2134->2135 2141 42f637-42f63f 2135->2141 2142 42f627-42f631 RegisterClassA 2135->2142 2143 42f6c6-42f6e2 SetFocus call 403400 2141->2143 2144 42f645-42f676 CreateWindowExA 2141->2144 2142->2141 2144->2143 2146 42f678-42f6bc call 42428c call 403738 CreateWindowExA 2144->2146 2146->2143 2152 42f6be-42f6c1 ShowWindow 2146->2152 2152->2143
                                                                APIs
                                                                • GetActiveWindow.USER32 ref: 0042F603
                                                                • GetFocus.USER32 ref: 0042F60B
                                                                • RegisterClassA.USER32(0049A7AC), ref: 0042F62C
                                                                • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F700,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F66A
                                                                • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F6B0
                                                                • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F6C1
                                                                • SetFocus.USER32(00000000,00000000,0042F6E3,?,?,?,00000001,00000000,?,004583FA,00000000,0049C628), ref: 0042F6C8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                • String ID: TWindowDisabler-Window
                                                                • API String ID: 3167913817-1824977358
                                                                • Opcode ID: 329e45f8b9a76be32e2a3852da0fb01f5e5fb6a649be07f73332a055a5178ca6
                                                                • Instruction ID: d29da226113d58e61871af9e0701154b32a21c5c31e3c64538275018e3c6a7a6
                                                                • Opcode Fuzzy Hash: 329e45f8b9a76be32e2a3852da0fb01f5e5fb6a649be07f73332a055a5178ca6
                                                                • Instruction Fuzzy Hash: 35219771740710BAE210EFA59C43F1A76B4EF04B54F91413BF504AB2E1D7B95C1587AD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2153 453264-4532b5 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 2154 4532b7-4532be 2153->2154 2155 4532c0-4532c2 2153->2155 2154->2155 2156 4532c4 2154->2156 2157 4532c6-4532fc call 42e3a4 call 42e8d8 call 403400 2155->2157 2156->2157
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 00453284
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045328A
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 0045329E
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004532A4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                • API String ID: 1646373207-2130885113
                                                                • Opcode ID: 8a728ce11e9b8acd7ee0e88331664095462ef5fb6b1690cb1722d2ba2dad7e7d
                                                                • Instruction ID: 110c83de3d6355277510abd5b52a320a2c8dd2afbae334eef16c728cb9d202ef
                                                                • Opcode Fuzzy Hash: 8a728ce11e9b8acd7ee0e88331664095462ef5fb6b1690cb1722d2ba2dad7e7d
                                                                • Instruction Fuzzy Hash: 5E01DF70644645AFD300BF769C02F2A3A58E705B9BF60447BFC00A62D3CA7C8A0CCA2D
                                                                APIs
                                                                • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 004672CB
                                                                • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004672F1
                                                                  • Part of subcall function 00467168: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467200
                                                                  • Part of subcall function 00467168: DestroyCursor.USER32(00000000), ref: 00467216
                                                                • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467348
                                                                • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 004673A9
                                                                • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004673CF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                • String ID: c:\directory$shell32.dll
                                                                • API String ID: 3376378930-1375355148
                                                                • Opcode ID: 8ba974db7d431cfc828555254f055e085d4bb255e1d8418bde2e11c534446a10
                                                                • Instruction ID: 712749594264273e91c57dfa4baa87cbb3c5fbf3a827f6648ccfc37e71b26823
                                                                • Opcode Fuzzy Hash: 8ba974db7d431cfc828555254f055e085d4bb255e1d8418bde2e11c534446a10
                                                                • Instruction Fuzzy Hash: 3B515F70604204AFDB10EF65CC89FDEB7E8AB48308F1041B7F80897351D6389E80DB59
                                                                APIs
                                                                • RegisterClipboardFormatA.USER32(commdlg_help), ref: 004309BC
                                                                • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 004309CB
                                                                • GetCurrentThreadId.KERNEL32 ref: 004309E5
                                                                • GlobalAddAtomA.KERNEL32(00000000), ref: 00430A06
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                • API String ID: 4130936913-2943970505
                                                                • Opcode ID: c544fb85ff372cb1e77a17e690d9a21f18419a27c2c54a515182e1a09c276035
                                                                • Instruction ID: 7bf223393b5a8c163278de6a14ca069cc176d79392cc0efa73562a49209d61c7
                                                                • Opcode Fuzzy Hash: c544fb85ff372cb1e77a17e690d9a21f18419a27c2c54a515182e1a09c276035
                                                                • Instruction Fuzzy Hash: 2FF082709583409BC300FB6598427197BE0AB58308F00567FB458A2291E77C9900CB5F
                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,004552A0,004552A0,00000031,004552A0,00000000), ref: 0045522E
                                                                • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,004552A0,004552A0,00000031,004552A0), ref: 0045523B
                                                                  • Part of subcall function 00454FF0: WaitForInputIdle.USER32(00000001,00000032), ref: 0045501C
                                                                  • Part of subcall function 00454FF0: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 0045503E
                                                                  • Part of subcall function 00454FF0: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 0045504D
                                                                  • Part of subcall function 00454FF0: CloseHandle.KERNEL32(00000001,0045507A,00455073,?,00000031,00000080,00000000,?,?,004553D3,00000080,0000003C,00000000,004553E9), ref: 0045506D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                • API String ID: 854858120-615399546
                                                                • Opcode ID: a12f25e84c64b35caf56505833b4763bf51916e1d96f6a3c0ca2e673e5a5c59b
                                                                • Instruction ID: fd2d6d40b6f8736679a78553b36ca572aba09dccd5489fff61a9141705bf80db
                                                                • Opcode Fuzzy Hash: a12f25e84c64b35caf56505833b4763bf51916e1d96f6a3c0ca2e673e5a5c59b
                                                                • Instruction Fuzzy Hash: 26516D30A0071DABDF01EF95C852BEEBBB9AF44345F50407BF804B7282D7785A098B59
                                                                APIs
                                                                • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                • OemToCharA.USER32(?,?), ref: 0042376C
                                                                • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Char$FileIconLoadLowerModuleName
                                                                • String ID: 2$MAINICON
                                                                • API String ID: 3935243913-3181700818
                                                                • Opcode ID: 94be23ded0f0311b18ce29275d80a7e53a17d1ad05c6cae946e4599a61e1d5ea
                                                                • Instruction ID: 6f4b3398584102735ad00b8493fe389bc1dbaef6f787fac7706901cc0cbf584f
                                                                • Opcode Fuzzy Hash: 94be23ded0f0311b18ce29275d80a7e53a17d1ad05c6cae946e4599a61e1d5ea
                                                                • Instruction Fuzzy Hash: 23319370A042549ADF10EF69C8C57C67BE8AF14308F4441BAE844DB393D7BED988CB69
                                                                APIs
                                                                • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                  • Part of subcall function 004230D8: GetDC.USER32(00000000), ref: 0042312E
                                                                  • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410470,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                  • Part of subcall function 004230D8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423149
                                                                  • Part of subcall function 004230D8: ReleaseDC.USER32(00000000,00000000), ref: 00423154
                                                                  • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                  • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                  • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                  • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                  • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                  • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                  • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                  • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                  • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                                • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                • API String ID: 316262546-2767913252
                                                                • Opcode ID: 13d9bdced9750e67f73d93ec74d54abaa35f495c5bba4d3cc3e2f323313cf858
                                                                • Instruction ID: b4be2cf3334f9eeef2f7e30357217019d1f7f37f78cfa945b19fc5b38c57745f
                                                                • Opcode Fuzzy Hash: 13d9bdced9750e67f73d93ec74d54abaa35f495c5bba4d3cc3e2f323313cf858
                                                                • Instruction Fuzzy Hash: CE112CB06142409BC740FF66998278A7BE1AB68308F40943FF848E7291DB3DAD458B1E
                                                                APIs
                                                                • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: LongWindow$Prop
                                                                • String ID:
                                                                • API String ID: 3887896539-0
                                                                • Opcode ID: 34b367db4fa110d3f73a4511ae8beb0e64a5e5a51f2810bc4cb64f6c76f31942
                                                                • Instruction ID: 3f72449cbd34e5f3a25e72b7cfa2937fee5ee0203059de802df544128507dfad
                                                                • Opcode Fuzzy Hash: 34b367db4fa110d3f73a4511ae8beb0e64a5e5a51f2810bc4cb64f6c76f31942
                                                                • Instruction Fuzzy Hash: DA11CC76100244BFDF00DF99DC84E9A37E8AB19364F104266B918DB3E2D739E9909B99
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00455917,?,00000000,00455957), ref: 0045585D
                                                                Strings
                                                                • PendingFileRenameOperations, xrefs: 004557FC
                                                                • WININIT.INI, xrefs: 0045588C
                                                                • PendingFileRenameOperations2, xrefs: 0045582C
                                                                • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004557E0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen
                                                                • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                • API String ID: 47109696-2199428270
                                                                • Opcode ID: 9f13e54b28b117c6c951523ac57e4ec8eff7d48dd1f3fb754fdced39f25454b8
                                                                • Instruction ID: 0edf169a16dfa4fb7533b8b55fc7b889579560f25e46b257abcc71cf1b5dc2f9
                                                                • Opcode Fuzzy Hash: 9f13e54b28b117c6c951523ac57e4ec8eff7d48dd1f3fb754fdced39f25454b8
                                                                • Instruction Fuzzy Hash: AB519874E00608DBDB10EF62DC51AEEB7B9EF44315F50847BEC04A7292DB7CAA45CA58
                                                                APIs
                                                                • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047D16E,?,?,00000000,0049C628,00000000,00000000,?,00498C11,00000000,00498DBA,?,00000000), ref: 0047D0AB
                                                                • GetLastError.KERNEL32(00000000,00000000,00000000,0047D16E,?,?,00000000,0049C628,00000000,00000000,?,00498C11,00000000,00498DBA,?,00000000), ref: 0047D0B4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                                • API String ID: 1375471231-2952887711
                                                                • Opcode ID: a1715584ba94e4ec2e60fd9adbe39064ab1430a51d48f091bd4064c668cb3361
                                                                • Instruction ID: c65adf921b1b6e4579252068e4265065b5a45be28dde5098669b3b5892976db2
                                                                • Opcode Fuzzy Hash: a1715584ba94e4ec2e60fd9adbe39064ab1430a51d48f091bd4064c668cb3361
                                                                • Instruction Fuzzy Hash: F9411674E101099BDB01EF95DC82ADEB7B9EF45309F50853BE81477392DB38AE058B68
                                                                APIs
                                                                • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$EnumLongWindows
                                                                • String ID: lAB
                                                                • API String ID: 4191631535-3476862382
                                                                • Opcode ID: 7dcdbb5f1d382cba8886e06331430e6d6fce3cff686b988b3074a9d4c358ab09
                                                                • Instruction ID: 1d232068e43b915345d7588b37cc7287aafbcd058231e570564fb52883b43028
                                                                • Opcode Fuzzy Hash: 7dcdbb5f1d382cba8886e06331430e6d6fce3cff686b988b3074a9d4c358ab09
                                                                • Instruction Fuzzy Hash: E3115E70704610ABDB10AF28DC85F5A77E8EB08725F50026AF9A49B2E7C378DD40CB58
                                                                APIs
                                                                • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                                • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,00497F35), ref: 0042DE7B
                                                                • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressDeleteHandleModuleProc
                                                                • String ID: RegDeleteKeyExA$advapi32.dll
                                                                • API String ID: 588496660-1846899949
                                                                • Opcode ID: 780e4264db312733bee64b8429de1b59d21d94b92bca9a45197840037c94c444
                                                                • Instruction ID: 9cada17f2adbafa0ebcb77ec43832f820b82eaaa71c9ca0bcc52793b6cf27115
                                                                • Opcode Fuzzy Hash: 780e4264db312733bee64b8429de1b59d21d94b92bca9a45197840037c94c444
                                                                • Instruction Fuzzy Hash: EFE065B1B40A70BAD62036657C89B972718DB79325F615537F105A91D182BC1C40CE9C
                                                                Strings
                                                                • PrepareToInstall failed: %s, xrefs: 0046BF6E
                                                                • NextButtonClick, xrefs: 0046BD4C
                                                                • Need to restart Windows? %s, xrefs: 0046BF95
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                • API String ID: 0-2329492092
                                                                • Opcode ID: 2482342cf09780f3cc85a79916584030efb236fd66ea0455236200f368d4c793
                                                                • Instruction ID: 9b4fd168f37c7da821868febde12ed9d5c4eb704a6c877b85ca6115e961808cc
                                                                • Opcode Fuzzy Hash: 2482342cf09780f3cc85a79916584030efb236fd66ea0455236200f368d4c793
                                                                • Instruction Fuzzy Hash: ECD12B34A00109DFCB10EFA9D585AEE77F5EF49304F6440BAE404AB352E778AE45CB5A
                                                                APIs
                                                                • SetActiveWindow.USER32(?,?,00000000,004838B9), ref: 0048368C
                                                                • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0048372A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ActiveChangeNotifyWindow
                                                                • String ID: $Need to restart Windows? %s
                                                                • API String ID: 1160245247-4200181552
                                                                • Opcode ID: 1d42271db157847063bc1684c76a3f1b571b73f0fbe1024385b2a1440cdba256
                                                                • Instruction ID: ac7489165aebe6410750fc54bddbdfbbf0a744a872c0faa15b6e968571d36d29
                                                                • Opcode Fuzzy Hash: 1d42271db157847063bc1684c76a3f1b571b73f0fbe1024385b2a1440cdba256
                                                                • Instruction Fuzzy Hash: 2891B274A042449FCB11FF69D885B9D7BE0AF59709F0044BBE8009B362D778AE49CB5E
                                                                APIs
                                                                  • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                • GetLastError.KERNEL32(00000000,0046FED1,?,?,0049D1E0,00000000), ref: 0046FDAE
                                                                • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FE28
                                                                • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FE4D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                • String ID: Creating directory: %s
                                                                • API String ID: 2451617938-483064649
                                                                • Opcode ID: 117d1655f334007bf170a7645c0ff38e0762150d831baea0a8383fbe162a65f0
                                                                • Instruction ID: bfe09206507b5b37383d903e763d781286b330fb05695de0be9d4a8a79558abe
                                                                • Opcode Fuzzy Hash: 117d1655f334007bf170a7645c0ff38e0762150d831baea0a8383fbe162a65f0
                                                                • Instruction Fuzzy Hash: 73513074E00248ABDB01DBA5D982BDEBBF5AF48304F50857AE840B7392D7795E08CB59
                                                                APIs
                                                                • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454EF6
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454FBC), ref: 00454F60
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressByteCharMultiProcWide
                                                                • String ID: SfcIsFileProtected$sfc.dll
                                                                • API String ID: 2508298434-591603554
                                                                • Opcode ID: 3217ee99d138f0ad1313a93335353a3aec08b44a783225051531d7f68469a82d
                                                                • Instruction ID: fbb3ec6cd5b50b63fd35f8a1b68fa202e0926d3941eb24adcf984c27ed24a225
                                                                • Opcode Fuzzy Hash: 3217ee99d138f0ad1313a93335353a3aec08b44a783225051531d7f68469a82d
                                                                • Instruction Fuzzy Hash: E041A931A04218AFE710DB59DC85B9DB7B8AB4430DF5041BBA908A7293D7789F89CB1D
                                                                APIs
                                                                • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                • RegisterClassA.USER32(?), ref: 004164DE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Class$InfoRegisterUnregister
                                                                • String ID: @
                                                                • API String ID: 3749476976-2766056989
                                                                • Opcode ID: 85068b72ba2ba295b14f4658a1322ca7c37278390634d37c4534b11c3d07e261
                                                                • Instruction ID: 0582e4decd83047b7d259989b1a1a5a7d11b83513a4c29c925389085b8c31041
                                                                • Opcode Fuzzy Hash: 85068b72ba2ba295b14f4658a1322ca7c37278390634d37c4534b11c3d07e261
                                                                • Instruction Fuzzy Hash: 9E316F706042409BD720EF68C881B9B77E5AB85308F04457FF989DB396DB39D984CB6A
                                                                APIs
                                                                • 751C1520.VERSION(00000000,?,?,?,00497FD8), ref: 004525A4
                                                                • 751C1500.VERSION(00000000,?,00000000,?,00000000,0045261F,?,00000000,?,?,?,00497FD8), ref: 004525D1
                                                                • 751C1540.VERSION(?,00452648,?,?,00000000,?,00000000,?,00000000,0045261F,?,00000000,?,?,?,00497FD8), ref: 004525EB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: C1500C1520C1540
                                                                • String ID: Y&E
                                                                • API String ID: 1315064709-1497692694
                                                                • Opcode ID: fc37f08206c8e69686d66defdddf94d54b59a29bfc554a83f5df64d87965b3cc
                                                                • Instruction ID: fe46317749af1235fc1090c5145677311abee9a989b9ebf20271da6a38a4ce9d
                                                                • Opcode Fuzzy Hash: fc37f08206c8e69686d66defdddf94d54b59a29bfc554a83f5df64d87965b3cc
                                                                • Instruction Fuzzy Hash: 89218471A00608AFDB01DAA98D41DAFB7FCEB4A701F55407BFD00E3382D6B99E058769
                                                                APIs
                                                                • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                  • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                  • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                  • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                • String ID: SHAutoComplete$shlwapi.dll
                                                                • API String ID: 395431579-1506664499
                                                                • Opcode ID: c7efe619f5e20201de876e313b24fed92eb53944867450a94c2631c4c6fd4432
                                                                • Instruction ID: c6c149a21ca36cce9dc82633ca781001b445ce448e924a27762e383bc0e4c558
                                                                • Opcode Fuzzy Hash: c7efe619f5e20201de876e313b24fed92eb53944867450a94c2631c4c6fd4432
                                                                • Instruction Fuzzy Hash: 9611A331B40214BBD711EB62EC81B9E7BA8DB55704F90447BF400A6691DBB89E058A6C
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(?,00455B23,?,00000001,00000000), ref: 00455B16
                                                                Strings
                                                                • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455AC4
                                                                • PendingFileRenameOperations, xrefs: 00455AE8
                                                                • PendingFileRenameOperations2, xrefs: 00455AF7
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen
                                                                • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                • API String ID: 47109696-2115312317
                                                                • Opcode ID: a49214c642ba0f5729985fa818f0988ef7dc9ffa23a320832437af575ff29d5e
                                                                • Instruction ID: 8ecee5c25e066e5253f0bac752b33d84760847f1c596038c9bfe8eab8c09834c
                                                                • Opcode Fuzzy Hash: a49214c642ba0f5729985fa818f0988ef7dc9ffa23a320832437af575ff29d5e
                                                                • Instruction Fuzzy Hash: 62F06D71604A08ABE704D666EC2BA3F73ACD745711FA0446AF80096682EA7DBD04966C
                                                                APIs
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,00472521,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD), ref: 004724FD
                                                                • FindClose.KERNEL32(000000FF,00472528,00472521,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD,?), ref: 0047251B
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,00472643,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD), ref: 0047261F
                                                                • FindClose.KERNEL32(000000FF,0047264A,00472643,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD,?), ref: 0047263D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileNext
                                                                • String ID:
                                                                • API String ID: 2066263336-0
                                                                • Opcode ID: 0aad0ca223d361cdf7185534db0e2529d4c60198fdf399a0627194588adf2dcc
                                                                • Instruction ID: 7a1bd4c17f6bec3c86e88fdd6a66a52641a18dd0aa7136e5d167ac57a2fd4188
                                                                • Opcode Fuzzy Hash: 0aad0ca223d361cdf7185534db0e2529d4c60198fdf399a0627194588adf2dcc
                                                                • Instruction Fuzzy Hash: EFC13A7090424DAFCF11DFA5C981ADEBBB8BF48304F5085AAE848B3291D7789E46CF54
                                                                APIs
                                                                • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?,?,00000000), ref: 00480222
                                                                • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?,?), ref: 0048022F
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,00480348,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625), ref: 00480324
                                                                • FindClose.KERNEL32(000000FF,0048034F,00480348,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?), ref: 00480342
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileNext
                                                                • String ID:
                                                                • API String ID: 2066263336-0
                                                                • Opcode ID: c9213149dad22109f0a90e82e8ac420b2eeb9db7d2efcfc5c24199a260e086dc
                                                                • Instruction ID: 9f58e88908a8a949c71addf9751e3e387abd808faae0fc06516958b92eae9c2a
                                                                • Opcode Fuzzy Hash: c9213149dad22109f0a90e82e8ac420b2eeb9db7d2efcfc5c24199a260e086dc
                                                                • Instruction Fuzzy Hash: EF514071A00648AFCB61EFA5CC45ADEB7B8EB48315F1044AAA808E7351D6389F89CF54
                                                                APIs
                                                                • GetMenu.USER32(00000000), ref: 00421371
                                                                • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Menu
                                                                • String ID:
                                                                • API String ID: 3711407533-0
                                                                • Opcode ID: e1bfbeb149fb62e2ad3ad2db837168bd52a0f21d6f4abec7b0304e20cb9d907d
                                                                • Instruction ID: e7a4369f7fbd106bab2429e1e1dd333134a7e32046ee40fa4552f8195e128e42
                                                                • Opcode Fuzzy Hash: e1bfbeb149fb62e2ad3ad2db837168bd52a0f21d6f4abec7b0304e20cb9d907d
                                                                • Instruction Fuzzy Hash: 3F41BE3070026457EB20EA7AA88579B26965F69318F4815BFBC40DF3A3CA7DCC49839D
                                                                APIs
                                                                • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Color$CallMessageProcSendTextWindow
                                                                • String ID:
                                                                • API String ID: 601730667-0
                                                                • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                • Instruction ID: 87133af12c35957a9f748eb5c35761c869d5d8ea54ed11f3f8892641f8a911b8
                                                                • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                • Instruction Fuzzy Hash: A71151B5600A04AFC710EE6ECC84E8773ECDF48314715843EB59ADB612D63CF8418B69
                                                                APIs
                                                                • WaitForInputIdle.USER32(00000001,00000032), ref: 0045501C
                                                                • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 0045503E
                                                                • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 0045504D
                                                                • CloseHandle.KERNEL32(00000001,0045507A,00455073,?,00000031,00000080,00000000,?,?,004553D3,00000080,0000003C,00000000,004553E9), ref: 0045506D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                • String ID:
                                                                • API String ID: 4071923889-0
                                                                • Opcode ID: 39f7529b9e24ef62f0317050639ef396781e58c2c3035764b485bd24a139d6c6
                                                                • Instruction ID: d12116b756cd226a9453b7b7c95f557e71215baafd626de0b651f5c3ff172158
                                                                • Opcode Fuzzy Hash: 39f7529b9e24ef62f0317050639ef396781e58c2c3035764b485bd24a139d6c6
                                                                • Instruction Fuzzy Hash: F801F570A00A08BEEB209BA9CC12F7F7BACDF45B60F600167B904D32C2C5789D0486B8
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 0042312E
                                                                • EnumFontsA.GDI32(00000000,00000000,00423078,00410470,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423149
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00423154
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CapsDeviceEnumFontsRelease
                                                                • String ID:
                                                                • API String ID: 2698912916-0
                                                                • Opcode ID: 94eb306c5e826a01f1e4729cfd5040e8a639f913efc3b2db58b8d9c882bc8d8f
                                                                • Instruction ID: 95c686a17d04cc75fabac772af01a2849e5ccccd572a20f260adec4fb0f0daed
                                                                • Opcode Fuzzy Hash: 94eb306c5e826a01f1e4729cfd5040e8a639f913efc3b2db58b8d9c882bc8d8f
                                                                • Instruction Fuzzy Hash: 7D01DE617043002AE310BF7A5C82BAB3BA49F05319F40027FF908AA3C2D67E9C0447AE
                                                                APIs
                                                                • RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                • RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                • LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                • RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                • String ID:
                                                                • API String ID: 730355536-0
                                                                • Opcode ID: 258d9deb6f7a10e014db2841a00646f08a98b62604f56307b5f20277c9267f14
                                                                • Instruction ID: 68a963c4b4ce3cb9fa4489d147f84cdc209e61955976dc0c42ca8291dd14a8a4
                                                                • Opcode Fuzzy Hash: 258d9deb6f7a10e014db2841a00646f08a98b62604f56307b5f20277c9267f14
                                                                • Instruction Fuzzy Hash: 1501C0707842405EFB19AB6998A27353ED4D796748F91803BF440A6AF1C67C4840CB6D
                                                                APIs
                                                                  • Part of subcall function 004509A0: SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                • FlushFileBuffers.KERNEL32(?), ref: 0045C541
                                                                Strings
                                                                • NumRecs range exceeded, xrefs: 0045C43E
                                                                • EndOffset range exceeded, xrefs: 0045C475
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: File$BuffersFlush
                                                                • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                • API String ID: 3593489403-659731555
                                                                • Opcode ID: d242a5201a059b73c70f899fa8921570319da7fea63c21e5f8666fd752ae71dd
                                                                • Instruction ID: 57127da9839884e48f93c65e4688b7b5a24f3d4ce709f11da5987aa0442ebed2
                                                                • Opcode Fuzzy Hash: d242a5201a059b73c70f899fa8921570319da7fea63c21e5f8666fd752ae71dd
                                                                • Instruction Fuzzy Hash: E461A234A003588FDB25DF25C891AD9B7B5EF49305F0084DAED89AB352DA74AEC8CF54
                                                                APIs
                                                                  • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,0049928E), ref: 0040334B
                                                                  • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,0049928E), ref: 00403356
                                                                  • Part of subcall function 0040632C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00499298), ref: 00406332
                                                                  • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040633F
                                                                  • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406355
                                                                  • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040636B
                                                                  • Part of subcall function 0040632C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00499298), ref: 00406376
                                                                  • Part of subcall function 004063D4: 6F9C1CD0.COMCTL32(0049929D), ref: 004063D4
                                                                  • Part of subcall function 00410774: GetCurrentThreadId.KERNEL32 ref: 004107C2
                                                                  • Part of subcall function 00419050: GetVersion.KERNEL32(004992B6), ref: 00419050
                                                                  • Part of subcall function 0044F7B8: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004992CA), ref: 0044F7F3
                                                                  • Part of subcall function 0044F7B8: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F7F9
                                                                  • Part of subcall function 0044FC84: GetVersionExA.KERNEL32(0049C790,004992CF), ref: 0044FC93
                                                                  • Part of subcall function 00453264: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 00453284
                                                                  • Part of subcall function 00453264: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045328A
                                                                  • Part of subcall function 00453264: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 0045329E
                                                                  • Part of subcall function 00453264: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004532A4
                                                                  • Part of subcall function 0045715C: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00457180
                                                                  • Part of subcall function 0046469C: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004992F2), ref: 004646AB
                                                                  • Part of subcall function 0046469C: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 004646B1
                                                                  • Part of subcall function 0046CEF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CF05
                                                                  • Part of subcall function 0047905C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004992FC), ref: 00479062
                                                                  • Part of subcall function 0047905C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047906F
                                                                  • Part of subcall function 0047905C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047907F
                                                                  • Part of subcall function 0048446C: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0048455B
                                                                  • Part of subcall function 0049628C: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 004962A5
                                                                • SetErrorMode.KERNEL32(00000001,00000000,00499344), ref: 00499316
                                                                  • Part of subcall function 00499040: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00499320,00000001,00000000,00499344), ref: 0049904A
                                                                  • Part of subcall function 00499040: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00499050
                                                                  • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                  • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                • ShowWindow.USER32(?,00000005,00000000,00499344), ref: 00499377
                                                                  • Part of subcall function 00482AAC: SetActiveWindow.USER32(?), ref: 00482B5A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                • String ID: Setup
                                                                • API String ID: 504348408-3839654196
                                                                • Opcode ID: 233cc421e83f8cc3dcda037f4a9b597bd0151155db56c05575de1988a9d1a60d
                                                                • Instruction ID: 0ced0f24ac175d21b3299cf0cac8cd2bc44ae01cd64648103e70fccb26a7f3a2
                                                                • Opcode Fuzzy Hash: 233cc421e83f8cc3dcda037f4a9b597bd0151155db56c05575de1988a9d1a60d
                                                                • Instruction Fuzzy Hash: A231C6312086408FD6117BBBEC5365D3BA8EB8D718BA2447FF80496693DE3D5C118A7E
                                                                APIs
                                                                • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B87,?,?,00000000,0049C628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453ADE
                                                                • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B87,?,?,00000000,0049C628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453AE7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID: .tmp
                                                                • API String ID: 1375471231-2986845003
                                                                • Opcode ID: 2e6224e559e09b21c1e7174e7b36b30504437a5f64767d5dc9f4cda500c72cf1
                                                                • Instruction ID: ff9a18ef253650dbf03605879231b3438c9749bdb0146341c5730265e1144e14
                                                                • Opcode Fuzzy Hash: 2e6224e559e09b21c1e7174e7b36b30504437a5f64767d5dc9f4cda500c72cf1
                                                                • Instruction Fuzzy Hash: A4213674A00208ABDB01EFA5C8529EEB7B8EB44315F50457BF801B7342DA389F058B69
                                                                APIs
                                                                  • Part of subcall function 00483F60: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483F71
                                                                  • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483F7E
                                                                  • Part of subcall function 00483F60: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483F8C
                                                                  • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483F94
                                                                  • Part of subcall function 00483F60: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483FA0
                                                                  • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483FC1
                                                                  • Part of subcall function 00483F60: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483FD4
                                                                  • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483FDA
                                                                  • Part of subcall function 0048428C: GetVersionExA.KERNEL32(?,0048449E,00000000,00484573,?,?,?,?,?,00499301), ref: 0048429A
                                                                  • Part of subcall function 0048428C: GetVersionExA.KERNEL32(0000009C,?,0048449E,00000000,00484573,?,?,?,?,?,00499301), ref: 004842EC
                                                                  • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                  • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0048455B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                                • String ID: SHGetKnownFolderPath$shell32.dll
                                                                • API String ID: 3869789854-2936008475
                                                                • Opcode ID: 9e6442ad45a9baf58573cca34446e5dc04ecce57dab5d62ccafdb81a0b60815b
                                                                • Instruction ID: 72a1cd0c007ae7d2331b3d049f57d6a032e0567b1decddf8ad8e9e8191a8a5bf
                                                                • Opcode Fuzzy Hash: 9e6442ad45a9baf58573cca34446e5dc04ecce57dab5d62ccafdb81a0b60815b
                                                                • Instruction Fuzzy Hash: D821EFB0A243416AC700BFBE596614A3BA5EB9471C390493BF800EB3D1D67E6414AB6E
                                                                APIs
                                                                • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047CDB0,00000000,0047CDC6), ref: 0047CABE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Close
                                                                • String ID: RegisteredOrganization$RegisteredOwner
                                                                • API String ID: 3535843008-1113070880
                                                                • Opcode ID: c1b6d14e45d78727ed45f55f4f17675dd1bb73358709ca4c1a4910a815b4512c
                                                                • Instruction ID: 80e31e652a078fa29572911d568a821ff54af8e3d41ae7cfbc3eead46bc77173
                                                                • Opcode Fuzzy Hash: c1b6d14e45d78727ed45f55f4f17675dd1bb73358709ca4c1a4910a815b4512c
                                                                • Instruction Fuzzy Hash: 99F09021B04108ABD710D664EC82B9B33A9D741308F24847FA1049B351D679AE00975C
                                                                APIs
                                                                • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,JfG,?,0049D1E0,?,0046F353,?,00000000,0046F8EE,?,_is1), ref: 0046F05F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Value
                                                                • String ID: Inno Setup: Setup Version$JfG
                                                                • API String ID: 3702945584-2837433363
                                                                • Opcode ID: ba37289afc6bf64f1b4e35152e82186c6909c63cd97613f7ebaef7afec976743
                                                                • Instruction ID: 9307b71ef0b0d9a21e7f4f46c2dc1735a92df317579ad27da25cacea1a1ff421
                                                                • Opcode Fuzzy Hash: ba37289afc6bf64f1b4e35152e82186c6909c63cd97613f7ebaef7afec976743
                                                                • Instruction Fuzzy Hash: 0AE06D713016047FD710AA6B9C85F5BABDCDF88365F00403AB908DB392D578DD0042A8
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004758BF), ref: 004756AD
                                                                • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004758BF), ref: 004756C4
                                                                  • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateErrorFileHandleLast
                                                                • String ID: CreateFile
                                                                • API String ID: 2528220319-823142352
                                                                • Opcode ID: 79eec7588c7af6c2029a89254d08153dd0e3e04ff33533a08b7dcbd789b2e8ab
                                                                • Instruction ID: 806dc226f5a2fe5ebbb1f055bcab6d135f745baec99644e0dc49489f7e0d9994
                                                                • Opcode Fuzzy Hash: 79eec7588c7af6c2029a89254d08153dd0e3e04ff33533a08b7dcbd789b2e8ab
                                                                • Instruction Fuzzy Hash: E4E06D303403447BEA10EA79DCC6F4A77989B04778F108151FA48AF3E2C5B9FC408A58
                                                                APIs
                                                                  • Part of subcall function 004570EC: CoInitialize.OLE32(00000000), ref: 004570F2
                                                                  • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                  • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00457180
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                • API String ID: 2906209438-2320870614
                                                                • Opcode ID: 117bb836f2798fba922b12c43cef4fcbc71072008b94f68fc3b4bb9dbbbeaa5f
                                                                • Instruction ID: 9c527047bf7e84dae422e031a0d6d6e9bbae4a3d03e504f065b317ec79f67602
                                                                • Opcode Fuzzy Hash: 117bb836f2798fba922b12c43cef4fcbc71072008b94f68fc3b4bb9dbbbeaa5f
                                                                • Instruction Fuzzy Hash: 6AC04CA0B4591066C70077B6AC0361F24459B4072FB14C07BBD44A7787CE3D884D6A6E
                                                                APIs
                                                                  • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                  • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CF05
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressErrorLibraryLoadModeProc
                                                                • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                • API String ID: 2492108670-2683653824
                                                                • Opcode ID: 8a5a2bfda678a4119f98cbe0ea23aba1ca22618b19e5ef326a03b239f4c9458f
                                                                • Instruction ID: 33f7e53ae4e5ba8297804bd6606edee94f75655c5a8d17986cd3cb8a189a0b51
                                                                • Opcode Fuzzy Hash: 8a5a2bfda678a4119f98cbe0ea23aba1ca22618b19e5ef326a03b239f4c9458f
                                                                • Instruction Fuzzy Hash: CDB092B0A146405ACB446772988262B20069B4071DF60843BB4C4AB6D9EABC88492B9F
                                                                APIs
                                                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,0044877D), ref: 004486C0
                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00448741
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID:
                                                                • API String ID: 2574300362-0
                                                                • Opcode ID: 9192854c716958fcf12a54fd54f15ae173329ead0ce31acd6b56a672af8f6247
                                                                • Instruction ID: 67510ac2dd358758032eb9bd0b15bc7699fd1d5ac1297ef1938a655c08aa7b0d
                                                                • Opcode Fuzzy Hash: 9192854c716958fcf12a54fd54f15ae173329ead0ce31acd6b56a672af8f6247
                                                                • Instruction Fuzzy Hash: 89515574E00109AFDB10EF95C891A9EB7F9EB44315F20817FE814BB391CA789E05CB99
                                                                APIs
                                                                • GetSystemMenu.USER32(00000000,00000000,00000000,00482298), ref: 00482230
                                                                • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00482241
                                                                • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00482259
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Menu$Append$System
                                                                • String ID:
                                                                • API String ID: 1489644407-0
                                                                • Opcode ID: b0f6966b6a184f1facb0a871f26b18c64fa7cdea68dfa8979e13f5b501864372
                                                                • Instruction ID: a26f55f7f9cdec50315d50fbbd1418f41be5c601f9b239732c1f252fb764c371
                                                                • Opcode Fuzzy Hash: b0f6966b6a184f1facb0a871f26b18c64fa7cdea68dfa8979e13f5b501864372
                                                                • Instruction Fuzzy Hash: FE31CD707043451BD721BB368D86B9E3B949B5A318F50197FF900AA3E3CABC9D09839D
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 0044B475
                                                                • SelectObject.GDI32(?,00000000), ref: 0044B498
                                                                • ReleaseDC.USER32(00000000,?), ref: 0044B4CB
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ObjectReleaseSelect
                                                                • String ID:
                                                                • API String ID: 1831053106-0
                                                                • Opcode ID: a18c564e5665bffaeec971d30f69da7c159b46b6830c6159626304e36c153c38
                                                                • Instruction ID: 7b4e641b5f80a70363e1f29cb6207b12473e64a09d761e596b30cfa5093ee172
                                                                • Opcode Fuzzy Hash: a18c564e5665bffaeec971d30f69da7c159b46b6830c6159626304e36c153c38
                                                                • Instruction Fuzzy Hash: FE217970E04344BFEB11DFA5C841B9EBBB8DB49304F51807AF900A6292D77CD940CB59
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B1C0,?,00482AC7,?,?), ref: 0044B192
                                                                • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B1A5
                                                                • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B1D9
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DrawText$ByteCharMultiWide
                                                                • String ID:
                                                                • API String ID: 65125430-0
                                                                • Opcode ID: 9eed18fe0356815f810c820b6721896f6c4265f9db16303b213c34b2c03d3f04
                                                                • Instruction ID: 63060d4c4a21d3a06b37f0b793f587d40fe85ad593019d515c43c5dd919fcfdf
                                                                • Opcode Fuzzy Hash: 9eed18fe0356815f810c820b6721896f6c4265f9db16303b213c34b2c03d3f04
                                                                • Instruction Fuzzy Hash: 3111CBB27046047FEB11DB6A9C82D6F77ECDB49750F10417BF504D72D0D6389E018669
                                                                APIs
                                                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                • TranslateMessage.USER32(?), ref: 0042449F
                                                                • DispatchMessageA.USER32(?), ref: 004244A9
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Message$DispatchPeekTranslate
                                                                • String ID:
                                                                • API String ID: 4217535847-0
                                                                • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                • Instruction ID: 24a07c1e81c585bad35552c3917a3e7b04f02dd2aaee7f9545dc892aa94dfb52
                                                                • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                • Instruction Fuzzy Hash: AE119E307043205AEE20FA64AD41B9B73D4DFE1708F80881EF8D997382D77D9E49879A
                                                                APIs
                                                                • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Prop$Window
                                                                • String ID:
                                                                • API String ID: 3363284559-0
                                                                • Opcode ID: 9ba9d7b7418b74f48756624976096bebc6fb66c7a646a8b19f5d3d1e069ceb03
                                                                • Instruction ID: 86f537f0b59e140ef7690159b30d1f2105a0adb91ae91f828a802e84d443a7b9
                                                                • Opcode Fuzzy Hash: 9ba9d7b7418b74f48756624976096bebc6fb66c7a646a8b19f5d3d1e069ceb03
                                                                • Instruction Fuzzy Hash: 4AF0BD72741220ABE710AB598C85FA632ECAB0D715F16017ABA05EF286C679DC4087A8
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$EnableEnabledVisible
                                                                • String ID:
                                                                • API String ID: 3234591441-0
                                                                • Opcode ID: 908e1640c45beef437f125b63470cd7f97cb81b788dbbb5d15c196427eefded0
                                                                • Instruction ID: 2c5c4f0331a1d41ebe9848165d0c8b98450d8d3461f9c723900bbadb0b89b381
                                                                • Opcode Fuzzy Hash: 908e1640c45beef437f125b63470cd7f97cb81b788dbbb5d15c196427eefded0
                                                                • Instruction Fuzzy Hash: 2DE0E5B81003006EE310AB2BEC81A57779CAB55354F55843BAC0997292D63ED8509ABD
                                                                APIs
                                                                • SetActiveWindow.USER32(?), ref: 0046A0F1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ActiveWindow
                                                                • String ID: PrepareToInstall
                                                                • API String ID: 2558294473-1101760603
                                                                • Opcode ID: b7687f3bb43c73226d704110cc29f9815bff5a15c1e12b08bb6fc701f5c431d6
                                                                • Instruction ID: 8b7f344ad1fa3e917ae8cfb2dbd3f87d9064e965c7569195748e39604a53e5b8
                                                                • Opcode Fuzzy Hash: b7687f3bb43c73226d704110cc29f9815bff5a15c1e12b08bb6fc701f5c431d6
                                                                • Instruction Fuzzy Hash: D2A11934A00109DFCB00EF99D986EDEB7F5AF49304F5540B6E804AB366D738AE45CB5A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: /:*?"<>|
                                                                • API String ID: 0-4078764451
                                                                • Opcode ID: 06161939b9b6972920a3f4778fa34d5926bec049205355badb073ad507413406
                                                                • Instruction ID: 6f1ddb1d4c6bf41fe4e6ef022f3ca721468d6fb529cb74a3921b09cafe59df1d
                                                                • Opcode Fuzzy Hash: 06161939b9b6972920a3f4778fa34d5926bec049205355badb073ad507413406
                                                                • Instruction Fuzzy Hash: BB719270A44205ABEB20F765DCC2BEE77A19B41348F10C077F580BB292E779AD49875E
                                                                APIs
                                                                • SetActiveWindow.USER32(?), ref: 00482B5A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ActiveWindow
                                                                • String ID: InitializeWizard
                                                                • API String ID: 2558294473-2356795471
                                                                • Opcode ID: 9aeb3d77867af7e6d972f6b1feb637164b3d788d95ca79b69b372c6f9b450635
                                                                • Instruction ID: db7d1b329271c039a587c966101a95f378ab38c3ed45019f3272f41b6ba32bbe
                                                                • Opcode Fuzzy Hash: 9aeb3d77867af7e6d972f6b1feb637164b3d788d95ca79b69b372c6f9b450635
                                                                • Instruction Fuzzy Hash: 6D115E31A09200AFD715FF29ED86B1A7BE4E759328F60443BE404872A1DA79AC46DB1D
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047CBC4,00000000,0047CDC6), ref: 0047C9BD
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C98D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                • API String ID: 47109696-1019749484
                                                                • Opcode ID: 3fa2b444f585c7e393a4e745fedb745ede847577bf0d6d8f1446cdfeccc58e1e
                                                                • Instruction ID: f187297608c4c2e120c43e334d4fef3d14aa164232434ebce48173692ca83dca
                                                                • Opcode Fuzzy Hash: 3fa2b444f585c7e393a4e745fedb745ede847577bf0d6d8f1446cdfeccc58e1e
                                                                • Instruction Fuzzy Hash: BAF089E170451467DA10A56A5C82BAE679D8B44758F20407FF608DB342D9B99D02435C
                                                                APIs
                                                                • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F72A,?,?,00000000,0046F8EE,?,_is1,?), ref: 0046F0BF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Value
                                                                • String ID: NoModify
                                                                • API String ID: 3702945584-1699962838
                                                                • Opcode ID: f62fff895c5cb5fcee211893b33144f563fc8351df9822a4020ec110b25f01ba
                                                                • Instruction ID: ad59d6647e2c6f1a966119a9b7040c47703766c51ad9b847bf72baa1670be9f7
                                                                • Opcode Fuzzy Hash: f62fff895c5cb5fcee211893b33144f563fc8351df9822a4020ec110b25f01ba
                                                                • Instruction Fuzzy Hash: 48E04FB4644304BFEB04DB95DD4AF6BB7ECDB48710F10405ABA04DB381E674FE008658
                                                                APIs
                                                                • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                Strings
                                                                • System\CurrentControlSet\Control\Windows, xrefs: 0042DE46
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID: System\CurrentControlSet\Control\Windows
                                                                • API String ID: 71445658-1109719901
                                                                • Opcode ID: 0f77c8ce853619a5698b89c9811bea03ab3af1fee96e2778c5ec7c5c80741e7e
                                                                • Instruction ID: abe9ee1dba80eab6c976627f4fe301d03bda2a195c3818943ffea28d54d696bb
                                                                • Opcode Fuzzy Hash: 0f77c8ce853619a5698b89c9811bea03ab3af1fee96e2778c5ec7c5c80741e7e
                                                                • Instruction Fuzzy Hash: E7D0C7729501287BD7009A89DC41DFB775DDB15760F41441BFD1897101C1B4EC5197F8
                                                                APIs
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,004543BA,?,00000000,0045442E,?,?,-00000001,00000000,?,0047D27F,00000000,0047D1CC,00000000), ref: 00454396
                                                                • FindClose.KERNEL32(000000FF,004543C1,004543BA,?,00000000,0045442E,?,?,-00000001,00000000,?,0047D27F,00000000,0047D1CC,00000000,00000000), ref: 004543B4
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileNext
                                                                • String ID:
                                                                • API String ID: 2066263336-0
                                                                • Opcode ID: 5632284a4a77ba60a9312a90f5b5e60329c247fbfdcdbfaae2567dfed88904c5
                                                                • Instruction ID: 47b905165b337c418e9cbeae38c6e4ba4915847252c56348aaf420d2765ccfe6
                                                                • Opcode Fuzzy Hash: 5632284a4a77ba60a9312a90f5b5e60329c247fbfdcdbfaae2567dfed88904c5
                                                                • Instruction Fuzzy Hash: 13815130A0424D9BCF11DF65C8457EFBBB5AF89309F1440A6EC546B393D3399A8ACB58
                                                                APIs
                                                                • GetACP.KERNEL32(?,?,00000001,00000000,0047EBD7,?,-0000001A,00480A90,-00000010,?,00000004,0000001C,00000000,00480DDD,?,0045DC10), ref: 0047E96E
                                                                  • Part of subcall function 0042E32C: GetDC.USER32(00000000), ref: 0042E33B
                                                                  • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 0042E366
                                                                  • Part of subcall function 0042E32C: ReleaseDC.USER32(00000000,?), ref: 0042E37E
                                                                • SendNotifyMessageA.USER32(000203B6,00000496,00002711,-00000001), ref: 0047EB3E
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: EnumFontsMessageNotifyReleaseSend
                                                                • String ID:
                                                                • API String ID: 2649214853-0
                                                                • Opcode ID: 11d352caf6cf76a194d8beb9d25bd90a8a3644bbb7cae3402d6ea1b77134e9b7
                                                                • Instruction ID: ea9abfd011146b73e97573b99a0886535bf82ee2c4f6ab80840a8034e1b56658
                                                                • Opcode Fuzzy Hash: 11d352caf6cf76a194d8beb9d25bd90a8a3644bbb7cae3402d6ea1b77134e9b7
                                                                • Instruction Fuzzy Hash: 5D51BA746001008BCB10FF26D98169B7BA9EB99309B90C67BA4099F367D73CED46C79D
                                                                APIs
                                                                • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,004021FC), ref: 004020CB
                                                                  • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                  • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                  • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                  • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                • String ID:
                                                                • API String ID: 296031713-0
                                                                • Opcode ID: 4fc8355347e9e1d4ccec0041d5b636f63783e5cfbebeb868820e8a41b8702e1d
                                                                • Instruction ID: 6f01476fa854e093772c88cc0e1a6b3f7d7d3886978438045dd483ce2d71c460
                                                                • Opcode Fuzzy Hash: 4fc8355347e9e1d4ccec0041d5b636f63783e5cfbebeb868820e8a41b8702e1d
                                                                • Instruction Fuzzy Hash: FA41D3B2F403019FDB10CF68DD9522A77A4F7A9324F15417BD854A77E1D3789841CB98
                                                                APIs
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID:
                                                                • API String ID: 3660427363-0
                                                                • Opcode ID: 80665b2cde9ee57e522dd8711412eaf931e33ec8b5fc09fadae09ede8aa250e9
                                                                • Instruction ID: 688ca5bec861f28c2d3c56c4d9756a3eee1da68b680b0c58c854c6ce0276e007
                                                                • Opcode Fuzzy Hash: 80665b2cde9ee57e522dd8711412eaf931e33ec8b5fc09fadae09ede8aa250e9
                                                                • Instruction Fuzzy Hash: BA414171E00529AFDB11DF95D881BAFB7B8BF40714F90846AE800F7241D778AE40CBA9
                                                                APIs
                                                                • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                                • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseEnum
                                                                • String ID:
                                                                • API String ID: 2818636725-0
                                                                • Opcode ID: 26f8c79d0474c179cb5d82a07cc8f4ff1f384b49e5c41d63d2cbffb4f08ced28
                                                                • Instruction ID: 7da1df7d23dc80ab26fde5356f239728af9ce1fcf96cfee1e9d17441f3ac576c
                                                                • Opcode Fuzzy Hash: 26f8c79d0474c179cb5d82a07cc8f4ff1f384b49e5c41d63d2cbffb4f08ced28
                                                                • Instruction Fuzzy Hash: E0317170F04258AEDB11DFA2DD82BAEB7B9EB44304F91447BE501E7291D6785E01CA2D
                                                                APIs
                                                                • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458320,00000000,00458308,?,?,?,00000000,004528D6,?,?,?,00000001), ref: 004528B0
                                                                • GetLastError.KERNEL32(00000000,00000000,?,?,00458320,00000000,00458308,?,?,?,00000000,004528D6,?,?,?,00000001), ref: 004528B8
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 2919029540-0
                                                                • Opcode ID: a1edda8d9d43bdf6393d164a5935c6c7d72f205fa9b275187b219f24b5744e4f
                                                                • Instruction ID: f1ff12a52b9ae97e51c0fc8bedc9ee5f8128ff8695a74900dad41ba9f3169ab0
                                                                • Opcode Fuzzy Hash: a1edda8d9d43bdf6393d164a5935c6c7d72f205fa9b275187b219f24b5744e4f
                                                                • Instruction Fuzzy Hash: D1113C72604208BF8B40DEA9DD41D9F77ECEB4D310B114567FD08D3241D674AD148B68
                                                                APIs
                                                                • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AE02
                                                                • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF5F,00000000,0040AF77,?,?,?,00000000), ref: 0040AE13
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Resource$FindFree
                                                                • String ID:
                                                                • API String ID: 4097029671-0
                                                                • Opcode ID: c2324eb5359665644a5176f1cf96553f9563edd3f7959fa6b260dc2c350a5fba
                                                                • Instruction ID: 0dcf9cb85912d996b0f29ff8386446a7da443b122bfb24013de7d2ae06ed8127
                                                                • Opcode Fuzzy Hash: c2324eb5359665644a5176f1cf96553f9563edd3f7959fa6b260dc2c350a5fba
                                                                • Instruction Fuzzy Hash: FB01F271300300AFDB00EFA9DC92E1A77EDEB49758B108077F500AB3D1DA39AC1096AA
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                • EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Thread$CurrentEnumWindows
                                                                • String ID:
                                                                • API String ID: 2396873506-0
                                                                • Opcode ID: 4f64f9abf12c4e0f4ed6bfdbad4522da757f8f173b64a0d5440e5a48dfcb49d5
                                                                • Instruction ID: 5ea5535e16dbd3a66c9b103d663da150a627407ba9bd10677b5e32ddf65fd45d
                                                                • Opcode Fuzzy Hash: 4f64f9abf12c4e0f4ed6bfdbad4522da757f8f173b64a0d5440e5a48dfcb49d5
                                                                • Instruction Fuzzy Hash: E9016D75A04704BFD305CF6AEC1195ABBF9E749720B22C877EC04D3690E7385820DE9A
                                                                APIs
                                                                • MoveFileA.KERNEL32(00000000,00000000), ref: 00452D36
                                                                • GetLastError.KERNEL32(00000000,00000000,00000000,00452D5C), ref: 00452D3E
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastMove
                                                                • String ID:
                                                                • API String ID: 55378915-0
                                                                • Opcode ID: c4b48003847f0ed345a39601a16e4078adce9229b20c3b289e599ac23a84d65a
                                                                • Instruction ID: 4fca69a62489ebc4a01fefb46b4f56da8e9c918d1d9d85a0206be36eb6df5136
                                                                • Opcode Fuzzy Hash: c4b48003847f0ed345a39601a16e4078adce9229b20c3b289e599ac23a84d65a
                                                                • Instruction Fuzzy Hash: 8501D671B04208BB8710EB7A9D4149EB7FCDB8A725760457BFC04E3642EAB85E088558
                                                                APIs
                                                                • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00452843), ref: 0045281D
                                                                • GetLastError.KERNEL32(00000000,00000000,00000000,00452843), ref: 00452825
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID:
                                                                • API String ID: 1375471231-0
                                                                • Opcode ID: 59bd06d30fc0fe818f6078148c6ffd212d90badc892a263c44d6fa9860574bcf
                                                                • Instruction ID: 740ef451bc259a1e9a82c9a6d4ec6f858251f5182fd79d8d66273d0612a28aea
                                                                • Opcode Fuzzy Hash: 59bd06d30fc0fe818f6078148c6ffd212d90badc892a263c44d6fa9860574bcf
                                                                • Instruction Fuzzy Hash: E2F02871A04704BBCB00EFF5AD0159EB3E8DB4A315B1046BBFC04E3242E6B94E048698
                                                                APIs
                                                                • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CursorLoad
                                                                • String ID:
                                                                • API String ID: 3238433803-0
                                                                • Opcode ID: f50906273b4dd4b76e2408c8e955edc8cf5c14898db3d3c1ed1d0f377b452c19
                                                                • Instruction ID: 8f8c17a0fbd4bdfe9a7359f041206873b2ad7c2d9544917d76f3b93295b1a640
                                                                • Opcode Fuzzy Hash: f50906273b4dd4b76e2408c8e955edc8cf5c14898db3d3c1ed1d0f377b452c19
                                                                • Instruction Fuzzy Hash: ABF0EC11704214EBDA109E7E6CC0E2A72A8DB91B36B7103BBFE3AD72D1C62E1D41427D
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLibraryLoadMode
                                                                • String ID:
                                                                • API String ID: 2987862817-0
                                                                • Opcode ID: 5776663e4489aa5ac087f663c1a997a3c9318ec70fb50d0ef56642908a6b2f90
                                                                • Instruction ID: a9e68ab2b12e17ae16f3f6d0a0ea7eea8a26f05c835edb8546f20125b23269b3
                                                                • Opcode Fuzzy Hash: 5776663e4489aa5ac087f663c1a997a3c9318ec70fb50d0ef56642908a6b2f90
                                                                • Instruction Fuzzy Hash: 47F08270B14744BFDB119F779C6282BBBECE749B1179248B6F810E3691E67D48108928
                                                                APIs
                                                                • SHGetKnownFolderPath.SHELL32(0049AD40,00008000,00000000,?), ref: 0047CD1F
                                                                • CoTaskMemFree.OLE32(?,0047CD62), ref: 0047CD55
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FolderFreeKnownPathTask
                                                                • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                • API String ID: 969438705-544719455
                                                                • Opcode ID: 9e7160287d512f4d5a0f43fb802c4f91855d32992ec2e49df479a39f9ab0f4c4
                                                                • Instruction ID: 7f5f99bd267ec43f1d9e9eb65a142f78238518b51070f33a36bda7c886c43a5d
                                                                • Opcode Fuzzy Hash: 9e7160287d512f4d5a0f43fb802c4f91855d32992ec2e49df479a39f9ab0f4c4
                                                                • Instruction Fuzzy Hash: A8E06D31700600BEEB21DA619D92F697BA8EB48F04B61847AF504A2680D67CA900D61C
                                                                APIs
                                                                • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470341,?,00000000), ref: 00450982
                                                                • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470341,?,00000000), ref: 0045098A
                                                                  • Part of subcall function 00450728: GetLastError.KERNEL32(00450544,004507EA,?,00000000,?,00498504,00000001,00000000,00000002,00000000,00498665,?,?,00000005,00000000,00498699), ref: 0045072B
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$FilePointer
                                                                • String ID:
                                                                • API String ID: 1156039329-0
                                                                • Opcode ID: 100ca62c34f2286d257a35485dd07fe068b79b72f0d05f198151f02be955c629
                                                                • Instruction ID: 93da46c6f1b31e6960e6eabd2e871c03f6a9f1a2e882d04747869ab33c8136e3
                                                                • Opcode Fuzzy Hash: 100ca62c34f2286d257a35485dd07fe068b79b72f0d05f198151f02be955c629
                                                                • Instruction Fuzzy Hash: 22E012B9305201ABF740EA7599C1F2F23DCDB48355F00986AB944CA18BD674DC054B66
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocLock
                                                                • String ID:
                                                                • API String ID: 15508794-0
                                                                • Opcode ID: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                                                • Instruction ID: 56019af84ea84d57b40f02c4528a45173e4f1cdf38a2be340d0d32551c2e1a06
                                                                • Opcode Fuzzy Hash: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                                                • Instruction Fuzzy Hash: 699002C4C01A00A4DC0072B20C0BD3F101CD8C072C3D1486F7044B6483887C88000979
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree
                                                                • String ID:
                                                                • API String ID: 2087232378-0
                                                                • Opcode ID: 7d9236a51a6e62d759a8b4f250f4c89c76a4556442c2f53cae6702f33709ebd9
                                                                • Instruction ID: 72296c24d993e0564b30de85c6f195fe79285825457dd4606d191d555c4bfbf2
                                                                • Opcode Fuzzy Hash: 7d9236a51a6e62d759a8b4f250f4c89c76a4556442c2f53cae6702f33709ebd9
                                                                • Instruction Fuzzy Hash: D1F08272B0063067EB605A6A4C81B6359849BC5794F254076FD09FF3E9D6B58C0142A9
                                                                APIs
                                                                • GetSystemDefaultLCID.KERNEL32(00000000,00408722), ref: 0040860B
                                                                  • Part of subcall function 00406DFC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E19
                                                                  • Part of subcall function 00408578: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DefaultInfoLoadLocaleStringSystem
                                                                • String ID:
                                                                • API String ID: 1658689577-0
                                                                • Opcode ID: 5823267eaa6e0e7ee692efbee1c67039304ac956db3a02cff78b9572607a147c
                                                                • Instruction ID: 87d691d9fb5281b9ea88bf14f35752b700db14023ee960ec0a49684e6ef053d8
                                                                • Opcode Fuzzy Hash: 5823267eaa6e0e7ee692efbee1c67039304ac956db3a02cff78b9572607a147c
                                                                • Instruction Fuzzy Hash: AF316135E00109ABCB00DF55C8C19EEB779FF84314F51857BE815BB296EB38AE018B98
                                                                APIs
                                                                • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: InfoScroll
                                                                • String ID:
                                                                • API String ID: 629608716-0
                                                                • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                • Instruction ID: de9d69d4b93587d9dbc4e1ffcd6d3196287cd482c57983938f35f532835c4bfd
                                                                • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                • Instruction Fuzzy Hash: 59213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                APIs
                                                                  • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                  • Part of subcall function 0041EEB4: EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C5AE,?,00000000,?,?,0046C7C0,?,00000000,0046C834), ref: 0046C592
                                                                  • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                  • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                                • String ID:
                                                                • API String ID: 3319771486-0
                                                                • Opcode ID: cb068eb5dc710ff6006224cfa849e4d5ce5cc64b4f431f923f3b0af9e5388d0c
                                                                • Instruction ID: d90c9d50ec1a4df7de9101e34a36142223e0e09c2726da2ffd76a0a6e3d4faee
                                                                • Opcode Fuzzy Hash: cb068eb5dc710ff6006224cfa849e4d5ce5cc64b4f431f923f3b0af9e5388d0c
                                                                • Instruction Fuzzy Hash: 3CF0B471608300BFE7059B62EC56B257BA8D708714F91047BF40586290E5BD6844C55E
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                • Instruction ID: 093968fef036cde5cefa550fbb81a5587008482849b5a1bc4febea26ac521eef
                                                                • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                • Instruction Fuzzy Hash: 2AF09030105109DFAF0CCF58D0669AF77A5EB48314B20807FEA0B877A0C634AE80D759
                                                                APIs
                                                                • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 5ff731208ea2669c00132db587fc5b09c37a3f2098bcfa82a293bed1c7b74572
                                                                • Instruction ID: bf23e32d75ed6c1bba1609a99bdb6fc4fe5539f7daeb337dc53a21feff163cdc
                                                                • Opcode Fuzzy Hash: 5ff731208ea2669c00132db587fc5b09c37a3f2098bcfa82a293bed1c7b74572
                                                                • Instruction Fuzzy Hash: 22F019B2200510AFDB84CEDCD8C0F9373ECEB0C250B0481A6BA08CB21AD220EC108BB0
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450878
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: c47705c650c03eeb3fa213ca8ef127fbab7ce4e86e84a6a981bf3da871867329
                                                                • Instruction ID: ad17be180c76723165afa97522f1f8cb50e5cc3c1ac5aed9be9dbb48c14aba74
                                                                • Opcode Fuzzy Hash: c47705c650c03eeb3fa213ca8ef127fbab7ce4e86e84a6a981bf3da871867329
                                                                • Instruction Fuzzy Hash: D9E0EDB53441583ED6809AAC6C42F9677DC971A724F018433B998D7241D4619D258BE9
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A99,00000000,00452ABA,?,00000000), ref: 0042CD07
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 9c61d9913643e7fc8a87719d436576f713db19c75eb1cc22161a8dfdf450bb3f
                                                                • Instruction ID: e42bb19430493de12fff977eb98fa38a093f16e856f4d8eabd15c7f5a46843e5
                                                                • Opcode Fuzzy Hash: 9c61d9913643e7fc8a87719d436576f713db19c75eb1cc22161a8dfdf450bb3f
                                                                • Instruction Fuzzy Hash: 7DE06571314308BBD701EB62EC92A5EBAECD749714B914476B400D7592D5B86E008468
                                                                APIs
                                                                • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FormatMessage
                                                                • String ID:
                                                                • API String ID: 1306739567-0
                                                                • Opcode ID: 7e342571288affc5bafe57b4e7aa38107ccfa77ae99db5e17a7a6f0d9f50f535
                                                                • Instruction ID: 7522df6bb5b7b377145cdc83deeae8a000ac75e555bea28060da8a54cd92ba64
                                                                • Opcode Fuzzy Hash: 7e342571288affc5bafe57b4e7aa38107ccfa77ae99db5e17a7a6f0d9f50f535
                                                                • Instruction Fuzzy Hash: F6E0D86178432126F23524166C43B7B110E43C0704FD440267A809F3D2D6EE9946425E
                                                                APIs
                                                                • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AFAB
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ExtentPointText
                                                                • String ID:
                                                                • API String ID: 566491939-0
                                                                • Opcode ID: 659619b104fd3feb772cd8971a1adc9358da70abd3c785c83c8eafe460c49850
                                                                • Instruction ID: cc428d1e896f501deb349ed904fe83369ead32346870d879665800f49654eebb
                                                                • Opcode Fuzzy Hash: 659619b104fd3feb772cd8971a1adc9358da70abd3c785c83c8eafe460c49850
                                                                • Instruction Fuzzy Hash: 8EE026F13092002B9200E67E1CC1C9BA7DC8A0822A300823AF808E73C2D62CCD1A03AE
                                                                APIs
                                                                • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406321
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                • Instruction ID: 1e3b386673cc32b76f3712ab4659b14af7d7742474b1f2ca80afcc4f691b27f6
                                                                • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                • Instruction Fuzzy Hash: 26E002B221430DBFDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972528675AC608B71
                                                                APIs
                                                                • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: 04d8f955b4ea1680ce84362706bb61212f931f51abc1de06f6e1381d22c6f23e
                                                                • Instruction ID: a58665afa9aaed36f31adbd0eb633891456326e8230674c5ed5073cd96bdc880
                                                                • Opcode Fuzzy Hash: 04d8f955b4ea1680ce84362706bb61212f931f51abc1de06f6e1381d22c6f23e
                                                                • Instruction Fuzzy Hash: DDE07EB6600119AF9B40DE8CDC81EEB37ADAB5D350F454016FA08EB200C2B8EC519BA4
                                                                APIs
                                                                • FindClose.KERNEL32(00000000,000000FF,00470B64,00000000,0047197A,?,00000000,004719C5,?,00000000,00471AFE,?,00000000,?,00000000), ref: 00454C82
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseFind
                                                                • String ID:
                                                                • API String ID: 1863332320-0
                                                                • Opcode ID: 7eca246021524149fec22f5b43aaa658f949ce3293e179ae35ef6e6ce88d0451
                                                                • Instruction ID: ed6c632c5edb2c773ab29dc4195d65b8984e4b681e68d3fe1efecde2d4089f6a
                                                                • Opcode Fuzzy Hash: 7eca246021524149fec22f5b43aaa658f949ce3293e179ae35ef6e6ce88d0451
                                                                • Instruction Fuzzy Hash: 3AE09B705056004BCB15DF3A858131A76D15FC5324F05C96AAC5CCF3D7D63C84554717
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(004960BE,?,004960E0,?,?,00000000,004960BE,?,?), ref: 004146AB
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                APIs
                                                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F34
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 3762a51e43609c3b4bae8470f6c1dc5ae0f0561e9ae868b0f3c10d30521955a8
                                                                • Instruction ID: f35b24215c0fdc632c147a12649f74ed31c2b31f11cb39250bbd2ff5eed7ffe6
                                                                • Opcode Fuzzy Hash: 3762a51e43609c3b4bae8470f6c1dc5ae0f0561e9ae868b0f3c10d30521955a8
                                                                • Instruction Fuzzy Hash: 5CD012723081506AD220A65A6C44EAB6ADCCBC5770F11063AB558D2181D6209C018675
                                                                APIs
                                                                  • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                • ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                  • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: InfoParametersSystem$ShowWindow
                                                                • String ID:
                                                                • API String ID: 3202724764-0
                                                                • Opcode ID: 8bec8c91e4db80f916d04adf4cce8d640474384e6a809fab131d495f4cf7285d
                                                                • Instruction ID: 62f98a927e5d18dfd067733e82cc858d6425e225367395d1bb64f11078388387
                                                                • Opcode Fuzzy Hash: 8bec8c91e4db80f916d04adf4cce8d640474384e6a809fab131d495f4cf7285d
                                                                • Instruction Fuzzy Hash: 03D05E123831B03146307BB728059CB86AC8DD66AB389047BB5409B303E91D8A0A51AC
                                                                APIs
                                                                • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: TextWindow
                                                                • String ID:
                                                                • API String ID: 530164218-0
                                                                • Opcode ID: 7b629e4230a16754486ed56ae920d883ae8ae6fbac6fb4db25cd6a5c7ea909d6
                                                                • Instruction ID: 45ecccad5147b2ee88577654b541c8e67cd655c44182ff5547076257999a9e8e
                                                                • Opcode Fuzzy Hash: 7b629e4230a16754486ed56ae920d883ae8ae6fbac6fb4db25cd6a5c7ea909d6
                                                                • Instruction Fuzzy Hash: 82D05BE270116017CB01BAED54C4AC657CC5B4925A71540B7F904EF257C678CD448398
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004678D0,00000000,00000000,00000000,0000000C,00000000), ref: 00466C00
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000000,00000000,0045163F,00000000), ref: 0042CD3F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: bfa7c436ea4076489e3194c110aeffa5b63c2464b47e17bafb8d8bd18f179746
                                                                • Instruction ID: fe1bff9429d4e90dee18816d853216f65d631ba0a2a06ffe7669bbedc21dff1a
                                                                • Opcode Fuzzy Hash: bfa7c436ea4076489e3194c110aeffa5b63c2464b47e17bafb8d8bd18f179746
                                                                • Instruction Fuzzy Hash: 6FC08CE0322210169E20A6BD6CC951F06CC895837A3A40A77B03CEA2E2D23DD8162028
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6E4,0040CC90,?,00000000,?), ref: 00406EED
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 5ea83bba119d08381cf5149d3e870d091e521e5b09d6abf0e71c1523e48d3119
                                                                • Instruction ID: a78e408fffc15bc8d0ee8a54c686fbaa4e2694f5c3f88f37cecd524e454749ad
                                                                • Opcode Fuzzy Hash: 5ea83bba119d08381cf5149d3e870d091e521e5b09d6abf0e71c1523e48d3119
                                                                • Instruction Fuzzy Hash: ADC048B13C130032F93025A61C87F1604889714B1AE60943AB740BE1C2D8E9A818016C
                                                                APIs
                                                                • SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                  • Part of subcall function 00450728: GetLastError.KERNEL32(00450544,004507EA,?,00000000,?,00498504,00000001,00000000,00000002,00000000,00498665,?,?,00000005,00000000,00498699), ref: 0045072B
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 734332943-0
                                                                • Opcode ID: ab92c804e13779e6a8a378971558b34dc584b681704b9a97c4630cfb3c940cd1
                                                                • Instruction ID: 0486764e065467a501855473afd0cd0cb10eaee8d6f94b4102cded937092f4df
                                                                • Opcode Fuzzy Hash: ab92c804e13779e6a8a378971558b34dc584b681704b9a97c4630cfb3c940cd1
                                                                • Instruction Fuzzy Hash: 0DC04CA9301201879F40A6AE85C190663DC9E1C3597504566B904CF20BD769DC044A14
                                                                APIs
                                                                • SetCurrentDirectoryA.KERNEL32(00000000,?,00498492,00000000,00498665,?,?,00000005,00000000,00498699,?,?,00000000), ref: 004072C3
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CurrentDirectory
                                                                • String ID:
                                                                • API String ID: 1611563598-0
                                                                • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                APIs
                                                                • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode
                                                                • String ID:
                                                                • API String ID: 2340568224-0
                                                                • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                                • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DestroyWindow
                                                                • String ID:
                                                                • API String ID: 3375834691-0
                                                                • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                • Instruction ID: 951f12253bcdbe2be33f1d7372765b1b3ebb510443260a24e1bbd496af9ec3c9
                                                                • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                • Instruction Fuzzy Hash: AFA002755015409ADB10E7A5C84DF7A2298BF44204FD905FA714CA7052C53CD9008A55
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 54e6278b00533fbd37ee9a008ccbf002b6a3644c608c9d01cb394214cb5b0466
                                                                • Instruction ID: 339ef80cccba5c7eac5873b70fc8c7721134c1cb18e48c6be9d277410f7c1673
                                                                • Opcode Fuzzy Hash: 54e6278b00533fbd37ee9a008ccbf002b6a3644c608c9d01cb394214cb5b0466
                                                                • Instruction Fuzzy Hash: 91518474E042499FEB01EFA9C882AAEBBF5EB49304F50407AE500A7351DB389D41CB99
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047E407,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047E3C1
                                                                  • Part of subcall function 0042CA10: GetSystemMetrics.USER32(0000002A), ref: 0042CA22
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMetricsMultiSystemWide
                                                                • String ID:
                                                                • API String ID: 224039744-0
                                                                • Opcode ID: 5d71ed7f78605e465d4fedccc20939528007dd55206323f19120b13c5f88598b
                                                                • Instruction ID: f91779ff8fcf2a57f01fce6343996b16dddddfd0a70f262f58e8d3032392e39f
                                                                • Opcode Fuzzy Hash: 5d71ed7f78605e465d4fedccc20939528007dd55206323f19120b13c5f88598b
                                                                • Instruction Fuzzy Hash: BC518870A00205AFD720DF9AD885B9A7BB8EB1C309F1181B7E804E73A1D7789D45CB59
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 2501c7b5f1b7e2a32cc088a261609a538437b101066d50b70fa7879060b37a7f
                                                                • Instruction ID: df12e3cc7205ed3866b0622d7fc8c89f1b444ce5416b62958542d3ca819b8d78
                                                                • Opcode Fuzzy Hash: 2501c7b5f1b7e2a32cc088a261609a538437b101066d50b70fa7879060b37a7f
                                                                • Instruction Fuzzy Hash: 5A1148742007069BCB10DF19C880B82FBE4EB98390B10D53BE9588B385D378E8558BA9
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,004530A1), ref: 00453083
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID:
                                                                • API String ID: 1452528299-0
                                                                • Opcode ID: 3dbc9b6b19259a40e1a8eccd310b33d8d478e911805451e546832dad24d45a24
                                                                • Instruction ID: 94e22d98a6c00f19aef873439ff0cfb4dcf68a684d4d060e49f788bb75b395da
                                                                • Opcode Fuzzy Hash: 3dbc9b6b19259a40e1a8eccd310b33d8d478e911805451e546832dad24d45a24
                                                                • Instruction Fuzzy Hash: 0701FC35604304AF8711DF69AC118EEBBE8DB8A76175042B7FC64D3382D6744E059764
                                                                APIs
                                                                • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00000000,00004003,00401973), ref: 00401766
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FreeVirtual
                                                                • String ID:
                                                                • API String ID: 1263568516-0
                                                                • Opcode ID: c2ec33a786a38e7bd0169ef8bddb7cde116ed653613200da8896670bb901eae8
                                                                • Instruction ID: be7f0be69d4b25e877c81db3c68dd302dbc4ff1700a0c49f545652be0e594e9c
                                                                • Opcode Fuzzy Hash: c2ec33a786a38e7bd0169ef8bddb7cde116ed653613200da8896670bb901eae8
                                                                • Instruction Fuzzy Hash: 1401FC766442148FC3109F29DCC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: 6d5f4615d296fbbc3d990cf813c80aa0ea5a8011e2983691863e8f068271b578
                                                                • Instruction ID: 6160d783662a008e1f799edb03f3d460fe671c60c73369e1be62f9e55b6485aa
                                                                • Opcode Fuzzy Hash: 6d5f4615d296fbbc3d990cf813c80aa0ea5a8011e2983691863e8f068271b578
                                                                • Instruction Fuzzy Hash:
                                                                APIs
                                                                • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                • API String ID: 2323315520-3614243559
                                                                • Opcode ID: 8697dd9d154f8e50884d4e158cb0ab166183fda0357b492364bfbc044a4492e6
                                                                • Instruction ID: cc035a32af1c864732f55fa5d96a8ee37849f8948b3bb020ccbabec4f333c5ef
                                                                • Opcode Fuzzy Hash: 8697dd9d154f8e50884d4e158cb0ab166183fda0357b492364bfbc044a4492e6
                                                                • Instruction Fuzzy Hash: 953142B1740600BBD701EBB5EC86A7A3394F768724B45093BB444EB192D77C4CA98F5D
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004586D7
                                                                • QueryPerformanceCounter.KERNEL32(02293858,00000000,0045896A,?,?,02293858,00000000,?,00459066,?,02293858,00000000), ref: 004586E0
                                                                • GetSystemTimeAsFileTime.KERNEL32(02293858,02293858), ref: 004586EA
                                                                • GetCurrentProcessId.KERNEL32(?,02293858,00000000,0045896A,?,?,02293858,00000000,?,00459066,?,02293858,00000000), ref: 004586F3
                                                                • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458769
                                                                • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02293858,02293858), ref: 00458777
                                                                • CreateFileA.KERNEL32(00000000,C0000000,00000000,0049AB24,00000003,00000000,00000000,00000000,00458926), ref: 004587BF
                                                                • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458915,?,00000000,C0000000,00000000,0049AB24,00000003,00000000,00000000,00000000,00458926), ref: 004587F8
                                                                  • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004588A1
                                                                • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 004588D7
                                                                • CloseHandle.KERNEL32(000000FF,0045891C,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 0045890F
                                                                  • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                • API String ID: 770386003-3271284199
                                                                • Opcode ID: cae4615f4f3b0edee685ea835cc75ed235771dfd5f29473c0633b013cfbf874c
                                                                • Instruction ID: dce1d9d3a47b8e631bda5ef5291cfb12a825263051becb9b2fd33ba3793b7428
                                                                • Opcode Fuzzy Hash: cae4615f4f3b0edee685ea835cc75ed235771dfd5f29473c0633b013cfbf874c
                                                                • Instruction Fuzzy Hash: 2F710470A00248AEDB10DF65CC45B9E77F4EB05709F1044AAF944FB282DB785944CF6A
                                                                APIs
                                                                  • Part of subcall function 004787AC: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02292BD4,?,?,?,02292BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787C5
                                                                  • Part of subcall function 004787AC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004787CB
                                                                  • Part of subcall function 004787AC: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292BD4,?,?,?,02292BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787DE
                                                                  • Part of subcall function 004787AC: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292BD4,?,?,?,02292BD4), ref: 00478808
                                                                  • Part of subcall function 004787AC: CloseHandle.KERNEL32(00000000,?,?,?,02292BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 00478826
                                                                  • Part of subcall function 00478884: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,00478916,?,?,?,02292BD4,?,00478978,00000000,00478A8E,?,?,?,?), ref: 004788B4
                                                                • ShellExecuteEx.SHELL32(0000003C), ref: 004789C8
                                                                • GetLastError.KERNEL32(00000000,00478A8E,?,?,?,?), ref: 004789D1
                                                                • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00478A1E
                                                                • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478A42
                                                                • CloseHandle.KERNEL32(00000000,00478A73,00000000,00000000,000000FF,000000FF,00000000,00478A6C,?,00000000,00478A8E,?,?,?,?), ref: 00478A66
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                • API String ID: 883996979-221126205
                                                                • Opcode ID: 6e26baf92a92589b83167ef0168938d7a18d2f522af1da6acb942a7511bfa2aa
                                                                • Instruction ID: 790ad9f0fbfe83bf1512199edb7142052ce1d465f1a82f053b14324264bcdb90
                                                                • Opcode Fuzzy Hash: 6e26baf92a92589b83167ef0168938d7a18d2f522af1da6acb942a7511bfa2aa
                                                                • Instruction Fuzzy Hash: 0C3124B0A40209AEDB10EFA6C845ADEB7A8EB04318F50853FF518E7282DF7C59458B1D
                                                                APIs
                                                                • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: MessageSendShowWindow
                                                                • String ID:
                                                                • API String ID: 1631623395-0
                                                                • Opcode ID: ad20764d00b4e1bce030a3e3c27d486f6ceec107be95deacbd1ab04939794df1
                                                                • Instruction ID: 28b3b238c6a175230bfdc04dc608b83412cf05ad4dc18caa3e002023b447773b
                                                                • Opcode Fuzzy Hash: ad20764d00b4e1bce030a3e3c27d486f6ceec107be95deacbd1ab04939794df1
                                                                • Instruction Fuzzy Hash: 5D915171B04214BFDB11EFA9DA86F9D77F4AB04314F5500B6F504AB3A2CB78AE409B58
                                                                APIs
                                                                • IsIconic.USER32(?), ref: 004183A3
                                                                • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                • GetWindowRect.USER32(?), ref: 004183DC
                                                                • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                • ScreenToClient.USER32(00000000), ref: 00418408
                                                                • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                • String ID: ,
                                                                • API String ID: 2266315723-3772416878
                                                                • Opcode ID: e1e10888711d407f8fe90eb8876dbc7d811cb5afcf9edaa6a068330facd90bcc
                                                                • Instruction ID: 83451382f6561a1cdaf4068601f89ac1c3a417dc2c2f98083d52f4ec56b04d21
                                                                • Opcode Fuzzy Hash: e1e10888711d407f8fe90eb8876dbc7d811cb5afcf9edaa6a068330facd90bcc
                                                                • Instruction Fuzzy Hash: 10112871505201ABDB00EF69C885F9B77E8AF48314F180A7EBD58DB286D738D900CB6A
                                                                APIs
                                                                • IsIconic.USER32(?), ref: 0042F318
                                                                • GetWindowLongA.USER32(?,000000F0), ref: 0042F32C
                                                                • GetWindowLongA.USER32(?,000000EC), ref: 0042F343
                                                                • GetActiveWindow.USER32 ref: 0042F34C
                                                                • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F379
                                                                • SetActiveWindow.USER32(?,0042F4A9,00000000,?), ref: 0042F39A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$ActiveLong$IconicMessage
                                                                • String ID:
                                                                • API String ID: 1633107849-0
                                                                • Opcode ID: e8f6b6a421ea1d3179e4c98d77dd5a9a956952bb32a08c7b31a1e4991f2154d2
                                                                • Instruction ID: 64d3bd35cbe97a20ddf06b1c5bb431ac215ab6611dc304e3324dca4d9728f060
                                                                • Opcode Fuzzy Hash: e8f6b6a421ea1d3179e4c98d77dd5a9a956952bb32a08c7b31a1e4991f2154d2
                                                                • Instruction Fuzzy Hash: 0E319C71A00254AFDB01EFB6DC52D6FBBB8EB0D714B9144BAB800E7291D6389D10CB68
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000028), ref: 0045569B
                                                                • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004556A1
                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004556BA
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004556E1
                                                                • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004556E6
                                                                • ExitWindowsEx.USER32(00000002,00000000), ref: 004556F7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                • String ID: SeShutdownPrivilege
                                                                • API String ID: 107509674-3733053543
                                                                • Opcode ID: 6f0918c0c13bc2f4d4c54a185237749107d323edec97579a5aa57cfa3c3a92f6
                                                                • Instruction ID: c3cc1ea1cd3915d7a33d422d8d95032da4a52c1e989dd5dcf2427ab637b102ec
                                                                • Opcode Fuzzy Hash: 6f0918c0c13bc2f4d4c54a185237749107d323edec97579a5aa57cfa3c3a92f6
                                                                • Instruction Fuzzy Hash: F8F06870694B42B9E610A6B1CC17F3B21C89B44749F50482AFD05EA1D3D7FCD9084A7E
                                                                APIs
                                                                • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D239
                                                                • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D249
                                                                • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D259
                                                                • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047FDF3,00000000,0047FE1C), ref: 0045D27E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$CryptVersion
                                                                • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                • API String ID: 1951258720-508647305
                                                                • Opcode ID: e7d405a4ff4eebbc0640f86d2c220ba04bd3b21cd5ce18d39a7322497cc2147d
                                                                • Instruction ID: 61c9e43cd1f728e0e46d113f0b501511b53ff9056e95746757012e10b94b60ba
                                                                • Opcode Fuzzy Hash: e7d405a4ff4eebbc0640f86d2c220ba04bd3b21cd5ce18d39a7322497cc2147d
                                                                • Instruction Fuzzy Hash: 9EF01DF1D01700DAD314DF76AD457263796EBA831AF08807BB800D61A2D779884ADE1C
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000,00498A98,?,?,00000000,0049C628), ref: 004987D3
                                                                • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00498856
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,00498892,?,00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000), ref: 0049886E
                                                                • FindClose.KERNEL32(000000FF,00498899,00498892,?,00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000,00498A98), ref: 0049888C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FileFind$AttributesCloseFirstNext
                                                                • String ID: isRS-$isRS-???.tmp
                                                                • API String ID: 134685335-3422211394
                                                                • Opcode ID: 2eac78899decf67a2599575f6ffc01aede9a3e72dfd4e437df88c1528b359898
                                                                • Instruction ID: 01fac1220d05b00ddf84770a6e44258796d533cd1c1ae58874983c532305936c
                                                                • Opcode Fuzzy Hash: 2eac78899decf67a2599575f6ffc01aede9a3e72dfd4e437df88c1528b359898
                                                                • Instruction Fuzzy Hash: 6631587190161C6FDF10EF66CC41ADEBBBCDB46314F5184FBA808A32A1DB389E458E64
                                                                APIs
                                                                • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004576B9
                                                                • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004576E0
                                                                • SetForegroundWindow.USER32(?), ref: 004576F1
                                                                • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,004579C9,?,00000000,00457A05), ref: 004579B4
                                                                Strings
                                                                • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00457834
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                • API String ID: 2236967946-3182603685
                                                                • Opcode ID: 5f05717b36533f19b93728f7138542ce4ebbc74c74f58911fe55bd7bdf78f3ab
                                                                • Instruction ID: bbeea18b3a5a77650d3de781f5d15eeacb1b42f9300217bc3a931905813ce4bc
                                                                • Opcode Fuzzy Hash: 5f05717b36533f19b93728f7138542ce4ebbc74c74f58911fe55bd7bdf78f3ab
                                                                • Instruction Fuzzy Hash: 64910174608204EFEB15CF65E951F5ABBF5FB4D304F2180BAE80497392C638AE05CB68
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455FF3), ref: 00455EE4
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455EEA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                • API String ID: 1646373207-3712701948
                                                                • Opcode ID: 6a98d8be3cefb5d1321440a09b2e8a7ab4abd71e514de144cb28141e7088ffe0
                                                                • Instruction ID: c7998eed729051dc06c2a4bfb378ba8793a5d3ea0401748e56fe411d955f0a7d
                                                                • Opcode Fuzzy Hash: 6a98d8be3cefb5d1321440a09b2e8a7ab4abd71e514de144cb28141e7088ffe0
                                                                • Instruction Fuzzy Hash: 6C417471A04659AFCF01EFA5C8929EEB7B8EF48305F504567F800F7292D67C5E098B68
                                                                APIs
                                                                • IsIconic.USER32(?), ref: 00417D1F
                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$Placement$Iconic
                                                                • String ID: ,
                                                                • API String ID: 568898626-3772416878
                                                                • Opcode ID: 3b7cc9104e2877f08458343a95692454dc034f6994d69eb5de7ebf140b23916c
                                                                • Instruction ID: 8a2405f126271a8a3f3b67151c5e9cb2aa668bd176c3c9f3f75a3d087e0924cd
                                                                • Opcode Fuzzy Hash: 3b7cc9104e2877f08458343a95692454dc034f6994d69eb5de7ebf140b23916c
                                                                • Instruction Fuzzy Hash: 90213171604208ABCF00EF69E8C0EEA77B8AF48314F05456AFD18DF346C678DD848B68
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001,00000000,004643E7), ref: 00464275
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 004642BB
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,00464394,?,00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 00464370
                                                                • FindClose.KERNEL32(000000FF,0046439B,00464394,?,00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 0046438E
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$File$CloseErrorFirstModeNext
                                                                • String ID:
                                                                • API String ID: 4011626565-0
                                                                • Opcode ID: c85d62c4d2865e72f60ec0e72557d0bba9d6604f62721e170af8c43ffd28a37e
                                                                • Instruction ID: c8116a204d28aaa02fd5c370c7a31de16c8845058ecf0009f09d6eac0a25a6e0
                                                                • Opcode Fuzzy Hash: c85d62c4d2865e72f60ec0e72557d0bba9d6604f62721e170af8c43ffd28a37e
                                                                • Instruction Fuzzy Hash: 9B415235B00A18DBCB10EF65DC95ADEB7B8EB88305F5045AAF804E7351E7389E848E59
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001,00000000,00463F41), ref: 00463DB5
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463E44
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,00463EF6,?,00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463ED6
                                                                • FindClose.KERNEL32(000000FF,00463EFD,00463EF6,?,00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463EF0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$File$CloseErrorFirstModeNext
                                                                • String ID:
                                                                • API String ID: 4011626565-0
                                                                • Opcode ID: ac233fd01a22e69a44b0fa54206e939fdb01f3aa8599e3e7019d64004dcc1237
                                                                • Instruction ID: 2cce399ef4bcfda7b326651f57ed136ac3b6341b478a121022c65868e2c33bfd
                                                                • Opcode Fuzzy Hash: ac233fd01a22e69a44b0fa54206e939fdb01f3aa8599e3e7019d64004dcc1237
                                                                • Instruction Fuzzy Hash: E341A730A006589FCB10EF65DC55ADEB7B8EB88305F4044BAF404A7381E77C9F448E59
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E966
                                                                • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                                • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E99E
                                                                • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E9A6
                                                                • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E9AC
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                • String ID:
                                                                • API String ID: 1177325624-0
                                                                • Opcode ID: 70fa8bed737ed64a54ebd93593d3916aa17312c499895c7e057b14e22e01e0f4
                                                                • Instruction ID: 200206f6ebf05c62f8aab9c26c76e03d6a480d3026058df5ea69506491fbc91e
                                                                • Opcode Fuzzy Hash: 70fa8bed737ed64a54ebd93593d3916aa17312c499895c7e057b14e22e01e0f4
                                                                • Instruction Fuzzy Hash: 34F06DB23916203AF620A17A6C86F6F018C8785B68F10423BBA14FF1D1D9A89D0655AD
                                                                APIs
                                                                • IsIconic.USER32(?), ref: 00483E5E
                                                                • GetWindowLongA.USER32(00000000,000000F0), ref: 00483E7C
                                                                • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049D0A8,0048333A,0048336E,00000000,0048338E,?,?,?,0049D0A8), ref: 00483E9E
                                                                • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049D0A8,0048333A,0048336E,00000000,0048338E,?,?,?,0049D0A8), ref: 00483EB2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$Show$IconicLong
                                                                • String ID:
                                                                • API String ID: 2754861897-0
                                                                • Opcode ID: c386378a0c7f85d1cef37335c2bccc2b04846c6b77b58c4a4d67865339b810c4
                                                                • Instruction ID: 4716aa9c85bcb67c2a447f96ffe7cd40772f798c99979f364c9f10fe2fefca1c
                                                                • Opcode Fuzzy Hash: c386378a0c7f85d1cef37335c2bccc2b04846c6b77b58c4a4d67865339b810c4
                                                                • Instruction Fuzzy Hash: 3C017C70A412416EE710BB29DC8AB6B23C45B14B09F48087BB8449B3A3DB3C9D8AC71C
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,004628CC), ref: 00462850
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,004628AC,?,00000000,?,00000000,004628CC), ref: 0046288C
                                                                • FindClose.KERNEL32(000000FF,004628B3,004628AC,?,00000000,?,00000000,004628CC), ref: 004628A6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$File$CloseFirstNext
                                                                • String ID:
                                                                • API String ID: 3541575487-0
                                                                • Opcode ID: 3afcb13648a0263cf6f8f6bfedae53c76c54b9f835f65621a9b8af134bb0e919
                                                                • Instruction ID: 841aaca985aa1eabcc65563c383ac57876b75d473b933154d1e9c72f52fa3cd7
                                                                • Opcode Fuzzy Hash: 3afcb13648a0263cf6f8f6bfedae53c76c54b9f835f65621a9b8af134bb0e919
                                                                • Instruction Fuzzy Hash: 3A210B31904A087FDB11FF65CD41ADEBBACDB49304F5045B7A808E32A1E67C8E44CE56
                                                                APIs
                                                                • IsIconic.USER32(?), ref: 004241F4
                                                                • SetActiveWindow.USER32(?,?,?,?,0046CE53), ref: 00424201
                                                                  • Part of subcall function 0042365C: ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                  • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022925AC,0042421A,?,?,?,?,0046CE53), ref: 00423B5F
                                                                • SetFocus.USER32(00000000,?,?,?,?,0046CE53), ref: 0042422E
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$ActiveFocusIconicShow
                                                                • String ID:
                                                                • API String ID: 649377781-0
                                                                • Opcode ID: 2caf509772b4e47572ac949d7f8b8f9ae0a5a4117a3619920a2f1982222ed166
                                                                • Instruction ID: c379361f86f494b348edbf52cdf1d5c809bfbf5168ad2d96a2c3ff14c6914fef
                                                                • Opcode Fuzzy Hash: 2caf509772b4e47572ac949d7f8b8f9ae0a5a4117a3619920a2f1982222ed166
                                                                • Instruction Fuzzy Hash: B3F0DA717002209BDB10AFAAD8C5B9676A8EF48344B5541BBBD09DF35BCA7CDC018768
                                                                APIs
                                                                • InitializeSecurityDescriptor.ADVAPI32(00000001,00000001), ref: 0042EE35
                                                                • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000,00000001,00000001), ref: 0042EE45
                                                                • CreateMutexA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0042EE6D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DescriptorSecurity$CreateDaclInitializeMutex
                                                                • String ID:
                                                                • API String ID: 3525989157-0
                                                                • Opcode ID: e535240892797685b4ab9d9c929302bfb3a48c93a5258e40853e85be58f26cad
                                                                • Instruction ID: b330794617a7040f76ad0da05c7b1ee5a1856395dd3e8d048ce20caf316d4231
                                                                • Opcode Fuzzy Hash: e535240892797685b4ab9d9c929302bfb3a48c93a5258e40853e85be58f26cad
                                                                • Instruction Fuzzy Hash: 18E0C0B16443007EE200EE758C82F5F76DCDB48714F00483AB654DB1C1E679D9489B96
                                                                APIs
                                                                • IsIconic.USER32(?), ref: 00417D1F
                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$Placement$Iconic
                                                                • String ID:
                                                                • API String ID: 568898626-0
                                                                • Opcode ID: 1c91201d2ff36bc72c7178dd8424e8fae2c9e4961405fe597c6cb80dc68efef3
                                                                • Instruction ID: ae07cbcaee7307856f0de191e02e21b90635fd34b211f34cef32728ab7ec892e
                                                                • Opcode Fuzzy Hash: 1c91201d2ff36bc72c7178dd8424e8fae2c9e4961405fe597c6cb80dc68efef3
                                                                • Instruction Fuzzy Hash: 2A017C31204108ABCB10EE59E8C1EEA73A8AF44324F054567FD08CF242D638ECC087A8
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CaptureIconic
                                                                • String ID:
                                                                • API String ID: 2277910766-0
                                                                • Opcode ID: a20d27f3b2ac0a1b3fa2ab67efc932bc7606427269a1e4b5a38f9b3ed8bb9e72
                                                                • Instruction ID: 8b244cfd74e2e9025fb133a269c9ff628bd031c9e89e3e616ef14db29f4eec50
                                                                • Opcode Fuzzy Hash: a20d27f3b2ac0a1b3fa2ab67efc932bc7606427269a1e4b5a38f9b3ed8bb9e72
                                                                • Instruction Fuzzy Hash: CBF06232304A024BDB31A72EC885AEB62F59F88368B24443FE419C7765EB7CDCD58758
                                                                APIs
                                                                • IsIconic.USER32(?), ref: 004241AB
                                                                  • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                  • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                  • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                  • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                  • Part of subcall function 0042365C: ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                • String ID:
                                                                • API String ID: 2671590913-0
                                                                • Opcode ID: 6a9b997a6a6cf91003675646eaf443a00e7e2891d5b78c90ff096ed1e4918312
                                                                • Instruction ID: b7d9458b5e0a659a50abb462337f5bae1697c0dc3d856a04b5cc34dfb433b66f
                                                                • Opcode Fuzzy Hash: 6a9b997a6a6cf91003675646eaf443a00e7e2891d5b78c90ff096ed1e4918312
                                                                • Instruction Fuzzy Hash: 6CE01AA470010187DF00EFAADCC9B9632A8BF48304F55057ABC08CF24BDA3CC950C728
                                                                APIs
                                                                • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: NtdllProc_Window
                                                                • String ID:
                                                                • API String ID: 4255912815-0
                                                                • Opcode ID: 8e873b8b5c82bc258c14262f025a038593852d0d4569c028c12fccb2f86baf91
                                                                • Instruction ID: e2daaee124a258af88011e7d59d1a34290a71591709d5bbd6185ea02eebcb9ba
                                                                • Opcode Fuzzy Hash: 8e873b8b5c82bc258c14262f025a038593852d0d4569c028c12fccb2f86baf91
                                                                • Instruction Fuzzy Hash: D851F6356082058FC710DB6AD681A9BF3E5FF98314B2482BBD824C7391D7B8EDA1C759
                                                                APIs
                                                                • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0047904A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: NtdllProc_Window
                                                                • String ID:
                                                                • API String ID: 4255912815-0
                                                                • Opcode ID: 2acbb7ee23148c44530fb96b869e7794becc65d69925435b63a344be70e19465
                                                                • Instruction ID: a31957f8146ee59bbe5f7cc321da5d64c206ff61d5be307610cda5dda3fb314a
                                                                • Opcode Fuzzy Hash: 2acbb7ee23148c44530fb96b869e7794becc65d69925435b63a344be70e19465
                                                                • Instruction Fuzzy Hash: 7C413575614144EFDB10CF9DC6858AAB7F6FB48310B24C996E84CDB301D739EE419B54
                                                                APIs
                                                                • ArcFourCrypt._ISCRYPT(?,?,?,0046DFA4,?,?,0046DFA4,00000000), ref: 0045D2EF
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CryptFour
                                                                • String ID:
                                                                • API String ID: 2153018856-0
                                                                • Opcode ID: f72980deaa919cf0bcca330c95d094571c0b9ac3099722338076af053f3dc2d8
                                                                • Instruction ID: b6c4cc1f99ef2e52d606a12bd82df8b216d3beaef2de20ba66a0ab70ac2c171e
                                                                • Opcode Fuzzy Hash: f72980deaa919cf0bcca330c95d094571c0b9ac3099722338076af053f3dc2d8
                                                                • Instruction Fuzzy Hash: 81C09BF240420C7F65005795ECC9C77B75CE6586547404136F704831019572AC104574
                                                                APIs
                                                                • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DC14,?,0046DDF5), ref: 0045D302
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CryptFour
                                                                • String ID:
                                                                • API String ID: 2153018856-0
                                                                • Opcode ID: f277e602d1aa1d933ca60749d28492a83cf7560ca7b8b7592fc74e5de38efb5e
                                                                • Instruction ID: 163ad57823698c1276c601513e35adbc52e9ec482f3283ddef75a5d9e9809592
                                                                • Opcode Fuzzy Hash: f277e602d1aa1d933ca60749d28492a83cf7560ca7b8b7592fc74e5de38efb5e
                                                                • Instruction Fuzzy Hash: 86A002F0F803007AFD2057615E0EF26252D97D0F05F2044757306EA0D085A5A401852C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3373507150.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 00000001.00000002.3373467782.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000001.00000002.3373592489.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_10000000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3373507150.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 00000001.00000002.3373467782.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 00000001.00000002.3373592489.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_10000000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                • Instruction Fuzzy Hash:
                                                                APIs
                                                                  • Part of subcall function 0044B678: GetVersionExA.KERNEL32(00000094), ref: 0044B695
                                                                • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F7E9,004992CA), ref: 0044B6F3
                                                                • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B70B
                                                                • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B71D
                                                                • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B72F
                                                                • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B741
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B753
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B765
                                                                • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B777
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B789
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B79B
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B7AD
                                                                • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B7BF
                                                                • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B7D1
                                                                • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B7E3
                                                                • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B7F5
                                                                • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B807
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B819
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B82B
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B83D
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B84F
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B861
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B873
                                                                • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B885
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B897
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B8A9
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B8BB
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B8CD
                                                                • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B8DF
                                                                • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B8F1
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B903
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B915
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B927
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B939
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B94B
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B95D
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B96F
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B981
                                                                • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B993
                                                                • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B9A5
                                                                • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B9B7
                                                                • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B9C9
                                                                • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B9DB
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B9ED
                                                                • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B9FF
                                                                • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044BA11
                                                                • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044BA23
                                                                • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044BA35
                                                                • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044BA47
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$LibraryLoadVersion
                                                                • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                • API String ID: 1968650500-2910565190
                                                                • Opcode ID: a839ccb9c9a861a6ca06feeaf4f5b9cf9d009b24b8deb6d9a0dd113e88dab802
                                                                • Instruction ID: 8a2f9fdf968ae37fa3cb46079294691732ee00746fcb1dbbaee87679a149b2ae
                                                                • Opcode Fuzzy Hash: a839ccb9c9a861a6ca06feeaf4f5b9cf9d009b24b8deb6d9a0dd113e88dab802
                                                                • Instruction Fuzzy Hash: D59153F0A40B51EBEB00EBB59CC6A2A37A8EB15B1471415BBB480EF295D778DC048F5D
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 0041CA50
                                                                • CreateCompatibleDC.GDI32(?), ref: 0041CA5C
                                                                • CreateBitmap.GDI32(0041A954,?,00000001,00000001,00000000), ref: 0041CA80
                                                                • CreateCompatibleBitmap.GDI32(?,0041A954,?), ref: 0041CA90
                                                                • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                • CreateCompatibleDC.GDI32(?), ref: 0041CB3B
                                                                • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB84
                                                                • RealizePalette.GDI32(00000000), ref: 0041CB8D
                                                                • SelectPalette.GDI32(0041CE4C,00000000,00000001), ref: 0041CB9C
                                                                • RealizePalette.GDI32(0041CE4C), ref: 0041CBA5
                                                                • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                • BitBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020), ref: 0041CBF1
                                                                • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                  • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                                • String ID:
                                                                • API String ID: 269503290-0
                                                                • Opcode ID: cce4914916f1a7239ac88c37909b2d3847b69fcced41e26916e06273e7ac86df
                                                                • Instruction ID: 4a976381369a00188f54b32674623e6c4b83415f3a667354aa154cca89d68730
                                                                • Opcode Fuzzy Hash: cce4914916f1a7239ac88c37909b2d3847b69fcced41e26916e06273e7ac86df
                                                                • Instruction Fuzzy Hash: 2C61EE71A44608AFDB10EBE9DC86FDFB7B8EF49704F14446AB504E7281D67CA940CB68
                                                                APIs
                                                                • CoCreateInstance.OLE32(0049AA74,00000000,00000001,0049A774,?,00000000,00456A8B), ref: 00456726
                                                                • CoCreateInstance.OLE32(0049A764,00000000,00000001,0049A774,?,00000000,00456A8B), ref: 0045674C
                                                                • SysFreeString.OLEAUT32(00000000), ref: 00456903
                                                                Strings
                                                                • CoCreateInstance, xrefs: 00456757
                                                                • {pf32}\, xrefs: 004567C6
                                                                • %ProgramFiles(x86)%\, xrefs: 004567D6
                                                                • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045693A
                                                                • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 004568E8
                                                                • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 00456899
                                                                • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004569AC
                                                                • IPersistFile::Save, xrefs: 00456A0A
                                                                • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 00456972
                                                                • IPropertyStore::Commit, xrefs: 0045698B
                                                                • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 00456865
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateInstance$FreeString
                                                                • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                                • API String ID: 308859552-2363233914
                                                                • Opcode ID: 4019791116f66badce9a962934a38fe6a925263bf281427cd9e28d1a80f6db8e
                                                                • Instruction ID: 4df8bc5fd707d325f3bf8ee572e1ec6f0f953e2c79806aa5a0124fc00630fac3
                                                                • Opcode Fuzzy Hash: 4019791116f66badce9a962934a38fe6a925263bf281427cd9e28d1a80f6db8e
                                                                • Instruction Fuzzy Hash: CBB13170A00108AFDB50DFA9C985B9E7BF8AF49306F554066F804E7362DB78DD48CB69
                                                                APIs
                                                                  • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472EFC
                                                                • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473017
                                                                • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047302D
                                                                • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00473052
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                • String ID: .lnk$.pif$.url$Creating the icon.$Desktop.ini$Dest filename: %s$Successfully created the icon.$target.lnk${group}\
                                                                • API String ID: 971782779-2902529204
                                                                • Opcode ID: c8d3714330c821f44f5f542ed692b99ce225314bcf0a3c632e85185b5bf0d038
                                                                • Instruction ID: 2511324a254e809fb6cb6e6df698c04f534d896ef770860fda33365643b674db
                                                                • Opcode Fuzzy Hash: c8d3714330c821f44f5f542ed692b99ce225314bcf0a3c632e85185b5bf0d038
                                                                • Instruction Fuzzy Hash: 6FD12434A001499FDB01EFA9D582BDDBBF4EF08305F50806AF804B7392D6789E45DB69
                                                                APIs
                                                                • ShowWindow.USER32(?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000,?,004991F7,00000000,00499201,?,00000000), ref: 00498B2B
                                                                • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000,?,004991F7,00000000), ref: 00498B3E
                                                                • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000), ref: 00498B4E
                                                                • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498B6F
                                                                • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000), ref: 00498B7F
                                                                  • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,00456126,00000000,0045618E), ref: 0042D491
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                • API String ID: 2000705611-3672972446
                                                                • Opcode ID: b2c309fcc95269bf4bce90935aba80d2b950601633833f66e1faf58be6f95bcd
                                                                • Instruction ID: c4cf27df87ac7a7b4ea6ef339e5ba87e8767b77ee3c6798ab53da9e3a0f24a8a
                                                                • Opcode Fuzzy Hash: b2c309fcc95269bf4bce90935aba80d2b950601633833f66e1faf58be6f95bcd
                                                                • Instruction Fuzzy Hash: 09919330A042449FDF11EB69D852FAE7BA5EB4A304F51447AF400E72D2CA7CAC05CB6D
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,0045AA3C,?,?,?,?,?,00000006,?,00000000,00497F35,?,00000000,00497FD8), ref: 0045A8EE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                • API String ID: 1452528299-3112430753
                                                                • Opcode ID: 8a7e70ed7d2802cf2d1f154f993020eede7d014e1a3a8bb25d69fafc5e35e5ca
                                                                • Instruction ID: 47b20d326fd82fe6504d69cf898c82eeddf784bf4f3b73b35613650615bf039f
                                                                • Opcode Fuzzy Hash: 8a7e70ed7d2802cf2d1f154f993020eede7d014e1a3a8bb25d69fafc5e35e5ca
                                                                • Instruction Fuzzy Hash: D171A030B042546BDB00EB6988827AE7BA49F48305F50856BFC01EB383CB7CDE59C75A
                                                                APIs
                                                                • GetVersion.KERNEL32 ref: 0045CC82
                                                                • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CCA2
                                                                • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CCAF
                                                                • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CCBC
                                                                • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CCCA
                                                                  • Part of subcall function 0045CB70: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CC0F,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CBE9
                                                                • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CEBD,?,?,00000000), ref: 0045CD83
                                                                • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CEBD,?,?,00000000), ref: 0045CD8C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                • API String ID: 59345061-4263478283
                                                                • Opcode ID: c6057923a5b4aa5def86807270a108e59673eb775b044adeceaa0b76775d665d
                                                                • Instruction ID: e70f229ab34f11e3bb96b7fa9db8dd957f06ce772e443448e3a5811e0bd6c06d
                                                                • Opcode Fuzzy Hash: c6057923a5b4aa5def86807270a108e59673eb775b044adeceaa0b76775d665d
                                                                • Instruction Fuzzy Hash: BA5195B1900704EFDB10DF99C881BEEB7B9EB48715F14806AF915F7282C2789945CF69
                                                                APIs
                                                                • CreateCompatibleDC.GDI32(00000000), ref: 0041B3D3
                                                                • CreateCompatibleDC.GDI32(00000000), ref: 0041B3DD
                                                                • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B406
                                                                • GetDC.USER32(00000000), ref: 0041B412
                                                                • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B43F
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041B465
                                                                • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                • String ID:
                                                                • API String ID: 644427674-0
                                                                • Opcode ID: a07e3cbb24df5042cba66812f0bcbe2bed2d5bf396793bbd6052f972fec3ec6c
                                                                • Instruction ID: 6b909a1540c808143a27ece7eebc35972739c5532850bae840edfb4e77f88e68
                                                                • Opcode Fuzzy Hash: a07e3cbb24df5042cba66812f0bcbe2bed2d5bf396793bbd6052f972fec3ec6c
                                                                • Instruction Fuzzy Hash: 5641CE71E44609AFDB10DAE9C846FEFB7BCEB08704F104466B614F7282C7786D408BA8
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,?,00000000,?,00000000,00454B81,?,0045AC12,00000003,00000000,00000000,00454BB8), ref: 00454A01
                                                                  • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,00000000,?,00000004,00000000,00454ACB,?,0045AC12,00000000,00000000,?,00000000,?,00000000), ref: 00454A85
                                                                • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,00000000,?,00000004,00000000,00454ACB,?,0045AC12,00000000,00000000,?,00000000,?,00000000), ref: 00454AB4
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045491F
                                                                • RegOpenKeyEx, xrefs: 00454984
                                                                • , xrefs: 00454972
                                                                • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454958
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: QueryValue$FormatMessageOpen
                                                                • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                • API String ID: 2812809588-1577016196
                                                                • Opcode ID: 395617bcc71a058ce69bc2fb35d8539d5a61a7e9adf83235d3b102da95ca348f
                                                                • Instruction ID: f9892de48a8f191bc49ac76cf4be280f3350b447777e8b89a87aacf0c036b8b5
                                                                • Opcode Fuzzy Hash: 395617bcc71a058ce69bc2fb35d8539d5a61a7e9adf83235d3b102da95ca348f
                                                                • Instruction Fuzzy Hash: 31912571E44208ABDB41DB95C941BDEB7FCEB89309F10447BF900FB282D6789E458B69
                                                                APIs
                                                                  • Part of subcall function 0045940C: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459549,00000000,00459701,?,00000000,00000000,00000000), ref: 00459459
                                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 004595A7
                                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 00459611
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 00459678
                                                                Strings
                                                                • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 004595C4
                                                                • v2.0.50727, xrefs: 00459603
                                                                • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 0045955A
                                                                • v4.0.30319, xrefs: 00459599
                                                                • v1.1.4322, xrefs: 0045966A
                                                                • .NET Framework version %s not found, xrefs: 004596B1
                                                                • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 0045962B
                                                                • .NET Framework not found, xrefs: 004596C5
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Close$Open
                                                                • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                • API String ID: 2976201327-446240816
                                                                • Opcode ID: 1c3e49b20786f7f4c067717ed1f3da7ced3b3e07ab1076f2c4b46178acdaa376
                                                                • Instruction ID: 13449528a83cd7bd3976393389562d3fcc4363bdf2ba35ed2198dacadad7a936
                                                                • Opcode Fuzzy Hash: 1c3e49b20786f7f4c067717ed1f3da7ced3b3e07ab1076f2c4b46178acdaa376
                                                                • Instruction Fuzzy Hash: FC51B135A04145EBCB01DF64C8A1BEE77A6DB89305F54447BE8019B393EB3D9E0E8B18
                                                                APIs
                                                                • CloseHandle.KERNEL32(?), ref: 00458B23
                                                                • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458B3F
                                                                • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458B4D
                                                                • GetExitCodeProcess.KERNEL32(?), ref: 00458B5E
                                                                • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458BA5
                                                                • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458BC1
                                                                Strings
                                                                • Helper process exited., xrefs: 00458B6D
                                                                • Helper process exited, but failed to get exit code., xrefs: 00458B97
                                                                • Stopping 64-bit helper process. (PID: %u), xrefs: 00458B15
                                                                • Helper process exited with failure code: 0x%x, xrefs: 00458B8B
                                                                • Helper isn't responding; killing it., xrefs: 00458B2F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                • API String ID: 3355656108-1243109208
                                                                • Opcode ID: 3d04629f9a432e6f4a0ed358203529be6643b33ab849e8d249bd662f9d7fd40f
                                                                • Instruction ID: 7e49c79e8349cf5087e4bea88bd9331b7e76427b7ebfc1862ecfa5aa0db55867
                                                                • Opcode Fuzzy Hash: 3d04629f9a432e6f4a0ed358203529be6643b33ab849e8d249bd662f9d7fd40f
                                                                • Instruction Fuzzy Hash: 462162706047409BC760E77DC442B5B76D89F44305F008C2EB999E7283DF7CE8489B6A
                                                                APIs
                                                                  • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00454773,?,00000000,00454837), ref: 004546C3
                                                                • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00454773,?,00000000,00454837), ref: 004547FF
                                                                  • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004545DB
                                                                • RegCreateKeyEx, xrefs: 00454637
                                                                • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045460B
                                                                • , xrefs: 00454625
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateFormatMessageQueryValue
                                                                • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                • API String ID: 2481121983-1280779767
                                                                • Opcode ID: 75279f6a64a083a2a8abdb50c603dbef55240c28a0755e1e1ae0767c4fdccaa3
                                                                • Instruction ID: dcb2efb4518004930bb79e36ff4c26a26f41c5c3291808b61d16842317edebf7
                                                                • Opcode Fuzzy Hash: 75279f6a64a083a2a8abdb50c603dbef55240c28a0755e1e1ae0767c4fdccaa3
                                                                • Instruction Fuzzy Hash: E6810175A00209AFDB00EFD5C941BEEB7B9EB49305F50442AF900FB282D7789A45CB69
                                                                APIs
                                                                  • Part of subcall function 00453930: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A1F
                                                                  • Part of subcall function 00453930: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A2F
                                                                • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004973A5
                                                                • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004974F9), ref: 004973C6
                                                                • CreateWindowExA.USER32(00000000,STATIC,00497508,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004973ED
                                                                • SetWindowLongA.USER32(?,000000FC,00496B80), ref: 00497400
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000,STATIC,00497508), ref: 00497430
                                                                • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004974A4
                                                                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000), ref: 004974B0
                                                                  • Part of subcall function 00453DA4: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E8B
                                                                • DestroyWindow.USER32(?,004974D3,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000,STATIC), ref: 004974C6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                • API String ID: 1549857992-2312673372
                                                                • Opcode ID: 0ab8c79763325155dd79793700a727a6f2b3fb3e9c7f7600a3a4c1d4aca0dfea
                                                                • Instruction ID: a44cfd94a4b3d096a525e7606d5a2dde299b278b8d360b581aa2f7a861fbb15f
                                                                • Opcode Fuzzy Hash: 0ab8c79763325155dd79793700a727a6f2b3fb3e9c7f7600a3a4c1d4aca0dfea
                                                                • Instruction Fuzzy Hash: 1A414370A54208AFDF00EFA5DC52F9E7BB8EB09714F514576F900F7292D6799A00CB68
                                                                APIs
                                                                • GetActiveWindow.USER32 ref: 00462AA4
                                                                • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462AB8
                                                                • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462AC5
                                                                • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462AD2
                                                                • GetWindowRect.USER32(?,00000000), ref: 00462B1E
                                                                • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462B5C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                • API String ID: 2610873146-3407710046
                                                                • Opcode ID: f4d6e5fad0b29dbe73c49a3dd9bbec29a3ac53327e7f71340f51527231a6598f
                                                                • Instruction ID: 79ef3469d7d3f88cabd24b86f5758d16992ed885f8e8d733778c3d92ea40af4d
                                                                • Opcode Fuzzy Hash: f4d6e5fad0b29dbe73c49a3dd9bbec29a3ac53327e7f71340f51527231a6598f
                                                                • Instruction Fuzzy Hash: F6219276B05A046BD600DE68CD81F7B3799DB88F14F09052AF944DB3C2EAB8ED004B5A
                                                                APIs
                                                                • GetActiveWindow.USER32 ref: 0042F1F4
                                                                • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F208
                                                                • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F215
                                                                • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F222
                                                                • GetWindowRect.USER32(?,00000000), ref: 0042F26E
                                                                • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F2AC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                • API String ID: 2610873146-3407710046
                                                                • Opcode ID: 7dac0dfa7658a4558a2e8796b90453688b6c981995994b626f0caacaebe10860
                                                                • Instruction ID: cafee556b4ff86616240ec82e2754e32886365cebaf319099c414f584e750c92
                                                                • Opcode Fuzzy Hash: 7dac0dfa7658a4558a2e8796b90453688b6c981995994b626f0caacaebe10860
                                                                • Instruction Fuzzy Hash: 3421D77A704614ABD300D664DD81F3B33E4DB89B14F89057AFD40DB381DA79DC084BA9
                                                                APIs
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458EA3,?,00000000,00458F06,?,?,02293858,00000000), ref: 00458D21
                                                                • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000,00000001,00000000,00000000,00000000,00458EA3), ref: 00458D7E
                                                                • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000,00000001,00000000,00000000,00000000,00458EA3), ref: 00458D8B
                                                                • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458DD7
                                                                • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458E11,?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000), ref: 00458DFD
                                                                • GetLastError.KERNEL32(?,?,00000000,00000001,00458E11,?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000), ref: 00458E04
                                                                  • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                • String ID: CreateEvent$TransactNamedPipe
                                                                • API String ID: 2182916169-3012584893
                                                                • Opcode ID: 98c2342ffc13102a86a2f4ad38db514fb9186628fbfdf3c783b7ad9eec6d73f4
                                                                • Instruction ID: b755420f5ccc64554a28e8d5f72de5b6a69c50c517f2f1d69fd7c456eb535d6c
                                                                • Opcode Fuzzy Hash: 98c2342ffc13102a86a2f4ad38db514fb9186628fbfdf3c783b7ad9eec6d73f4
                                                                • Instruction Fuzzy Hash: 4A417371A00608EFDB15DF95CD81F9EB7F9EB48715F10406AF904E7292DA789E44CB28
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456F2D,?,?,00000031,?), ref: 00456DF0
                                                                • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456DF6
                                                                • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456E43
                                                                  • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                • API String ID: 1914119943-2711329623
                                                                • Opcode ID: 7b1ec654037b0c607dfe6d04a3082381f0cbc5cf9cb070b5b8bf219295e165cb
                                                                • Instruction ID: 2b224e74544e423aed3b5227b18181137566e670263372cbc00570a3e14d3cd7
                                                                • Opcode Fuzzy Hash: 7b1ec654037b0c607dfe6d04a3082381f0cbc5cf9cb070b5b8bf219295e165cb
                                                                • Instruction Fuzzy Hash: 2B319275A00504AFDB11EFAACC42D5FB7BEEB89705752846AF804D3652DA38DD04CB28
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047EB60,00000000), ref: 0042E451
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047EB60,00000000), ref: 0042E4A5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressCloseHandleModuleProc
                                                                • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                • API String ID: 4190037839-2401316094
                                                                • Opcode ID: 1af4437276b931ae032a2a4a3ca7a17fb9f1546afc1d5d26d282f18a110b0504
                                                                • Instruction ID: 3fe9fe372c4d794b24d5987f6434f9a2f248a379bc076d0360e6e1ac237d63e0
                                                                • Opcode Fuzzy Hash: 1af4437276b931ae032a2a4a3ca7a17fb9f1546afc1d5d26d282f18a110b0504
                                                                • Instruction Fuzzy Hash: 16216430B10219BBCB10EAF7DC45A9E77A8EB04308FA04877A500E7281EB7CDE459B5D
                                                                APIs
                                                                • RectVisible.GDI32(?,?), ref: 00416E23
                                                                • SaveDC.GDI32(?), ref: 00416E37
                                                                • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                • DeleteObject.GDI32(?), ref: 00416F32
                                                                • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                • DeleteObject.GDI32(?), ref: 00416F7F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                • String ID:
                                                                • API String ID: 375863564-0
                                                                • Opcode ID: db6c70493318213a3b2cdd544b125370fd54b269ad31cfd686a9519e7a86e3c4
                                                                • Instruction ID: c727efbf8946963a4c0451e641fd5f3f57076e2c2b79ed229a1c60f75d7412ee
                                                                • Opcode Fuzzy Hash: db6c70493318213a3b2cdd544b125370fd54b269ad31cfd686a9519e7a86e3c4
                                                                • Instruction Fuzzy Hash: A0513AB12047455FDB50EF69C8C4B9B77E8AF48314F1546AAFD488B286C738EC81CB99
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                • String ID:
                                                                • API String ID: 1694776339-0
                                                                • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                APIs
                                                                • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Menu$Delete$EnableItem$System
                                                                • String ID:
                                                                • API String ID: 3985193851-0
                                                                • Opcode ID: b2f1750b03ba79d273c55ca6812263c276687b20c7bac49dc024d7f30c6f7dfa
                                                                • Instruction ID: efa19709b170cd1c2d0de868379c086f5835f405e594c588ded1d161c250978f
                                                                • Opcode Fuzzy Hash: b2f1750b03ba79d273c55ca6812263c276687b20c7bac49dc024d7f30c6f7dfa
                                                                • Instruction Fuzzy Hash: 112124703807447AE720E725CD8BF9B7BD89B04718F5440A9BA48BF2D3C6F9AA40865C
                                                                APIs
                                                                • FreeLibrary.KERNEL32(10000000), ref: 00481EF5
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00481F09
                                                                • SendNotifyMessageA.USER32(000203B6,00000496,00002710,00000000), ref: 00481F7B
                                                                Strings
                                                                • Restarting Windows., xrefs: 00481F56
                                                                • Deinitializing Setup., xrefs: 00481D56
                                                                • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481F2A
                                                                • GetCustomSetupExitCode, xrefs: 00481D95
                                                                • DeinitializeSetup, xrefs: 00481DF1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary$MessageNotifySend
                                                                • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                • API String ID: 3817813901-1884538726
                                                                • Opcode ID: c898f3fadde3ff7955209d5f4aceb7b29c199a3380d9c61b05ec390ed495ea4d
                                                                • Instruction ID: 9e00769445d4a0c849b2d818ef4b464354af313f5be9db4beddfa23a64d09d3b
                                                                • Opcode Fuzzy Hash: c898f3fadde3ff7955209d5f4aceb7b29c199a3380d9c61b05ec390ed495ea4d
                                                                • Instruction Fuzzy Hash: 0C518031A04200AFD715EF69D845B5E7BA8EB19318F50887BF905C72B1D738A845CB59
                                                                APIs
                                                                • SHGetMalloc.SHELL32(?), ref: 0046176F
                                                                • GetActiveWindow.USER32 ref: 004617D3
                                                                • CoInitialize.OLE32(00000000), ref: 004617E7
                                                                • SHBrowseForFolder.SHELL32(?), ref: 004617FE
                                                                • CoUninitialize.OLE32(0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461813
                                                                • SetActiveWindow.USER32(?,0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461829
                                                                • SetActiveWindow.USER32(?,?,0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461832
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                • String ID: A
                                                                • API String ID: 2684663990-3554254475
                                                                • Opcode ID: c8a2995f1564064eb5a34001aee608c8ce9a85b4cfccd82670955085ca8b405e
                                                                • Instruction ID: ed33581d6f83e257b2021294155b7b183ce5e349162e4ad67cdd841697ea343d
                                                                • Opcode Fuzzy Hash: c8a2995f1564064eb5a34001aee608c8ce9a85b4cfccd82670955085ca8b405e
                                                                • Instruction Fuzzy Hash: DD31F0B1E00248AFDB11EFA6D885A9EBBF8EB09304F55447BF804E7251E7785A04CB59
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000,?,00472F11,?,?,00000000,00473194), ref: 00472C18
                                                                  • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                  • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000,?,00472F11), ref: 00472C8F
                                                                • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000), ref: 00472C95
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                • API String ID: 884541143-1710247218
                                                                • Opcode ID: 66cca181f9b721833913324fb941b36821abb62f62904710aeac79635de6a3b1
                                                                • Instruction ID: 65975e4bd8cd76c9bb0fe38812e038ff2f06eb36f2e037c13b6dabf628133507
                                                                • Opcode Fuzzy Hash: 66cca181f9b721833913324fb941b36821abb62f62904710aeac79635de6a3b1
                                                                • Instruction Fuzzy Hash: 9511D0307005147FD712EA759E82B9E76ACDB59714F61853BB804A72C1DBBCAE02866C
                                                                APIs
                                                                • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D365
                                                                • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D375
                                                                • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D385
                                                                • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D395
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc
                                                                • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                • API String ID: 190572456-3516654456
                                                                • Opcode ID: dc90f1f262602021e393954f48f97557164b85cd901e8b5ff6cac9b118bc13cf
                                                                • Instruction ID: a094d50e791027cbd3930c6bcb0dd8b00ad2176992dcb97735ddb1afc71f87fe
                                                                • Opcode Fuzzy Hash: dc90f1f262602021e393954f48f97557164b85cd901e8b5ff6cac9b118bc13cf
                                                                • Instruction Fuzzy Hash: 170128B0D00700DAE324DF36AC4272636A5EFA430EF14903BAD48962B7D779485B9A2D
                                                                APIs
                                                                • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041AA03
                                                                • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Color$StretchText
                                                                • String ID:
                                                                • API String ID: 2984075790-0
                                                                • Opcode ID: 346bdf56f45da54f900b88fa69c46fff65611cbab2d21c5c69379b94b51b0a6c
                                                                • Instruction ID: 3742fc556daaed9ad14d930c470d40cb5efd251a519f467f7f8e710c3ba79c5e
                                                                • Opcode Fuzzy Hash: 346bdf56f45da54f900b88fa69c46fff65611cbab2d21c5c69379b94b51b0a6c
                                                                • Instruction Fuzzy Hash: A561E5B5A00105EFCB40EFA9D985E9ABBF8EF08314B108166F518DB261CB34ED50CF99
                                                                APIs
                                                                  • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458320,?, /s ",?,regsvr32.exe",?,00458320), ref: 00458292
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseDirectoryHandleSystem
                                                                • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                • API String ID: 2051275411-1862435767
                                                                • Opcode ID: 094f14b588af688cd7db8b552fab67cbd0f69cfd9e563acb8ae8cd2159047a0a
                                                                • Instruction ID: 3217153a075e29e22e4edd5f99a32045657764684ff44c5b21fe10df6120cd58
                                                                • Opcode Fuzzy Hash: 094f14b588af688cd7db8b552fab67cbd0f69cfd9e563acb8ae8cd2159047a0a
                                                                • Instruction Fuzzy Hash: 28411770A00308ABDB10EFD5C842BDEB7F9AF45705F50407FA904BB292DF799A098B59
                                                                APIs
                                                                • OffsetRect.USER32(?,00000001,00000001), ref: 0044D21D
                                                                • GetSysColor.USER32(00000014), ref: 0044D224
                                                                • SetTextColor.GDI32(00000000,00000000), ref: 0044D23C
                                                                • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D265
                                                                • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D26F
                                                                • GetSysColor.USER32(00000010), ref: 0044D276
                                                                • SetTextColor.GDI32(00000000,00000000), ref: 0044D28E
                                                                • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D2B7
                                                                • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D2E2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Text$Color$Draw$OffsetRect
                                                                • String ID:
                                                                • API String ID: 1005981011-0
                                                                • Opcode ID: 0c9f13fdac39b7e8032be21cb884e4f523a93d5be2f974ed7a515f91e2df11ad
                                                                • Instruction ID: bddce6b53f256ac6c171d17b767d3a31006e7acd236a538b09f11432ecbe9b7c
                                                                • Opcode Fuzzy Hash: 0c9f13fdac39b7e8032be21cb884e4f523a93d5be2f974ed7a515f91e2df11ad
                                                                • Instruction Fuzzy Hash: 6921AFB42015047FC710FB6ACD8AE8B7BDC9F19319B01857AB918EB392C678DE404669
                                                                APIs
                                                                  • Part of subcall function 004509A0: SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                  • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496C5D
                                                                • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496C71
                                                                • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00496C8B
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496C97
                                                                • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496C9D
                                                                • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496CB0
                                                                Strings
                                                                • Deleting Uninstall data files., xrefs: 00496BD3
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                • String ID: Deleting Uninstall data files.
                                                                • API String ID: 1570157960-2568741658
                                                                • Opcode ID: 1ff474fed9ee097c96215d717bbe635fc8fb99da6ef0c3667258a19916fdf94b
                                                                • Instruction ID: 97c3483cac018c5983fbae276c25bca061d0eb7c138ea963c76b2828a35483b6
                                                                • Opcode Fuzzy Hash: 1ff474fed9ee097c96215d717bbe635fc8fb99da6ef0c3667258a19916fdf94b
                                                                • Instruction Fuzzy Hash: A0215371704204BFEB11EB7AED42B263BA8D75975CF52443BB501971A2D67CAC01CB2D
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004704F1,?,?,?,?,00000000), ref: 0047045B
                                                                • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004704F1), ref: 00470472
                                                                • AddFontResourceA.GDI32(00000000), ref: 0047048F
                                                                • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004704A3
                                                                Strings
                                                                • Failed to open Fonts registry key., xrefs: 00470479
                                                                • AddFontResource, xrefs: 004704AD
                                                                • Failed to set value in Fonts registry key., xrefs: 00470464
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                • API String ID: 955540645-649663873
                                                                • Opcode ID: 4d906fac6dccdf438760750c8da522a8f943409b0e1b4cd23829c8425d47f062
                                                                • Instruction ID: 7097c2831d41c9cd2ca76b8e30f6fd32102657c6dd1fb14c708e758a2e1a6bb0
                                                                • Opcode Fuzzy Hash: 4d906fac6dccdf438760750c8da522a8f943409b0e1b4cd23829c8425d47f062
                                                                • Instruction Fuzzy Hash: 6421C770741204BBD710EA669C42FAE679DDB54704F50843BBA04FB3C2D67CAE05466D
                                                                APIs
                                                                  • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                  • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                  • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                • GetVersion.KERNEL32 ref: 00462F08
                                                                • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462F46
                                                                • SHGetFileInfo.SHELL32(00462FE4,00000000,?,00000160,00004011), ref: 00462F63
                                                                • LoadCursorA.USER32(00000000,00007F02), ref: 00462F81
                                                                • SetCursor.USER32(00000000,00000000,00007F02,00462FE4,00000000,?,00000160,00004011), ref: 00462F87
                                                                • SetCursor.USER32(?,00462FC7,00007F02,00462FE4,00000000,?,00000160,00004011), ref: 00462FBA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                • String ID: Explorer
                                                                • API String ID: 2594429197-512347832
                                                                • Opcode ID: 96f263f28a0c5ccb9cf997cde3498094f1a70322a781246ee7820a3eb8b88b0c
                                                                • Instruction ID: e6c52dcece90e3493be9f15e0e64570b8c3e052e326357339ba6e8db1b4e70e7
                                                                • Opcode Fuzzy Hash: 96f263f28a0c5ccb9cf997cde3498094f1a70322a781246ee7820a3eb8b88b0c
                                                                • Instruction Fuzzy Hash: 80210A707447047AE714BB758D87F9A76989B04708F4004BFB609EE1C3DAFC9805966D
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02292BD4,?,?,?,02292BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787C5
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004787CB
                                                                • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292BD4,?,?,?,02292BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787DE
                                                                • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292BD4,?,?,?,02292BD4), ref: 00478808
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,02292BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 00478826
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                • API String ID: 2704155762-2318956294
                                                                • Opcode ID: c594ba596ff371defbe1f19e99b7548ca8d88db220ed669b2209c8c709b6289d
                                                                • Instruction ID: b4b4eb6e882b21a3e38edc8c56477b2b3cf7b2a6488eba7606f3a3958a626299
                                                                • Opcode Fuzzy Hash: c594ba596ff371defbe1f19e99b7548ca8d88db220ed669b2209c8c709b6289d
                                                                • Instruction Fuzzy Hash: A101D6717C470436E52035AB4C8AFBB654C8B50769F65813F7A5CEA2C2DEAC8D0601AF
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,0045A036,?,00000000,00000000,00000000,?,00000006,?,00000000,00497F35,?,00000000,00497FD8), ref: 00459F7A
                                                                  • Part of subcall function 00454468: FindClose.KERNEL32(000000FF,0045455E), ref: 0045454D
                                                                Strings
                                                                • Failed to delete directory (%d)., xrefs: 0045A010
                                                                • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459F54
                                                                • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459FEF
                                                                • Deleting directory: %s, xrefs: 00459F03
                                                                • Failed to strip read-only attribute., xrefs: 00459F48
                                                                • Stripped read-only attribute., xrefs: 00459F3C
                                                                • Failed to delete directory (%d). Will retry later., xrefs: 00459F93
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseErrorFindLast
                                                                • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                • API String ID: 754982922-1448842058
                                                                • Opcode ID: 108d6f8d37026f2bdf90fc188fb77551ed7727444c0280258668295353b09f4f
                                                                • Instruction ID: f7c933924608f42955d773fda0cc7ecec7f056cd1af039b488d7310b1683b7b3
                                                                • Opcode Fuzzy Hash: 108d6f8d37026f2bdf90fc188fb77551ed7727444c0280258668295353b09f4f
                                                                • Instruction Fuzzy Hash: 2741AF30A142459ACB14DF6988013AEBAA59F4970AF50867BAC05D73C3CB7D8D1DC75E
                                                                APIs
                                                                • GetCapture.USER32 ref: 00422EB4
                                                                • GetCapture.USER32 ref: 00422EC3
                                                                • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                • ReleaseCapture.USER32 ref: 00422ECE
                                                                • GetActiveWindow.USER32 ref: 00422EDD
                                                                • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                • GetActiveWindow.USER32 ref: 00422FCF
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                • String ID:
                                                                • API String ID: 862346643-0
                                                                • Opcode ID: 68a87140416b020399d93bb5315a0a21c376da3895e44649e19dd4425ce1cb21
                                                                • Instruction ID: 5ea5fd569023dc8c87c0f060f2033c8effa86d07781bc97308b393d06b21a190
                                                                • Opcode Fuzzy Hash: 68a87140416b020399d93bb5315a0a21c376da3895e44649e19dd4425ce1cb21
                                                                • Instruction Fuzzy Hash: 42414F70B00254AFDB10EB69DA82B9E77F1EF48304F5540BAF500AB292D7B89E40DB58
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 0042949A
                                                                • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                  • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 004294CE
                                                                • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                                • String ID:
                                                                • API String ID: 1583807278-0
                                                                • Opcode ID: f653b88d646d5855613b637c91f02c053f26aae7c72922398ebfcd233ccf026a
                                                                • Instruction ID: 697d7c7282338d87a55ab62dd7e79ac53eeb01c5e9ca74f61c727bf968a75029
                                                                • Opcode Fuzzy Hash: f653b88d646d5855613b637c91f02c053f26aae7c72922398ebfcd233ccf026a
                                                                • Instruction Fuzzy Hash: 4B01E1517087113AF311767A8CC2F6F65C8CB48348F44043AFA46963D3D96C9C81872A
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 0041DE37
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE41
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041DE4E
                                                                • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                                • String ID:
                                                                • API String ID: 225703358-0
                                                                • Opcode ID: 9e6aef158aae43a64748e55fd0ac7cd53bc5d466c5663c5b8304b383878f9cfe
                                                                • Instruction ID: 417a648a5fb8aa5baf3b27a45d37177240889d53830a96f1de9ccb55acdbe8d0
                                                                • Opcode Fuzzy Hash: 9e6aef158aae43a64748e55fd0ac7cd53bc5d466c5663c5b8304b383878f9cfe
                                                                • Instruction Fuzzy Hash: D0113D706443015AE340FFA65992BAA3690EB24709F00913FF609AF3D1DA7E1C849B6E
                                                                APIs
                                                                • LoadCursorA.USER32(00000000,00007F02), ref: 004633EC
                                                                • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463481), ref: 004633F2
                                                                • SetCursor.USER32(?,00463469,00007F02,00000000,00463481), ref: 0046345C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Cursor$Load
                                                                • String ID: $ $Internal error: Item already expanding
                                                                • API String ID: 1675784387-1948079669
                                                                • Opcode ID: f6d1be44cf2e44268d7afd95b077db9a3be558b3ec252d02f0fd4fc7ed4407db
                                                                • Instruction ID: 22b4a0b3887aba48b6836ac3fd128682d97f720243347cd6184d65e00a263647
                                                                • Opcode Fuzzy Hash: f6d1be44cf2e44268d7afd95b077db9a3be558b3ec252d02f0fd4fc7ed4407db
                                                                • Instruction Fuzzy Hash: A1B1A230A00284EFDB21DF29C545B9ABBF0AF04305F1585AEE8459B792D778EE44CB5A
                                                                APIs
                                                                • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E8B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringWrite
                                                                • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                • API String ID: 390214022-3304407042
                                                                • Opcode ID: 45615c73439ce270b6d05ccbf14361c73deff9410c1a8f3f205c5696ea4c069e
                                                                • Instruction ID: b3c584f0f22674ad0fcc633aedcec79f77295145a47899f9a0f541d7d967d7d4
                                                                • Opcode Fuzzy Hash: 45615c73439ce270b6d05ccbf14361c73deff9410c1a8f3f205c5696ea4c069e
                                                                • Instruction Fuzzy Hash: 9191F534E001099BDF11EFA5D881BDEB7F5EF4834AF508466E900B7292D7789E49CA58
                                                                APIs
                                                                • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 004770E5
                                                                • SetWindowLongW.USER32(00000000,000000FC,00477040), ref: 0047710C
                                                                • GetACP.KERNEL32(00000000,00477324,?,00000000,0047734E), ref: 00477149
                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0047718F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ClassInfoLongMessageSendWindow
                                                                • String ID: COMBOBOX$Inno Setup: Language
                                                                • API String ID: 3391662889-4234151509
                                                                • Opcode ID: 521d6e489fa1ae24faf8f78c129860c497e4f80b4a302989467673be046d20e0
                                                                • Instruction ID: 5e09237f06f7ca82dbad2e96fb5083c0fe5e5e2331f930e3c55d8b81a1e05678
                                                                • Opcode Fuzzy Hash: 521d6e489fa1ae24faf8f78c129860c497e4f80b4a302989467673be046d20e0
                                                                • Instruction Fuzzy Hash: 67814F30A042059FCB10DF69C985A9AB7F1FB49304F9481BAEC08EB362D734AD41CB99
                                                                APIs
                                                                • GetSystemDefaultLCID.KERNEL32(00000000,00408978,?,?,?,?,00000000,00000000,00000000,?,0040997F,00000000,00409992), ref: 0040874A
                                                                  • Part of subcall function 00408578: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                  • Part of subcall function 004085C4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087C6,?,?,?,00000000,00408978), ref: 004085D7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale$DefaultSystem
                                                                • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                • API String ID: 1044490935-665933166
                                                                • Opcode ID: 70ae38f132fc3d3f9053d40cb900b3f5106e9b3c11c1bc8091f0af349ffabeb6
                                                                • Instruction ID: 31fd29742738ad3ef4a1c8f63862b88eefe7a444323e1968e1f56601496a4ee9
                                                                • Opcode Fuzzy Hash: 70ae38f132fc3d3f9053d40cb900b3f5106e9b3c11c1bc8091f0af349ffabeb6
                                                                • Instruction Fuzzy Hash: 55512D74B001486BDB01FBA69D91AAE77A9DB94308F50D47FA181BB3C6CE3CDA05871D
                                                                APIs
                                                                • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                  • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                  • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                • String ID: ,$?
                                                                • API String ID: 2359071979-2308483597
                                                                • Opcode ID: 44383e044abff6cbf278423e894284f1520358ef4015b87050d63fd1739e3a25
                                                                • Instruction ID: c427c9b06a4b8e224850f8fd68708263cabc4ba561a0b31d0e571b4226371ffb
                                                                • Opcode Fuzzy Hash: 44383e044abff6cbf278423e894284f1520358ef4015b87050d63fd1739e3a25
                                                                • Instruction Fuzzy Hash: 0C511774A00144ABDB10EF7ADC816EA7BF9AF08304B1185BBF914E73A6D738D941CB58
                                                                APIs
                                                                • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                • String ID:
                                                                • API String ID: 1030595962-0
                                                                • Opcode ID: 5a427f00feddb577fff5167fa7821d20935eac0201827996bfcfefe2a8efdbf4
                                                                • Instruction ID: 04b97f25464b58ff436fe1885c4dd039914ee627ffefe5dec802ec1f9d3f819a
                                                                • Opcode Fuzzy Hash: 5a427f00feddb577fff5167fa7821d20935eac0201827996bfcfefe2a8efdbf4
                                                                • Instruction Fuzzy Hash: 8A510571A006199FCB14DFA9C8819EEB7F9EF48314B11442AF914E7391D738AD81CB64
                                                                APIs
                                                                • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF2D
                                                                • SelectPalette.GDI32(?,?,00000001), ref: 0041CF93
                                                                • RealizePalette.GDI32(?), ref: 0041CFA2
                                                                • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                • SelectPalette.GDI32(?,?,00000001), ref: 0041D06F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                                • String ID:
                                                                • API String ID: 2222416421-0
                                                                • Opcode ID: d578c5c43a151ca21ad873cc4bbf55809b48f101e43ab62b7175feda3131b2cf
                                                                • Instruction ID: 901e13b734fcfe26ab98e85b677eebf668a0bb257bdc2dc03c804f52c9ec24c8
                                                                • Opcode Fuzzy Hash: d578c5c43a151ca21ad873cc4bbf55809b48f101e43ab62b7175feda3131b2cf
                                                                • Instruction Fuzzy Hash: 47514FB0600204AFDB14DFA9C995F9BBBF9EF08304F108599B549DB292C778ED81CB58
                                                                APIs
                                                                • SendMessageA.USER32(00000000,?,?), ref: 004573D6
                                                                  • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                  • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                  • Part of subcall function 0041EEB4: EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                  • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0045743D
                                                                • TranslateMessage.USER32(?), ref: 0045745B
                                                                • DispatchMessageA.USER32(?), ref: 00457464
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                                • String ID: [Paused]
                                                                • API String ID: 1007367021-4230553315
                                                                • Opcode ID: 6b168901e7e1781911bc7d22981d81ae3d793b775a360e859fc7bc33357b6a45
                                                                • Instruction ID: dae39b44a8721021bfcf47da434b07c1a86f758a792d2d621748dfb7f1b1fb5a
                                                                • Opcode Fuzzy Hash: 6b168901e7e1781911bc7d22981d81ae3d793b775a360e859fc7bc33357b6a45
                                                                • Instruction Fuzzy Hash: 47319531908248AEDB11DBB5EC41BDE7FB8DB4E314F558077E800E7292D67C9909CB69
                                                                APIs
                                                                • GetCursor.USER32(00000000,0046B65F), ref: 0046B5DC
                                                                • LoadCursorA.USER32(00000000,00007F02), ref: 0046B5EA
                                                                • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B5F0
                                                                • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B5FA
                                                                • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B600
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Cursor$LoadSleep
                                                                • String ID: CheckPassword
                                                                • API String ID: 4023313301-1302249611
                                                                • Opcode ID: 58e796373b9fdc746396fa9d1da2347ca5f5e20d566bce270774f79728b0c312
                                                                • Instruction ID: 9215a56909f4d399359b4036adebcff7cd559b99f6583fb3c160e276e3804376
                                                                • Opcode Fuzzy Hash: 58e796373b9fdc746396fa9d1da2347ca5f5e20d566bce270774f79728b0c312
                                                                • Instruction Fuzzy Hash: 34318634644604AFD711EB65C889F9E7BE0EF09308F558076B9049B3A2D778AE40CB99
                                                                APIs
                                                                  • Part of subcall function 00477FD0: GetWindowThreadProcessId.USER32(00000000), ref: 00477FD8
                                                                  • Part of subcall function 00477FD0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004780CF,0049D0A8,00000000), ref: 00477FEB
                                                                  • Part of subcall function 00477FD0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477FF1
                                                                • SendMessageA.USER32(00000000,0000004A,00000000,00478462), ref: 004780DD
                                                                • GetTickCount.KERNEL32 ref: 00478122
                                                                • GetTickCount.KERNEL32 ref: 0047812C
                                                                • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00478181
                                                                Strings
                                                                • CallSpawnServer: Unexpected status: %d, xrefs: 0047816A
                                                                • CallSpawnServer: Unexpected response: $%x, xrefs: 00478112
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                • API String ID: 613034392-3771334282
                                                                • Opcode ID: c7480ea5248a76885aa581e3ee921a1a12fc6fcdeb10822e96bf497bbef75b79
                                                                • Instruction ID: 23b6b6b43e2695b35219bdfabe49a415745965cef25793df2ffc6287c46841aa
                                                                • Opcode Fuzzy Hash: c7480ea5248a76885aa581e3ee921a1a12fc6fcdeb10822e96bf497bbef75b79
                                                                • Instruction Fuzzy Hash: 5F319334F402159ADB10EBB9898A7EEB6A4DF45314F50C03EB548EB382DA7C8D4587AD
                                                                APIs
                                                                • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 004598E7
                                                                Strings
                                                                • CreateAssemblyCache, xrefs: 004598DE
                                                                • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 004598F2
                                                                • .NET Framework CreateAssemblyCache function failed, xrefs: 0045990A
                                                                • Fusion.dll, xrefs: 00459887
                                                                • Failed to load .NET Framework DLL "%s", xrefs: 004598CC
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc
                                                                • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                • API String ID: 190572456-3990135632
                                                                • Opcode ID: b3dedf4d09771b8e3211b538b580fafb75041ab66ed76c1853c4b6e39797986c
                                                                • Instruction ID: f91bc12d19f1fe408be280579c06801c7313a3191b14845461a6c76c6493a406
                                                                • Opcode Fuzzy Hash: b3dedf4d09771b8e3211b538b580fafb75041ab66ed76c1853c4b6e39797986c
                                                                • Instruction Fuzzy Hash: B1318470E04659ABCB01EFA5C88169EB7A8AF44315F50857EE814A7382DB389E08C799
                                                                APIs
                                                                  • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                • GetFocus.USER32 ref: 0041C178
                                                                • GetDC.USER32(?), ref: 0041C184
                                                                • SelectPalette.GDI32(?,?,00000000), ref: 0041C1A5
                                                                • RealizePalette.GDI32(?), ref: 0041C1B1
                                                                • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1F0
                                                                • ReleaseDC.USER32(?,?), ref: 0041C1FD
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                                • String ID:
                                                                • API String ID: 3303097818-0
                                                                • Opcode ID: 7919d48a5b742b990554a8e16781250233d38a1b512c062c402771df9818cd79
                                                                • Instruction ID: 8ccc34f866771a30a1661531480aea9d283d3c3e19187e20a9e7c35f18d949ed
                                                                • Opcode Fuzzy Hash: 7919d48a5b742b990554a8e16781250233d38a1b512c062c402771df9818cd79
                                                                • Instruction Fuzzy Hash: 45112C71A40609BBDB10DBE9DC85FAFB7FCEB48700F54446AB514E7281D67899408B68
                                                                APIs
                                                                • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                • 6F9A2980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                  • Part of subcall function 00410808: 6F99C400.COMCTL32(0049C628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 0041080C
                                                                • 6FA0CB00.COMCTL32(0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                • 6FA0C740.COMCTL32(00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                • 6FA0CB00.COMCTL32(0049C628,00000001,?,?,00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                • 6F9A0860.COMCTL32(0049C628,00418D1F,?,00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem$A0860A2980C400C740
                                                                • String ID:
                                                                • API String ID: 1086221473-0
                                                                • Opcode ID: ea814aff01982a735542cfcaa5f2d759ebf4f13d0bc11ea9e85cdf93c4d7c833
                                                                • Instruction ID: 86feed5bc36cb920ea04fcbc52f338b48e1a9a04039637533027038eb31c68aa
                                                                • Opcode Fuzzy Hash: ea814aff01982a735542cfcaa5f2d759ebf4f13d0bc11ea9e85cdf93c4d7c833
                                                                • Instruction Fuzzy Hash: 43114975B44304BBEB10FBA5DC83F9D73B9DB48704F6040A6B604EB2D1DAB99D808758
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00484208), ref: 004841ED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen
                                                                • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                • API String ID: 47109696-2530820420
                                                                • Opcode ID: 9e77c2a8355bf950addc698619abebac90bd80bfa9f43d4adbdb48c9eae7aef1
                                                                • Instruction ID: c07cac4acaa77b59f2fcd2c5e8c20c92fe22663a7df472bca0d1e55dfbcce728
                                                                • Opcode Fuzzy Hash: 9e77c2a8355bf950addc698619abebac90bd80bfa9f43d4adbdb48c9eae7aef1
                                                                • Instruction Fuzzy Hash: 81119334B082059AD700F7A69C0AB5E7BE8DBA5348F6148B7B800E7281E778AE41C71C
                                                                APIs
                                                                • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ObjectSelect$Delete$Stretch
                                                                • String ID:
                                                                • API String ID: 1458357782-0
                                                                • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                • Instruction ID: ae96c6176d6eb3f3494de580be991e563f9897aa79c0ee3e7df45ff247fef712
                                                                • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                • Instruction Fuzzy Hash: 89115C72F44619ABDB10DADDD886FEFB7BCEB08704F044455B614F7282C678AD418BA8
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 00495BF1
                                                                  • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00495C13
                                                                • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00496191), ref: 00495C27
                                                                • GetTextMetricsA.GDI32(00000000,?), ref: 00495C49
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00495C66
                                                                Strings
                                                                • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495C1E
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                                • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                • API String ID: 2948443157-222967699
                                                                • Opcode ID: 691ce413467488e034de834b989fc2e025067cd5002ece6e443aa881a737f8dc
                                                                • Instruction ID: 6d86e16e7996164c3d99a70d64bcdfbf35cb9465fd6ee9b2fa75eb6a08a4ab21
                                                                • Opcode Fuzzy Hash: 691ce413467488e034de834b989fc2e025067cd5002ece6e443aa881a737f8dc
                                                                • Instruction Fuzzy Hash: 05016176A04709ABDB05DBA98C41E5FB7ECDB49704F21047ABA00E7691D678AE008B28
                                                                APIs
                                                                • GetCursorPos.USER32 ref: 004233BF
                                                                • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                • SetCursor.USER32(00000000), ref: 00423423
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                • String ID:
                                                                • API String ID: 1770779139-0
                                                                • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                • Instruction ID: 0489214c39e5746bc568676ade8a3ee1219ea943f6d585d977b545401c7ee2ca
                                                                • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                • Instruction Fuzzy Hash: 2001D42230562036D6217B795C86E2F22A8CB85B65F50447FB645BB283D93D8C00537D
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(user32.dll), ref: 00495A14
                                                                • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495A21
                                                                • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495A2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModule
                                                                • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                • API String ID: 667068680-2254406584
                                                                • Opcode ID: 3c8b88976e6e67713f1e6fb0365be4ac33276af7b519073db6005e1fda00490b
                                                                • Instruction ID: 6bb6bd91ed17cc43c826bdde37d3733eb090f1301ce7563d8f1f25412fa62683
                                                                • Opcode Fuzzy Hash: 3c8b88976e6e67713f1e6fb0365be4ac33276af7b519073db6005e1fda00490b
                                                                • Instruction Fuzzy Hash: 0AF0F6A2B42F1526DA1161760CC1B7F698CCF81760F680237BD45A7382E96C8D0543AD
                                                                APIs
                                                                • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D739
                                                                • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D749
                                                                • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D759
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc
                                                                • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                • API String ID: 190572456-212574377
                                                                • Opcode ID: 575c4cb06a2452c1401fa841c1313ffc0221effe76d11e7dd1aabe4620aafca8
                                                                • Instruction ID: 6c96be05a1394ea18707f7eb6152f5503904c11dec58d168239e3d414ffdbae6
                                                                • Opcode Fuzzy Hash: 575c4cb06a2452c1401fa841c1313ffc0221effe76d11e7dd1aabe4620aafca8
                                                                • Instruction Fuzzy Hash: 6FF0D0B0D00600DFE724EF369C8672736D5ABA871EF54943BA9499526AD778084ECE1C
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000,004817AB), ref: 0042EA45
                                                                • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                                • InterlockedExchange.KERNEL32(0049C668,00000001), ref: 0042EA5C
                                                                  • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042E9D2
                                                                  • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                  • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049C660,00000001), ref: 0042E9E9
                                                                • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EA70
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                • API String ID: 142928637-2676053874
                                                                • Opcode ID: 1a4120a275a7a58fb50942f7be9802eb4510f593f9b94c8c2bcf046027c2ff71
                                                                • Instruction ID: ee3a30ffd41cbbfe6d6edcae89b7e54a60ed140ac131bcc27b6a733ad903a47d
                                                                • Opcode Fuzzy Hash: 1a4120a275a7a58fb50942f7be9802eb4510f593f9b94c8c2bcf046027c2ff71
                                                                • Instruction Fuzzy Hash: 7FE06DA1741620BAEA10B7B66CC6FAA2668AB18B19F50103BF100A51D1C2BD0C80CA5D
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F0FD), ref: 0044C85F
                                                                • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C870
                                                                • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C880
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$LibraryLoad
                                                                • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                • API String ID: 2238633743-1050967733
                                                                • Opcode ID: 09135f5945541ae78a6af7b678b7c17e974eae42bf5bb0e3fde62042262af164
                                                                • Instruction ID: 3dac3c94951c3f326fc139052019a1d9618f5d358237ac6f028f958aa2bdce3c
                                                                • Opcode Fuzzy Hash: 09135f5945541ae78a6af7b678b7c17e974eae42bf5bb0e3fde62042262af164
                                                                • Instruction Fuzzy Hash: E6F01CB02823068BF750BBB1ECC5B263294E76570AF18117BA001A62E2D7BD4888CF1C
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,004992FC), ref: 00479062
                                                                • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047906F
                                                                • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047907F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModule
                                                                • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                • API String ID: 667068680-222143506
                                                                • Opcode ID: f2527f3e8acae3901293ffe8f3822438352d858e28b091300cd7299335f6a370
                                                                • Instruction ID: fd16aae75e34d792cc346ba171bb4a4eccdb771972da16ee3cf818c899e4fb82
                                                                • Opcode Fuzzy Hash: f2527f3e8acae3901293ffe8f3822438352d858e28b091300cd7299335f6a370
                                                                • Instruction Fuzzy Hash: F3C012F0A50740E9DA00B7B11CC3E7B256CD540B28720803B748D75183D57C0C044F3C
                                                                APIs
                                                                • GetFocus.USER32 ref: 0041B755
                                                                • GetDC.USER32(?), ref: 0041B761
                                                                • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B796
                                                                • RealizePalette.GDI32(00000000), ref: 0041B7A2
                                                                • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7D0
                                                                • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B804
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                • String ID:
                                                                • API String ID: 3275473261-0
                                                                • Opcode ID: c0b27d3b7a66d9be5bed6a7f47b95188f2d45c1e9081e04c5e1905c96dbfd583
                                                                • Instruction ID: a2c5ddb66569cb6b77bb8b351ce757b8a6afb07cbb9f01b77a2eee85226ebd67
                                                                • Opcode Fuzzy Hash: c0b27d3b7a66d9be5bed6a7f47b95188f2d45c1e9081e04c5e1905c96dbfd583
                                                                • Instruction Fuzzy Hash: BB512F74A00208DFCB11DFA9C855AEEBBB9FF49704F104066F504A7390D7789981CBA9
                                                                APIs
                                                                • GetFocus.USER32 ref: 0041BA27
                                                                • GetDC.USER32(?), ref: 0041BA33
                                                                • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA6D
                                                                • RealizePalette.GDI32(00000000), ref: 0041BA79
                                                                • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA9D
                                                                • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAD1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                • String ID:
                                                                • API String ID: 3275473261-0
                                                                • Opcode ID: 2ce40bb40bbcf4fda08707fe581e59aceef162c3ea3b02671fd4d2ee797de512
                                                                • Instruction ID: 9811d2e4aff7790a224b19fb8c07a8c8a8d7caa6f03daf8ca787c0bc2bb5238d
                                                                • Opcode Fuzzy Hash: 2ce40bb40bbcf4fda08707fe581e59aceef162c3ea3b02671fd4d2ee797de512
                                                                • Instruction Fuzzy Hash: 48512974A002189FCB11DFA9C891AAEBBF9FF48700F15806AF504EB751D7789D40CBA4
                                                                APIs
                                                                • GetFocus.USER32 ref: 0041B58E
                                                                • GetDC.USER32(?), ref: 0041B59A
                                                                • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5B6
                                                                • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5D3
                                                                • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5EA
                                                                • ReleaseDC.USER32(?,?), ref: 0041B636
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                                • String ID:
                                                                • API String ID: 2502006586-0
                                                                • Opcode ID: 93cc6d3c32f59bb0d3866a424ed22eeeeb8d669c97e98ac0717914e792a0e722
                                                                • Instruction ID: 54132ba296c0afcfcf6bcc6108250e3b4accff89e00e7de8f4d517709d1e9298
                                                                • Opcode Fuzzy Hash: 93cc6d3c32f59bb0d3866a424ed22eeeeb8d669c97e98ac0717914e792a0e722
                                                                • Instruction Fuzzy Hash: CF41D571A04258AFCB10DFA9C885A9FBBB4EF55704F1484AAF500EB351D3389D11CBA5
                                                                APIs
                                                                • SetLastError.KERNEL32(00000057,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D15F
                                                                • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D22C,?,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D19E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                • API String ID: 1452528299-1580325520
                                                                • Opcode ID: e5d6d334a763e1cbb8f1666fe6de59715d05f57489b5bab2b54e19ba110a4e8d
                                                                • Instruction ID: 7b2924e434c2d2a6e8a64b45c898520acf8211660a530507fefc98e5318dd698
                                                                • Opcode Fuzzy Hash: e5d6d334a763e1cbb8f1666fe6de59715d05f57489b5bab2b54e19ba110a4e8d
                                                                • Instruction Fuzzy Hash: C911D535A04A04AFDB31DEA1C941A9E76ADDF44306F6040777C00A2783D63C9F0AD52E
                                                                APIs
                                                                • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                • GetDC.USER32(00000000), ref: 0041BDF9
                                                                • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE20
                                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE2D
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041BE66
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CapsDeviceMetricsSystem$Release
                                                                • String ID:
                                                                • API String ID: 447804332-0
                                                                • Opcode ID: e7ae0f99dd269f353d7b7641ed485f387b8aeae4be2e5651bec5d04fa653b95a
                                                                • Instruction ID: e886330f15f7a5316131e86c26d6fb078e3572472e198ea0fe97a07bc4f3c0b5
                                                                • Opcode Fuzzy Hash: e7ae0f99dd269f353d7b7641ed485f387b8aeae4be2e5651bec5d04fa653b95a
                                                                • Instruction Fuzzy Hash: 54212A74E04748AFEB00EFA9C942BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                APIs
                                                                • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,00401B68), ref: 00401ABD
                                                                • LocalFree.KERNEL32(00708778,00000000,00401B68), ref: 00401ACF
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,00708778,00000000,00401B68), ref: 00401AEE
                                                                • LocalFree.KERNEL32(00709778,?,00000000,00008000,00708778,00000000,00401B68), ref: 00401B2D
                                                                • RtlLeaveCriticalSection.KERNEL32(0049C420,00401B6F), ref: 00401B58
                                                                • RtlDeleteCriticalSection.KERNEL32(0049C420,00401B6F), ref: 00401B62
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                • String ID:
                                                                • API String ID: 3782394904-0
                                                                • Opcode ID: 881435858a3df7288aae927e3c0e93e2fd7e3e12d101c835c3d014fcf42cc859
                                                                • Instruction ID: ece8596464e12e4b83b5bd96c0fd07c419ca8ccd111934747786d766a0fa6b25
                                                                • Opcode Fuzzy Hash: 881435858a3df7288aae927e3c0e93e2fd7e3e12d101c835c3d014fcf42cc859
                                                                • Instruction Fuzzy Hash: AC119D30B403405BEB15ABA59CE2B363BE4A765708F94007BF40067AF1D67C984087AE
                                                                APIs
                                                                • GetWindowLongA.USER32(?,000000EC), ref: 0047EBEA
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CE49), ref: 0047EC10
                                                                • GetWindowLongA.USER32(?,000000EC), ref: 0047EC20
                                                                • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047EC41
                                                                • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047EC55
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047EC71
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$Long$Show
                                                                • String ID:
                                                                • API String ID: 3609083571-0
                                                                • Opcode ID: 5cd40674e0b8a30ca8b6933e71840c0df1b24ef64ec96d3901f5dc784d2e9b41
                                                                • Instruction ID: c412bc1a630f4fb8f5d2bcb23b9cdd23b166c0171215975471963c460da52ad8
                                                                • Opcode Fuzzy Hash: 5cd40674e0b8a30ca8b6933e71840c0df1b24ef64ec96d3901f5dc784d2e9b41
                                                                • Instruction Fuzzy Hash: 13014CB6651210AFD710DB69CE85F2637D8AB0D330F0946A6B549EF2E3C228DC408B08
                                                                APIs
                                                                  • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                  • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                • String ID:
                                                                • API String ID: 3527656728-0
                                                                • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                • Instruction ID: f7789479bb42d6d63a82e92436423a6fea40f6b6a905c0023d8cad956bbacbbe
                                                                • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                • Instruction Fuzzy Hash: BAF072B56015019BDE00FFBAD9CAE4B77989F043097088457B944DF197C97DD8548B3D
                                                                APIs
                                                                  • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                • ShowWindow.USER32(?,00000005,00000000,00498699,?,?,00000000), ref: 0049846A
                                                                  • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                  • Part of subcall function 004072B8: SetCurrentDirectoryA.KERNEL32(00000000,?,00498492,00000000,00498665,?,?,00000005,00000000,00498699,?,?,00000000), ref: 004072C3
                                                                  • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,00456126,00000000,0045618E), ref: 0042D491
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                • String ID: .dat$.msg$IMsg$Uninstall
                                                                • API String ID: 3312786188-1660910688
                                                                • Opcode ID: 7b37453165c360702e9c28103bf074bd5e317765a346751ca472e497e5ab201f
                                                                • Instruction ID: 94d9a00f42835dc9211730c265b92997509a8ce46d72803125f61036d3c10121
                                                                • Opcode Fuzzy Hash: 7b37453165c360702e9c28103bf074bd5e317765a346751ca472e497e5ab201f
                                                                • Instruction Fuzzy Hash: 22315574A00114AFCB00FF69DC52D9EBBB5EB49318F51847AF810AB751DB39AD04CB58
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                                • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                • API String ID: 828529508-2866557904
                                                                • Opcode ID: d7b5e8f06d25cf2e82843ddd2a686aee5f6cfebd975f7e169ae89c51933d11b0
                                                                • Instruction ID: 8013201a01c1a3ce4b1282a4ea415291a3823007c30eea77c81bb12cf145ddb4
                                                                • Opcode Fuzzy Hash: d7b5e8f06d25cf2e82843ddd2a686aee5f6cfebd975f7e169ae89c51933d11b0
                                                                • Instruction Fuzzy Hash: 34F0C8D174066137E620A57F9C83F6B598C8F94759F140436F109E62C1D96C9905426E
                                                                APIs
                                                                • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004580D0
                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 004580F1
                                                                • CloseHandle.KERNEL32(?,00458124), ref: 00458117
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                • API String ID: 2573145106-3235461205
                                                                • Opcode ID: 373b8985a00968747dfe2970a2e28db8777affb583760887119259ad1a14c0ef
                                                                • Instruction ID: eff4a35bea7a62289d80d9c26220f44f895e3d9a2531d43f7f7dfd5bd268873c
                                                                • Opcode Fuzzy Hash: 373b8985a00968747dfe2970a2e28db8777affb583760887119259ad1a14c0ef
                                                                • Instruction Fuzzy Hash: C401A230600604AFDB10EBA98C42E2E73A8EB49755F10457ABC10E73C3EE389D059B18
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042E9D2
                                                                • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                • InterlockedExchange.KERNEL32(0049C660,00000001), ref: 0042E9E9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                • String ID: ChangeWindowMessageFilter$user32.dll
                                                                • API String ID: 3478007392-2498399450
                                                                • Opcode ID: 29e3fe99fd39411a87420eaca3bfaa87a3f8c8d91b56c7102c175830130eccb1
                                                                • Instruction ID: c49eaaa8fdb071360f38502b50e3c23bad510ecb3814e64996c12b789333cacc
                                                                • Opcode Fuzzy Hash: 29e3fe99fd39411a87420eaca3bfaa87a3f8c8d91b56c7102c175830130eccb1
                                                                • Instruction Fuzzy Hash: 78E0ECB1740314AAEA10AB62AECBF662558AB24F19F902437F101B51E2C7FC0C84C92D
                                                                APIs
                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 00477FD8
                                                                • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004780CF,0049D0A8,00000000), ref: 00477FEB
                                                                • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477FF1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                • String ID: AllowSetForegroundWindow$user32.dll
                                                                • API String ID: 1782028327-3855017861
                                                                • Opcode ID: 4365f07802c1d4a062b6a547225ad7893818e73781abac978e1d5f5c77ef267c
                                                                • Instruction ID: f8b3738cd9567d8133e7bb9c55c493c63169bafd132c11812e06eb582868bf74
                                                                • Opcode Fuzzy Hash: 4365f07802c1d4a062b6a547225ad7893818e73781abac978e1d5f5c77ef267c
                                                                • Instruction Fuzzy Hash: 92D0C7B168074165D95073B54D4EF9F225C9A4471C715C83FB548E2185DE7CD809457D
                                                                APIs
                                                                • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                • SaveDC.GDI32(?), ref: 00416C93
                                                                • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                • String ID:
                                                                • API String ID: 3808407030-0
                                                                • Opcode ID: 6e943c95b49c6f236292f7e3f4c968b2c26fc47392d5a45f7d0b8c39400a8a14
                                                                • Instruction ID: fd6e93c78d11005d9ba704e8aa7896ba8bfa997e2438936ed7ae042a7726967b
                                                                • Opcode Fuzzy Hash: 6e943c95b49c6f236292f7e3f4c968b2c26fc47392d5a45f7d0b8c39400a8a14
                                                                • Instruction Fuzzy Hash: 67411C70A04204AFDB04DB99D985FAAB7F9FF48304F1680AEE4059B362D778ED45CB58
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                APIs
                                                                • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 37c779b953a04f4a12efe840b5dae96d6b1eda754ba999e5db1c97090b84cbca
                                                                • Instruction ID: 3a43d17cedf841754d2741ff269161da15bdaac6ac028e7563c87cbc4d8d060b
                                                                • Opcode Fuzzy Hash: 37c779b953a04f4a12efe840b5dae96d6b1eda754ba999e5db1c97090b84cbca
                                                                • Instruction Fuzzy Hash: 87219D707507057AE710BB66CC82F5B76ECEB41708F94043EB541AB2D2DF78AD41861C
                                                                APIs
                                                                • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                • GetDC.USER32(00000000), ref: 0041BC22
                                                                • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC69
                                                                • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                                • String ID:
                                                                • API String ID: 1095203571-0
                                                                • Opcode ID: 6e5f92cac6927d4c8622965cf5499bf0577c4e8cc05c04df1912703be0f6a612
                                                                • Instruction ID: c69e797babd58ff3ff02391fbdd927ad6b6ed61c45feb1cc22c7e7fbd0aaf132
                                                                • Opcode Fuzzy Hash: 6e5f92cac6927d4c8622965cf5499bf0577c4e8cc05c04df1912703be0f6a612
                                                                • Instruction Fuzzy Hash: BA314F74E00209EFDB04DFA5CA41AAEB7F5EB48700F1185AAF514AB381D7789E40DB98
                                                                APIs
                                                                  • Part of subcall function 0045D0F4: SetLastError.KERNEL32(00000057,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D15F
                                                                • GetLastError.KERNEL32(00000000,00000000,00000000,00473AE8,?,?,0049D1E0,00000000), ref: 00473AA1
                                                                • GetLastError.KERNEL32(00000000,00000000,00000000,00473AE8,?,?,0049D1E0,00000000), ref: 00473AB7
                                                                Strings
                                                                • Failed to set permissions on registry key (%d)., xrefs: 00473AC8
                                                                • Could not set permissions on the registry key because it currently does not exist., xrefs: 00473AAB
                                                                • Setting permissions on registry key: %s\%s, xrefs: 00473A66
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                • API String ID: 1452528299-4018462623
                                                                • Opcode ID: 4607364518860baa8c25b99786c39b8e95e77fc7ad03eb8564835eea2eb2ed49
                                                                • Instruction ID: 0b47f7c1dfc919aadf9eca7aecddead5c0e22d63d641398338859fb193043b06
                                                                • Opcode Fuzzy Hash: 4607364518860baa8c25b99786c39b8e95e77fc7ad03eb8564835eea2eb2ed49
                                                                • Instruction Fuzzy Hash: 29219570A042445FCB10DFA9D8426EEBBE8EF49315F50817BE448E7392D7785E05CBA9
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$AllocString
                                                                • String ID:
                                                                • API String ID: 262959230-0
                                                                • Opcode ID: 353a0757e9fd9d11b623670cfd803f5b8829311614747a855f6672fd601e9639
                                                                • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                • Opcode Fuzzy Hash: 353a0757e9fd9d11b623670cfd803f5b8829311614747a855f6672fd601e9639
                                                                • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                APIs
                                                                • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                • RealizePalette.GDI32(00000000), ref: 00414431
                                                                • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414445
                                                                • RealizePalette.GDI32(00000000), ref: 0041444B
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00414456
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Palette$RealizeSelect$Release
                                                                • String ID:
                                                                • API String ID: 2261976640-0
                                                                • Opcode ID: c27572ba3b318a97157e2ff630850643e717ce291e632f808275401916b3f835
                                                                • Instruction ID: 45e707893e7549553209a356c9d37de8c9d5e61d21803148832d8e75357fff83
                                                                • Opcode Fuzzy Hash: c27572ba3b318a97157e2ff630850643e717ce291e632f808275401916b3f835
                                                                • Instruction Fuzzy Hash: 6B01D47120C3806AD600A63D8C85A9F6BEC8FC6318F05946EF584DB3C2C979C8008761
                                                                APIs
                                                                • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407013
                                                                • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040708D
                                                                • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070E5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Enum$NameOpenResourceUniversal
                                                                • String ID: Z
                                                                • API String ID: 3604996873-1505515367
                                                                • Opcode ID: 33049c7ea11c30121095e337e56ababc2e5377dae656412ba48cd4e8f0b87484
                                                                • Instruction ID: bcee853a6b72702f38c87c8f124e100014cbe8ba86cd5f63ed9636da07a90c42
                                                                • Opcode Fuzzy Hash: 33049c7ea11c30121095e337e56ababc2e5377dae656412ba48cd4e8f0b87484
                                                                • Instruction Fuzzy Hash: 1C515170E042089FDB15DF65C941A9EBBB9EF09304F1081BAE900BB3D1D778AE458F5A
                                                                APIs
                                                                • SetRectEmpty.USER32(?), ref: 0044D0C2
                                                                • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D0ED
                                                                • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D175
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DrawText$EmptyRect
                                                                • String ID:
                                                                • API String ID: 182455014-2867612384
                                                                • Opcode ID: 6196a861e208648b27b20abb2373d7b11b2b7b03d09eecf030d190a78f0ec511
                                                                • Instruction ID: 523be4b6c2791812100f8c37f9dfaf26ef338fc18bb75760613781b343a57c3a
                                                                • Opcode Fuzzy Hash: 6196a861e208648b27b20abb2373d7b11b2b7b03d09eecf030d190a78f0ec511
                                                                • Instruction Fuzzy Hash: 5E516170E00248AFEB11DFA9C885BDEBBF9BF49304F14447AE845EB252D7789944CB64
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 0042EFFE
                                                                  • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                • SelectObject.GDI32(?,00000000), ref: 0042F021
                                                                • ReleaseDC.USER32(00000000,?), ref: 0042F100
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CreateFontIndirectObjectReleaseSelect
                                                                • String ID: ...\
                                                                • API String ID: 3133960002-983595016
                                                                • Opcode ID: c0d9c5121ec3aa9e9e44613710b25e7259c00030b0a3b9e9a82ef93a81d8c198
                                                                • Instruction ID: fc9511131d6b73f8b5d25d5b58e31b0db863437dcfa52910c3569242d90b8927
                                                                • Opcode Fuzzy Hash: c0d9c5121ec3aa9e9e44613710b25e7259c00030b0a3b9e9a82ef93a81d8c198
                                                                • Instruction Fuzzy Hash: C6316370B00128ABDB11DF96D841BAEB7F8EB48704FD1447BF410A7292D7785E45CA59
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A1F
                                                                • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A2F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateFileHandle
                                                                • String ID: .tmp$_iu
                                                                • API String ID: 3498533004-10593223
                                                                • Opcode ID: 46e4244ac8577cde88a7cde4842e0d43aa75befccb9c2852c0b530efd0552fc6
                                                                • Instruction ID: b5244aac63c968e20baa0947e479141d383441796118bbd3b2ad3f6bf7aa4b2b
                                                                • Opcode Fuzzy Hash: 46e4244ac8577cde88a7cde4842e0d43aa75befccb9c2852c0b530efd0552fc6
                                                                • Instruction Fuzzy Hash: 94319770E40149ABCB01EFA5C942B9EFBB5AF44349F60447AF840B72C2D7785F058A99
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000000,00499238,00000000,004989DE,?,?,00000000,0049C628), ref: 00498958
                                                                • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00499238,00000000,004989DE,?,?,00000000,0049C628), ref: 00498981
                                                                • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0049899A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: File$Attributes$Move
                                                                • String ID: isRS-%.3u.tmp
                                                                • API String ID: 3839737484-3657609586
                                                                • Opcode ID: 481a7bc48378292d0d9514443bc536ceeed31eb1900f78afcde6c41445521250
                                                                • Instruction ID: b5053b6e7fa7181d8d55ffb0211e93ede9ed2a916a95833b3805d60610295bd2
                                                                • Opcode Fuzzy Hash: 481a7bc48378292d0d9514443bc536ceeed31eb1900f78afcde6c41445521250
                                                                • Instruction Fuzzy Hash: 1D2158B1D00159AFDF01DFA9C8819BFBBB8EB55314F11453FB414B72D1DA389E018A5A
                                                                APIs
                                                                • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                • ExitProcess.KERNEL32 ref: 00404E0D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ExitMessageProcess
                                                                • String ID: Error$Runtime error at 00000000
                                                                • API String ID: 1220098344-2970929446
                                                                • Opcode ID: d2d2115462cf46c609d5747887fa32ed032da6f71deecf4a39b0bc855ac853b0
                                                                • Instruction ID: fb75bd3449ddbba25be9859e6e9cdae11be236df4b8f13ef698ff7f8a35764cd
                                                                • Opcode Fuzzy Hash: d2d2115462cf46c609d5747887fa32ed032da6f71deecf4a39b0bc855ac853b0
                                                                • Instruction Fuzzy Hash: 5E215360B44241CBEB11ABB5ACC17263B9197E5348F048177E740B73E2C67C9D5587AE
                                                                APIs
                                                                  • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                  • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                  • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456CF8
                                                                • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456D25
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                • String ID: LoadTypeLib$RegisterTypeLib
                                                                • API String ID: 1312246647-2435364021
                                                                • Opcode ID: f0fa4eb5ebe45c922c3dc586aac30000597ac91e8294356b8a9e27c423337520
                                                                • Instruction ID: e26b8d5a5ba7491cefd4e72126217f2167f7f2a36d46249135fbb0ec9729d1e1
                                                                • Opcode Fuzzy Hash: f0fa4eb5ebe45c922c3dc586aac30000597ac91e8294356b8a9e27c423337520
                                                                • Instruction Fuzzy Hash: 55119670B00608BFDB11EFA6CD51A5EB7FDEB89705B518876F804D3652DA3C9D18CA24
                                                                APIs
                                                                • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00457216
                                                                • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 004572B3
                                                                Strings
                                                                • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00457242
                                                                • Failed to create DebugClientWnd, xrefs: 0045727C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                • API String ID: 3850602802-3720027226
                                                                • Opcode ID: 9a46964b4fb996960123dd022ea41504470fc605069612a01803a2fa065a410b
                                                                • Instruction ID: b5c581551a88cbf950d7fc36a96106bfa88ed205bfa31746cca5d2dcd4d7a39c
                                                                • Opcode Fuzzy Hash: 9a46964b4fb996960123dd022ea41504470fc605069612a01803a2fa065a410b
                                                                • Instruction Fuzzy Hash: 4A1123706082406BE710AB699C81B4F7B989B59319F04447BF984DF383D7788849CBAE
                                                                APIs
                                                                  • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                • GetFocus.USER32 ref: 00478B93
                                                                • GetKeyState.USER32(0000007A), ref: 00478BA5
                                                                • WaitMessage.USER32(?,00000000,00478BCC,?,00000000,00478BF3,?,?,00000001,00000000,?,?,00480889,00000000,004817AB), ref: 00478BAF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FocusMessageStateTextWaitWindow
                                                                • String ID: Wnd=$%x
                                                                • API String ID: 1381870634-2927251529
                                                                • Opcode ID: 56ac62ba261c13ec75de75e3b0b9d956a03bf57f73efdd15721ffc7da14054af
                                                                • Instruction ID: dc81ccc12ba5f0d8980b62dc3576adf4111e854ad11f41bc8ce465a24b65dd47
                                                                • Opcode Fuzzy Hash: 56ac62ba261c13ec75de75e3b0b9d956a03bf57f73efdd15721ffc7da14054af
                                                                • Instruction Fuzzy Hash: 3711A370644249AFCB01EF65DC45A9E7BB8EB4D314B5184BEF408E7281DB7CAE00CA69
                                                                APIs
                                                                • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E810
                                                                • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E81F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Time$File$LocalSystem
                                                                • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                • API String ID: 1748579591-1013271723
                                                                • Opcode ID: afc27b9defac450e26b0986b5fbe5a1bdb65cc68f7403b26db70cd1c163db108
                                                                • Instruction ID: 1109e0a0549d5184889796f6d95c1db6af1f7efe6b7ed272276b3322b0c95b1e
                                                                • Opcode Fuzzy Hash: afc27b9defac450e26b0986b5fbe5a1bdb65cc68f7403b26db70cd1c163db108
                                                                • Instruction Fuzzy Hash: 1111F5A440C3909ED340DF2AC44032FBAE4AB89704F44496EF9C8D7381E779C948DBA7
                                                                APIs
                                                                • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453FF7
                                                                  • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                • MoveFileA.KERNEL32(00000000,00000000), ref: 0045401C
                                                                  • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesDeleteErrorLastMove
                                                                • String ID: DeleteFile$MoveFile
                                                                • API String ID: 3024442154-139070271
                                                                • Opcode ID: e6ecb1dbfe451e73ced23eeeb408c191c9d173acb1a016d6f6abe8d636493956
                                                                • Instruction ID: 5b319f4d86c429aaf34c497ec622aa84374fa007c64af5b461aa928f93ad298c
                                                                • Opcode Fuzzy Hash: e6ecb1dbfe451e73ced23eeeb408c191c9d173acb1a016d6f6abe8d636493956
                                                                • Instruction Fuzzy Hash: 42F036742041055BEB00FBB6D95266E67ECEB8470EF60443BF900BB6C3EA3D9E49492D
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004840E9
                                                                • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0048410C
                                                                Strings
                                                                • System\CurrentControlSet\Control\Windows, xrefs: 004840B6
                                                                • CSDVersion, xrefs: 004840E0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                • API String ID: 3677997916-1910633163
                                                                • Opcode ID: 65685140ca02fb2706327ddac66f800db42a2768e9aa8789b5b6754042f4557f
                                                                • Instruction ID: 53b0cd76a008673903c9ef47d43ccdc3b5982ad8000f383f0d4d26435d6d51d8
                                                                • Opcode Fuzzy Hash: 65685140ca02fb2706327ddac66f800db42a2768e9aa8789b5b6754042f4557f
                                                                • Instruction Fuzzy Hash: ABF03175E0020AAADF10EAD08C4DB9FB3BC9B54704F104567E910E7281E678AA848B59
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459549,00000000,00459701,?,00000000,00000000,00000000), ref: 00459459
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen
                                                                • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                • API String ID: 47109696-2631785700
                                                                • Opcode ID: 9bc35a40a01a3583b8422e9b6bcfd4ee6a9440aa628c341cd1f71c05f5256aad
                                                                • Instruction ID: da45e090e08c2af83dc97eff45d409e8c8a7a5d294f3c067393b5131bf5ff8bf
                                                                • Opcode Fuzzy Hash: 9bc35a40a01a3583b8422e9b6bcfd4ee6a9440aa628c341cd1f71c05f5256aad
                                                                • Instruction Fuzzy Hash: F2F0AF31B04110ABC710AB1AD845B6E6398DBD235AF50803BF985DB253EA7CCC0B8769
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453BCE,00000000,00453C71,?,?,00000000,00000000,00000000,00000000,00000000,?,00454061,00000000), ref: 0042D91A
                                                                • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                • API String ID: 1646373207-4063490227
                                                                • Opcode ID: 668015d286dac6ed483b16a742b0e62700dc4db53c3f9f7b812670d1427f7fe3
                                                                • Instruction ID: c73f6de4eb886e968b085a6e7c7cc63e3b6fdbea6d7e209729b619e098e19142
                                                                • Opcode Fuzzy Hash: 668015d286dac6ed483b16a742b0e62700dc4db53c3f9f7b812670d1427f7fe3
                                                                • Instruction Fuzzy Hash: F9E04FE1B40B5113E710667A5C8276B158E4B84728F90443B3994E52C7DDBCD9C8566D
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                                • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                • API String ID: 1646373207-260599015
                                                                • Opcode ID: bee4edb2c449a5dfd1c01cdfe9b6f7374d179aa79d7f6a8ce8d951f478ed0695
                                                                • Instruction ID: d308361a71a1e4dc0c71eda52d15a5d5ca57c7b6b7e2bde91db1678b7815b427
                                                                • Opcode Fuzzy Hash: bee4edb2c449a5dfd1c01cdfe9b6f7374d179aa79d7f6a8ce8d951f478ed0695
                                                                • Instruction Fuzzy Hash: 8DD0A792301732626900F1F73CC1DBB0A8C89102793540077F601E1241D54DDC01156C
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004992CA), ref: 0044F7F3
                                                                • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F7F9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: NotifyWinEvent$user32.dll
                                                                • API String ID: 1646373207-597752486
                                                                • Opcode ID: c3786242a14ca03a62e3406b7bd0f53fb28c80e98e7c47f23881a3d4f16b908f
                                                                • Instruction ID: b1e2d04df43b1f620e0cf6c091983f233af54cc0e24e64f5668f936ad46d7efe
                                                                • Opcode Fuzzy Hash: c3786242a14ca03a62e3406b7bd0f53fb28c80e98e7c47f23881a3d4f16b908f
                                                                • Instruction Fuzzy Hash: 6BE012F0A417469EEB00BBF5998671A3AA0E75431CF51007BB1006A192CB7C44184F6E
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00499320,00000001,00000000,00499344), ref: 0049904A
                                                                • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00499050
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                • API String ID: 1646373207-834958232
                                                                • Opcode ID: 646b07dbd550e4abdd546bdc612ddcefe778f12448e39103c2641131bf94b29c
                                                                • Instruction ID: 7509a849a1c86b60682be4b60143d7a07ed98817b3ed87241ead2d9b7982c41a
                                                                • Opcode Fuzzy Hash: 646b07dbd550e4abdd546bdc612ddcefe778f12448e39103c2641131bf94b29c
                                                                • Instruction Fuzzy Hash: 45B09280280611909C9032BB0D02A1B0E084881728718003F3560B01CACE6D8C04543E
                                                                APIs
                                                                  • Part of subcall function 0044B6CC: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F7E9,004992CA), ref: 0044B6F3
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B70B
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B71D
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B72F
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B741
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B753
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B765
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B777
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B789
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B79B
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B7AD
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B7BF
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B7D1
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B7E3
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B7F5
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B807
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B819
                                                                  • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B82B
                                                                • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004992F2), ref: 004646AB
                                                                • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 004646B1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$LibraryLoad
                                                                • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                • API String ID: 2238633743-2683653824
                                                                • Opcode ID: f4442e2486f2b5e46a00971faa36ed1fd0fe9bdb0abc79278919a1fdde299c0b
                                                                • Instruction ID: 4b5030ed4f607149f6cd51c097547c25e56dbab9a2da70309a95c4064c32834c
                                                                • Opcode Fuzzy Hash: f4442e2486f2b5e46a00971faa36ed1fd0fe9bdb0abc79278919a1fdde299c0b
                                                                • Instruction Fuzzy Hash: A4B092E0A81641698D0077B2980790F289489A1B1CB14003F304076097EABC88100E5E
                                                                APIs
                                                                • FindNextFileA.KERNEL32(000000FF,?,00000000,0047DC74,?,?,?,?,00000000,0047DDC9,?,?,?,00000000,?,0047DED8), ref: 0047DC50
                                                                • FindClose.KERNEL32(000000FF,0047DC7B,0047DC74,?,?,?,?,00000000,0047DDC9,?,?,?,00000000,?,0047DED8,00000000), ref: 0047DC6E
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileNext
                                                                • String ID:
                                                                • API String ID: 2066263336-0
                                                                • Opcode ID: 626af9ae0c7025ae86db110923e2d8978f3bc9f77e1149f66e2b87a215601fbe
                                                                • Instruction ID: 1e82c9b5cfa583a005eddcd7dd146139acf465dd78b3df19642706576ae0a9c6
                                                                • Opcode Fuzzy Hash: 626af9ae0c7025ae86db110923e2d8978f3bc9f77e1149f66e2b87a215601fbe
                                                                • Instruction Fuzzy Hash: F7814D70D0424DAFCF21DFA5CC41ADFBBB9EF49304F1080AAE808A7291D6399A46CF54
                                                                APIs
                                                                  • Part of subcall function 0042EE90: GetTickCount.KERNEL32 ref: 0042EE96
                                                                  • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                                • GetLastError.KERNEL32(00000000,00475B5D,?,?,0049D1E0,00000000), ref: 00475A46
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CountErrorFileLastMoveTick
                                                                • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                • API String ID: 2406187244-2685451598
                                                                • Opcode ID: c878e2b260635a45c22eeefe28caae59b2858879bbd4b6a869ed194eac20e83d
                                                                • Instruction ID: a9db3c141a3770340595dd3a0637540d48bb3c3777a437ddbd25d3dfc602479e
                                                                • Opcode Fuzzy Hash: c878e2b260635a45c22eeefe28caae59b2858879bbd4b6a869ed194eac20e83d
                                                                • Instruction Fuzzy Hash: 85415871E006099FCB10EF65D882AEE77B4EF44314F508537E414BB351D778AA058BAD
                                                                APIs
                                                                • GetDesktopWindow.USER32 ref: 00413D56
                                                                • GetDesktopWindow.USER32 ref: 00413E0E
                                                                  • Part of subcall function 00418ED0: 6FA0C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049C628), ref: 00418EEC
                                                                  • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049C628), ref: 00418F09
                                                                • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CursorDesktopWindow$Show
                                                                • String ID:
                                                                • API String ID: 2074268717-0
                                                                • Opcode ID: c82077e875ceebfb446ca8bdba497cc44f2f016adda31143cf8d95e20cbb1c8e
                                                                • Instruction ID: a5e00dcc6fd9115ed5a77459d70fea990a5215d510f46849e0ce2877443e0a13
                                                                • Opcode Fuzzy Hash: c82077e875ceebfb446ca8bdba497cc44f2f016adda31143cf8d95e20cbb1c8e
                                                                • Instruction Fuzzy Hash: CA413771600260EFC714EF29E9C4B9677E1AB69325F16807BE404DB366DA38BD81CF58
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A85
                                                                • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AF4
                                                                • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B8F
                                                                • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BCE
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: LoadString$FileMessageModuleName
                                                                • String ID:
                                                                • API String ID: 704749118-0
                                                                • Opcode ID: 2478aacc1cc0604c87cef9c23ce28a73e3b8baee1560f3a98c189eb7686d3011
                                                                • Instruction ID: c07fd310ac7ce6f4f6bdd3d287b746ce8d52192ab59c667046e5b60d4d48b312
                                                                • Opcode Fuzzy Hash: 2478aacc1cc0604c87cef9c23ce28a73e3b8baee1560f3a98c189eb7686d3011
                                                                • Instruction Fuzzy Hash: 0E3134716083849BD730EB65C945BDBB7E8AB85704F40483FB6C8DB2D1EB7859048B6B
                                                                APIs
                                                                • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E981
                                                                  • Part of subcall function 0044CFC4: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CFF6
                                                                • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044EA05
                                                                  • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                • IsRectEmpty.USER32(?), ref: 0044E9C7
                                                                • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E9EA
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                • String ID:
                                                                • API String ID: 855768636-0
                                                                • Opcode ID: be830068c3edf1c95023cfeceac366b6905f068659723eff49c6974a0b69c569
                                                                • Instruction ID: 77b7b7799a66ce86f667cf0b036ff1ab111c9581c09ca9d8f795578908ad38d2
                                                                • Opcode Fuzzy Hash: be830068c3edf1c95023cfeceac366b6905f068659723eff49c6974a0b69c569
                                                                • Instruction Fuzzy Hash: 36118C72B0034027E610BA3E8C86B5B66C99B88708F14083FB605EB3C7DE7CDC094399
                                                                APIs
                                                                • OffsetRect.USER32(?,?,00000000), ref: 00496060
                                                                • OffsetRect.USER32(?,00000000,?), ref: 0049607B
                                                                • OffsetRect.USER32(?,?,00000000), ref: 00496095
                                                                • OffsetRect.USER32(?,00000000,?), ref: 004960B0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: OffsetRect
                                                                • String ID:
                                                                • API String ID: 177026234-0
                                                                • Opcode ID: a5b10c5c05c4c4c8690ebf0e0d14455fb01428b86b9d3b295170541a370ec2ec
                                                                • Instruction ID: 8eac29a9a723dba05d0f501e7f7c311a2f3b3ed3193ada35ebb1b3014bd25ec0
                                                                • Opcode Fuzzy Hash: a5b10c5c05c4c4c8690ebf0e0d14455fb01428b86b9d3b295170541a370ec2ec
                                                                • Instruction Fuzzy Hash: F6215EB6700201ABCB00DE69CDC5E6BB7EEEBD4344F15CA2AF548C7389D634E9448796
                                                                APIs
                                                                • GetCursorPos.USER32 ref: 00417270
                                                                • SetCursor.USER32(00000000), ref: 004172B3
                                                                • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                • String ID:
                                                                • API String ID: 1959210111-0
                                                                • Opcode ID: e1b8292847e1495943439bfb526301e98f20bb6a1a323b8f65a3f0d30a7d056b
                                                                • Instruction ID: a3ca0b5fbe6c86dc8433d056dfe209cecf977414c0e936569190c1b416abce34
                                                                • Opcode Fuzzy Hash: e1b8292847e1495943439bfb526301e98f20bb6a1a323b8f65a3f0d30a7d056b
                                                                • Instruction Fuzzy Hash: 7F2180713086018BC720AF69D885ADB73B1AB48764B4545ABF855CB352D73DDC82CB49
                                                                APIs
                                                                • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00495CC9
                                                                • MulDiv.KERNEL32(50142444,00000008,?), ref: 00495CDD
                                                                • MulDiv.KERNEL32(F6F86FE8,00000008,?), ref: 00495CF1
                                                                • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495D0F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                • Instruction ID: f271e463c2a04687a7cd3b1fed15c38c3ae6b45cd4ce19c79766351c2a45cab8
                                                                • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                • Instruction Fuzzy Hash: 78112172604604AFCB40EFA9C8C4D9B7BECEF4D320B24416AFD19DB246D634ED408BA4
                                                                APIs
                                                                • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                • RegisterClassA.USER32(0049A598), ref: 0041F4E4
                                                                • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                • String ID:
                                                                • API String ID: 4025006896-0
                                                                • Opcode ID: addb09ff65e61b4ab79862f1b46c03334788ef9ad2dee25ca039f4a55a54238f
                                                                • Instruction ID: bc278c4f6faf11cefbb7876bdabff60d814ef9460a0beef0b041e337848a6ca8
                                                                • Opcode Fuzzy Hash: addb09ff65e61b4ab79862f1b46c03334788ef9ad2dee25ca039f4a55a54238f
                                                                • Instruction Fuzzy Hash: BB014071300104BBCB10EBA9ED81E9B779C9719314F51423BB505E72E2D6399C158BBD
                                                                APIs
                                                                • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D037
                                                                • LoadResource.KERNEL32(00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?,?,0047CFDC,0000000A,00000000), ref: 0040D051
                                                                • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?,?,0047CFDC), ref: 0040D06B
                                                                • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?), ref: 0040D075
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Resource$FindLoadLockSizeof
                                                                • String ID:
                                                                • API String ID: 3473537107-0
                                                                • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                • Instruction ID: 36a118f2821a5a72c918f59cdb85223c1d13502428e6f53becfecf356bbc3684
                                                                • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                • Instruction Fuzzy Hash: ECF062B36055046F9B04EFADA881D5B77DCDE88364310017FF908E7282DA39DD118B78
                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000), ref: 004707E9
                                                                Strings
                                                                • Failed to set NTFS compression state (%d)., xrefs: 004707FA
                                                                • Setting NTFS compression on file: %s, xrefs: 004707B7
                                                                • Unsetting NTFS compression on file: %s, xrefs: 004707CF
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                • API String ID: 1452528299-3038984924
                                                                • Opcode ID: 0da083cedf78d204021f0c22f46e9404a6a0d1fca2abd04a8242647f3c87b887
                                                                • Instruction ID: 145c5581ad0eca4b083c726d4b350626947fd7e4083fb75601c5580ae1b156b2
                                                                • Opcode Fuzzy Hash: 0da083cedf78d204021f0c22f46e9404a6a0d1fca2abd04a8242647f3c87b887
                                                                • Instruction Fuzzy Hash: 38016C31D0D148A9CB04D7ED60416DDBFA89F09304F45C5EFA459D7282D7B915088BDA
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B856,?,?,?,?,?,00000000,0045B87D), ref: 00455E80
                                                                • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B856,?,?,?,?,?,00000000), ref: 00455E89
                                                                • RemoveFontResourceA.GDI32(00000000), ref: 00455E96
                                                                • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455EAA
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                • String ID:
                                                                • API String ID: 4283692357-0
                                                                • Opcode ID: d198827404060030b3dfc17e22509fcb3a77ecf8fff02d6a53b0f294283eb161
                                                                • Instruction ID: 2b3bc76bcbe24f9a378c9fd2a9d0a5bd871778c5a23a50a9ca37bd21dd0b5b9e
                                                                • Opcode Fuzzy Hash: d198827404060030b3dfc17e22509fcb3a77ecf8fff02d6a53b0f294283eb161
                                                                • Instruction Fuzzy Hash: C2F030B574470176EA10B7B69C47F1B228C8B54745F14483ABA00EB2C3D97CD904966D
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,00000000), ref: 0047003D
                                                                Strings
                                                                • Failed to set NTFS compression state (%d)., xrefs: 0047004E
                                                                • Unsetting NTFS compression on directory: %s, xrefs: 00470023
                                                                • Setting NTFS compression on directory: %s, xrefs: 0047000B
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                • API String ID: 1452528299-1392080489
                                                                • Opcode ID: 501c20c4b4589d314784abe810e87fd7af79d86b38d8ef254cb346fbb93d82bb
                                                                • Instruction ID: 604d54a06cc176a09f793a0f1904e0e91a55842988fe096117b9dad4a0540a88
                                                                • Opcode Fuzzy Hash: 501c20c4b4589d314784abe810e87fd7af79d86b38d8ef254cb346fbb93d82bb
                                                                • Instruction Fuzzy Hash: 96011731D0D288A6CB04D7AD70417DDBFB49F49314F44C1EFA459E7282DB790909879A
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CountSleepTick
                                                                • String ID:
                                                                • API String ID: 2227064392-0
                                                                • Opcode ID: 9d8c620ac145a49ef357bc67e7af840132a63e2ed6bee5855d7efcfcc9ec2cde
                                                                • Instruction ID: ce153dc38a8bb7651996ca8f0dac3f9c26bc2c6ac7669c34f37b685d31f90408
                                                                • Opcode Fuzzy Hash: 9d8c620ac145a49ef357bc67e7af840132a63e2ed6bee5855d7efcfcc9ec2cde
                                                                • Instruction Fuzzy Hash: D1E0E562B59140658A2431FE18C25BF85A8CECA364B18867FE4C9D6243CC5D8C0786BF
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000008,?,?,00000001,00000000,00000002,00000000,004817AB,?,?,?,?,?,004993B3,00000000,004993DB), ref: 00478649
                                                                • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB,?,?,?,?,?,004993B3,00000000), ref: 0047864F
                                                                • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 00478671
                                                                • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 00478682
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                • String ID:
                                                                • API String ID: 215268677-0
                                                                • Opcode ID: 897cebff796fb9acf24ada6806b428e4bae0fdb6bab1f730a63c16ba700ca759
                                                                • Instruction ID: 838b6a51ddc7838befbc46fdc110c266dd1fb76be3e125ebbed13216a87d498a
                                                                • Opcode Fuzzy Hash: 897cebff796fb9acf24ada6806b428e4bae0fdb6bab1f730a63c16ba700ca759
                                                                • Instruction Fuzzy Hash: 8CF01CB16443007BD600EAA58C82A9B72DCEB44754F04883E7A98CB2D1DA79D808AB66
                                                                APIs
                                                                • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                • IsWindowVisible.USER32(?), ref: 0042426D
                                                                • IsWindowEnabled.USER32(?), ref: 00424277
                                                                • SetForegroundWindow.USER32(?), ref: 00424281
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                • String ID:
                                                                • API String ID: 2280970139-0
                                                                • Opcode ID: 0c1e0aa051013007664b3f07c8d487170f49f724953434a4891b7e2a8b6b14ea
                                                                • Instruction ID: 2755c926dfb62d6ecb2d5c8fb2e1e882bb3f56b09ddc897a1aa573e645a4fcd2
                                                                • Opcode Fuzzy Hash: 0c1e0aa051013007664b3f07c8d487170f49f724953434a4891b7e2a8b6b14ea
                                                                • Instruction Fuzzy Hash: 99E0EC61B0257196AAB1EA7B2881A9F118CDD46BE434602A7FD41F7287DB2CDC1045BD
                                                                APIs
                                                                • GlobalHandle.KERNEL32 ref: 0040627F
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00406286
                                                                • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040628B
                                                                • GlobalLock.KERNEL32(00000000), ref: 00406291
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocHandleLockUnlock
                                                                • String ID:
                                                                • API String ID: 2167344118-0
                                                                • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                • Instruction ID: 024a49765fc045a09389489d8ed5919b86daafa6bea6a005e9f609907830066e
                                                                • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                • Instruction Fuzzy Hash: 64B009C6925A46B8EC0473B24C4BD3F041CE88472C3809A6E7554BA0839C7C9C002E3A
                                                                APIs
                                                                • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BF85,?,00000000,00000000,00000001,00000000,0047A939,?,00000000), ref: 0047A8FD
                                                                Strings
                                                                • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A771
                                                                • Failed to parse "reg" constant, xrefs: 0047A904
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Close
                                                                • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                • API String ID: 3535843008-1938159461
                                                                • Opcode ID: 731d09dfe04126c7ce286a995487c84b6acd3a7555e11f1b87038d18dfc9fa91
                                                                • Instruction ID: ad7b2ad32a4e046eb061743552de15717f644d650d615c3b0b0b82a4ca8416c6
                                                                • Opcode Fuzzy Hash: 731d09dfe04126c7ce286a995487c84b6acd3a7555e11f1b87038d18dfc9fa91
                                                                • Instruction Fuzzy Hash: D78182B4E00148AFCB11EF95C481ADEBBF9AF88344F10856AE814B7391D738DE15CB99
                                                                APIs
                                                                • GetForegroundWindow.USER32(00000000,00483BFA,?,00000000,00483C3B,?,?,?,?,00000000,00000000,00000000,?,0046BE99), ref: 00483AA9
                                                                • SetActiveWindow.USER32(?,00000000,00483BFA,?,00000000,00483C3B,?,?,?,?,00000000,00000000,00000000,?,0046BE99), ref: 00483ABB
                                                                Strings
                                                                • Will not restart Windows automatically., xrefs: 00483BDA
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window$ActiveForeground
                                                                • String ID: Will not restart Windows automatically.
                                                                • API String ID: 307657957-4169339592
                                                                • Opcode ID: fd112b4c8de44069fed4ab784b6429e18bede020499d5fe5eba8df49eb47ae3b
                                                                • Instruction ID: 00c250453c0a17a9e15f8b7c17bf5d610a6a62ae57f998986b3a61a72a87f8d4
                                                                • Opcode Fuzzy Hash: fd112b4c8de44069fed4ab784b6429e18bede020499d5fe5eba8df49eb47ae3b
                                                                • Instruction Fuzzy Hash: 79411270A04280AEDB11FF25DC56BAD7BE4AB14B09F140C7BE8405B3A3C27D7A45971E
                                                                APIs
                                                                • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,0047691B,?,00000000,0047692C,?,00000000,00476975), ref: 004768EC
                                                                • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,0047691B,?,00000000,0047692C,?,00000000,00476975), ref: 00476900
                                                                Strings
                                                                • Extracting temporary file: , xrefs: 00476828
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: FileTime$Local
                                                                • String ID: Extracting temporary file:
                                                                • API String ID: 791338737-4171118009
                                                                • Opcode ID: 8bb9d3133b1fb9ec8af2f49f23ff7fadb73ae79880f698f59a04eeed571ff557
                                                                • Instruction ID: d70a0822c1878ba5cc3cea7231243a1bdea1af23cb32f526b41bd2dcbb3c8472
                                                                • Opcode Fuzzy Hash: 8bb9d3133b1fb9ec8af2f49f23ff7fadb73ae79880f698f59a04eeed571ff557
                                                                • Instruction Fuzzy Hash: 5D41CB70E00649AFCB01EFA5C891ADFBBB9EF09304F51847AF914A7391D7789905CB54
                                                                Strings
                                                                • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CE38
                                                                • Failed to proceed to next wizard page; aborting., xrefs: 0046CE24
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                • API String ID: 0-1974262853
                                                                • Opcode ID: bd600112513020f620d7d4569e21eaae9941e9eb8c4aa750224beaba235140ee
                                                                • Instruction ID: b126ef70070b574b462b5ad6e8f6b62ab94db58f07a08aa979416f05a1434e77
                                                                • Opcode Fuzzy Hash: bd600112513020f620d7d4569e21eaae9941e9eb8c4aa750224beaba235140ee
                                                                • Instruction Fuzzy Hash: 5931A2306042009FD711EB59D989BA97BF9AB05304F6500BBF448AB3A2D778AE44DB59
                                                                APIs
                                                                  • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                • RegCloseKey.ADVAPI32(?,004793BA,?,?,00000001,00000000,00000000,004793D5), ref: 004793A3
                                                                Strings
                                                                • %s\%s_is1, xrefs: 0047934C
                                                                • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047932E
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen
                                                                • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                • API String ID: 47109696-1598650737
                                                                • Opcode ID: 3354c75471e71dfe397ad959b7ebf057644b34f0928cd67ef0d370c48c0a0807
                                                                • Instruction ID: 81948899c858854939f702104da2ecae25413b277659753d1c8da10ae03f2604
                                                                • Opcode Fuzzy Hash: 3354c75471e71dfe397ad959b7ebf057644b34f0928cd67ef0d370c48c0a0807
                                                                • Instruction Fuzzy Hash: 7E216174A046446FDB11DFA9CC51AAEBBF8EB4D704F90847AE808E7381D7789D018B99
                                                                APIs
                                                                • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 00450271
                                                                • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004502A2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ExecuteMessageSendShell
                                                                • String ID: open
                                                                • API String ID: 812272486-2758837156
                                                                • Opcode ID: 1d47999e67842d91bbdff3080109e9f99b92e08493ad044d5529b9a4f90a2308
                                                                • Instruction ID: 579e8a969fc791085b17213fdcb8cb543336c6f56b5ff41e9c914d75dd94f84d
                                                                • Opcode Fuzzy Hash: 1d47999e67842d91bbdff3080109e9f99b92e08493ad044d5529b9a4f90a2308
                                                                • Instruction Fuzzy Hash: 9D215174A00204AFDB04DFA5CC85B9EB7F9EB44705F2085BAB404E7292DB789E45CA48
                                                                APIs
                                                                • ShellExecuteEx.SHELL32(0000003C), ref: 004553A0
                                                                • GetLastError.KERNEL32(0000003C,00000000,004553E9,?,?,00000001,00000001), ref: 004553B1
                                                                  • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DirectoryErrorExecuteLastShellSystem
                                                                • String ID: <
                                                                • API String ID: 893404051-4251816714
                                                                • Opcode ID: afd5839f8e658dd33c6cf15c07b37cc62197e7a91b642cac2381ff1ff0064e27
                                                                • Instruction ID: 1baeac92009e3f48d7e72975e94fd539b808c95e86e95f0c8891d74cc8928d66
                                                                • Opcode Fuzzy Hash: afd5839f8e658dd33c6cf15c07b37cc62197e7a91b642cac2381ff1ff0064e27
                                                                • Instruction Fuzzy Hash: 51213570A04649AFDB10DF65D8926AE7BF8AF08355F90403BFC44E7381D7789E498B98
                                                                APIs
                                                                • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,)), ref: 004025C7
                                                                • RtlLeaveCriticalSection.KERNEL32(0049C420,0040263D), ref: 00402630
                                                                  • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                  • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                  • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                  • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,0049C460,00000000,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                • String ID: )
                                                                • API String ID: 2227675388-1084416617
                                                                • Opcode ID: 94eed0a9be2c3ee170c705f4af63db45f02aa9b7064399c91cb7111f76640db2
                                                                • Instruction ID: 1fa17fb08616f6b4eef2bbe9ac14d29337f111a30cd6b0cffb698505e2c33406
                                                                • Opcode Fuzzy Hash: 94eed0a9be2c3ee170c705f4af63db45f02aa9b7064399c91cb7111f76640db2
                                                                • Instruction Fuzzy Hash: A21134307042006FEB10AB795F6A62A6AD4D795358B60087FF404F32D2D9BD8C02825C
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00497241
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Window
                                                                • String ID: /INITPROCWND=$%x $@
                                                                • API String ID: 2353593579-4169826103
                                                                • Opcode ID: 5a103d45b4538b44b7d3fd145df9eaa2b16f7591657a5688a99aa9ff68a700bd
                                                                • Instruction ID: 05f588258c78c5b50029c9c11ed11213d1445aaa1ba567bca7741b432d444d98
                                                                • Opcode Fuzzy Hash: 5a103d45b4538b44b7d3fd145df9eaa2b16f7591657a5688a99aa9ff68a700bd
                                                                • Instruction Fuzzy Hash: A611A571A282089FDB01DBA5D851FAEBBE8EB48314F5084BBF904E7291D63C9905CB5C
                                                                APIs
                                                                  • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                  • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                • SysFreeString.OLEAUT32(?), ref: 0044753A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: String$AllocByteCharFreeMultiWide
                                                                • String ID: NIL Interface Exception$Unknown Method
                                                                • API String ID: 3952431833-1023667238
                                                                • Opcode ID: b5b3b2027cd9392a30aef52b357f29023a93b6cb0369269594e46825eb3d0212
                                                                • Instruction ID: e21740dd19ee0d3aaa7bf219fd9fa850e2e2e771d5dc584e192d83827b059975
                                                                • Opcode Fuzzy Hash: b5b3b2027cd9392a30aef52b357f29023a93b6cb0369269594e46825eb3d0212
                                                                • Instruction Fuzzy Hash: 9211E930A04204AFEB00DFA59D42A6EBBBCEB49704F51447AF500EB681DB789D00CB69
                                                                APIs
                                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496B40,?,00496B34,00000000,00496B1B), ref: 00496AE6
                                                                • CloseHandle.KERNEL32(00496B80,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496B40,?,00496B34,00000000), ref: 00496AFD
                                                                  • Part of subcall function 004969D0: GetLastError.KERNEL32(00000000,00496A68,?,?,?,?), ref: 004969F4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateErrorHandleLastProcess
                                                                • String ID: D
                                                                • API String ID: 3798668922-2746444292
                                                                • Opcode ID: 8c076d8b975d6b314500e760c1b31ec559303ffe873c3baf39058a33e9a74c9f
                                                                • Instruction ID: 4578fedeb831857a9fa7b324a6e48fa42854d3e5b1879a7f0481b0c617fb48be
                                                                • Opcode Fuzzy Hash: 8c076d8b975d6b314500e760c1b31ec559303ffe873c3baf39058a33e9a74c9f
                                                                • Instruction Fuzzy Hash: 050165B1644148AFDF00DBD6CC92F9F7BACDF49714F52407BB504E7281E6789E058619
                                                                APIs
                                                                • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                                • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Value$EnumQuery
                                                                • String ID: Inno Setup: No Icons
                                                                • API String ID: 1576479698-2016326496
                                                                • Opcode ID: 8eee03c1fbfc328194d38fab97817ecd3167584576368d321fe403edd0428e5d
                                                                • Instruction ID: 8a75d463627faac0db3bfd1327658b2d26d196a72fd2cd26e512c66f67a8876f
                                                                • Opcode Fuzzy Hash: 8eee03c1fbfc328194d38fab97817ecd3167584576368d321fe403edd0428e5d
                                                                • Instruction Fuzzy Hash: E0012B36F5A77079F73046216D02BBB56888B82B60F68053BF940EA2C0D6589C04D36E
                                                                APIs
                                                                • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452F5D,?,?,-00000001,?), ref: 00452F37
                                                                • GetLastError.KERNEL32(00000000,?,00000000,00452F5D,?,?,-00000001,?), ref: 00452F3F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: AttributesErrorFileLast
                                                                • String ID: 8)H
                                                                • API String ID: 1799206407-3916970867
                                                                • Opcode ID: ce74d8d9d820f7af3c63aa287241caff3d4e0ddf2f4ddb2ef23d86c57fabe815
                                                                • Instruction ID: dde47f3407bff09e6a38a0e499abe30f06c7602c99efaa7623f496abef129164
                                                                • Opcode Fuzzy Hash: ce74d8d9d820f7af3c63aa287241caff3d4e0ddf2f4ddb2ef23d86c57fabe815
                                                                • Instruction Fuzzy Hash: DAF0F972A04204BBCB00DB76AD4149EF7FCDB4A721710457BFC04D3342E6B85E089598
                                                                APIs
                                                                  • Part of subcall function 0045568C: GetCurrentProcess.KERNEL32(00000028), ref: 0045569B
                                                                  • Part of subcall function 0045568C: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004556A1
                                                                • SetForegroundWindow.USER32(?), ref: 00497F6E
                                                                Strings
                                                                • Restarting Windows., xrefs: 00497F4B
                                                                • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497F99
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                • API String ID: 3179053593-4147564754
                                                                • Opcode ID: a5cc7a903ad3542029bb0d77cfbe7a364602ca208a9d9cbdfb1bf1aa9e376992
                                                                • Instruction ID: 4b66e7a5e74ecb784a5d921af265fbc31bf072fcbe68812fd41d72e60711739e
                                                                • Opcode Fuzzy Hash: a5cc7a903ad3542029bb0d77cfbe7a364602ca208a9d9cbdfb1bf1aa9e376992
                                                                • Instruction Fuzzy Hash: 1C0188706182409BEB05E765E441B9D3FD99F95309F50807BF404772D3C67D9D49872D
                                                                APIs
                                                                • DeleteFileA.KERNEL32(00000000,00000000,004529D9,?,-00000001,?), ref: 004529B3
                                                                • GetLastError.KERNEL32(00000000,00000000,004529D9,?,-00000001,?), ref: 004529BB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DeleteErrorFileLast
                                                                • String ID: 8)H
                                                                • API String ID: 2018770650-3916970867
                                                                • Opcode ID: 2bffeee8909a74cd18c2d876bd05f5b8a9f89f7c78f30e1aeb97f13d0a4fc114
                                                                • Instruction ID: 616889b774c7d0a889357a9a25b6211c9f917d25ccf9d7241b8d0611c73475d1
                                                                • Opcode Fuzzy Hash: 2bffeee8909a74cd18c2d876bd05f5b8a9f89f7c78f30e1aeb97f13d0a4fc114
                                                                • Instruction Fuzzy Hash: 6CF0C8B1B04708ABDB00EF759D4249EB7ECDB4A315B5045B7FC04E3742E6785E148598
                                                                APIs
                                                                • RemoveDirectoryA.KERNEL32(00000000,00000000,00452EE1,?,-00000001,00000000), ref: 00452EBB
                                                                • GetLastError.KERNEL32(00000000,00000000,00452EE1,?,-00000001,00000000), ref: 00452EC3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: DirectoryErrorLastRemove
                                                                • String ID: 8)H
                                                                • API String ID: 377330604-3916970867
                                                                • Opcode ID: 13593e553e6be281e96d7bb953d56a5927f6c498d227b46fc847c2a148732c0c
                                                                • Instruction ID: c7bdba2715fb66454707c14724f72c320a39a9c6e4158119f2851cf94b52ae50
                                                                • Opcode Fuzzy Hash: 13593e553e6be281e96d7bb953d56a5927f6c498d227b46fc847c2a148732c0c
                                                                • Instruction Fuzzy Hash: F2F0C871A04708ABCB00DFB59D4249EB7E8EB4E31575049B7FC04E7642E7785E049558
                                                                APIs
                                                                  • Part of subcall function 0047D550: FreeLibrary.KERNEL32(74A90000,00481F13), ref: 0047D566
                                                                  • Part of subcall function 0047D220: GetTickCount.KERNEL32 ref: 0047D26A
                                                                  • Part of subcall function 0045733C: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 0045735B
                                                                • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,00499033), ref: 00498731
                                                                • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,00499033), ref: 00498737
                                                                Strings
                                                                • Detected restart. Removing temporary directory., xrefs: 004986EB
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                • String ID: Detected restart. Removing temporary directory.
                                                                • API String ID: 1717587489-3199836293
                                                                • Opcode ID: dacc005acb48f2c9a6c17312f31363653640754999933287209c5bc8a26dcf54
                                                                • Instruction ID: 1f2dec6c19a68f67b40637f6c2d8dd05bc5c387ef6d5d21522d9e9d16f9083c3
                                                                • Opcode Fuzzy Hash: dacc005acb48f2c9a6c17312f31363653640754999933287209c5bc8a26dcf54
                                                                • Instruction Fuzzy Hash: 91E0A0716086402ADA0277AA7C1296B3B5CDB46768B6144BFF80491A52E92C4811C67D
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.3370500846.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000001.00000002.3370354443.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370687561.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370710740.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370737326.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                • Associated: 00000001.00000002.3370816427.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_400000_stail.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastSleep
                                                                • String ID:
                                                                • API String ID: 1458359878-0
                                                                • Opcode ID: 648dda9fcfa3be0796cf1e21ca424cd02d6c478e8aba2200b071bc3282ec43fd
                                                                • Instruction ID: c9025c94a886fb5f76285139ad04fc7cdabfdd445e85fa9ce07bcd72d8186167
                                                                • Opcode Fuzzy Hash: 648dda9fcfa3be0796cf1e21ca424cd02d6c478e8aba2200b071bc3282ec43fd
                                                                • Instruction Fuzzy Hash: 0FF0B472B00914E74F20A5AAA99197F678CEA9D376F10852BFC04D7307C53DDD098AED

                                                                Execution Graph

                                                                Execution Coverage:3.4%
                                                                Dynamic/Decrypted Code Coverage:76.9%
                                                                Signature Coverage:9.7%
                                                                Total number of Nodes:1349
                                                                Total number of Limit Nodes:35
                                                                execution_graph 19156 402e80 GetVersion 19180 403fc4 HeapCreate 19156->19180 19158 402edf 19159 402ee4 19158->19159 19160 402eec 19158->19160 19255 402f9b 19159->19255 19192 403ca4 19160->19192 19164 402ef4 GetCommandLineA 19206 403b72 19164->19206 19168 402f0e 19238 40386c 19168->19238 19170 402f13 19171 402f18 GetStartupInfoA 19170->19171 19251 403814 19171->19251 19173 402f2a GetModuleHandleA 19175 402f4e 19173->19175 19261 4035bb 19175->19261 19181 403fe4 19180->19181 19182 40401a 19180->19182 19268 403e7c 19181->19268 19182->19158 19185 404000 19188 40401d 19185->19188 19282 404bec 19185->19282 19186 403ff3 19280 40439b HeapAlloc 19186->19280 19188->19158 19189 403ffd 19189->19188 19191 40400e HeapDestroy 19189->19191 19191->19182 19345 402fbf 19192->19345 19195 403cc3 GetStartupInfoA 19198 403d0f 19195->19198 19199 403dd4 19195->19199 19198->19199 19202 402fbf 12 API calls 19198->19202 19204 403d80 19198->19204 19200 403dfb GetStdHandle 19199->19200 19201 403e3b SetHandleCount 19199->19201 19200->19199 19203 403e09 GetFileType 19200->19203 19201->19164 19202->19198 19203->19199 19204->19199 19205 403da2 GetFileType 19204->19205 19205->19204 19207 403bc0 19206->19207 19208 403b8d GetEnvironmentStringsW 19206->19208 19210 403b95 19207->19210 19211 403bb1 19207->19211 19209 403ba1 GetEnvironmentStrings 19208->19209 19208->19210 19209->19211 19212 402f04 19209->19212 19213 403bd9 WideCharToMultiByte 19210->19213 19214 403bcd GetEnvironmentStringsW 19210->19214 19211->19212 19216 403c53 GetEnvironmentStrings 19211->19216 19217 403c5f 19211->19217 19229 403925 19212->19229 19218 403c0d 19213->19218 19219 403c3f FreeEnvironmentStringsW 19213->19219 19214->19212 19214->19213 19216->19212 19216->19217 19220 402fbf 12 API calls 19217->19220 19221 402fbf 12 API calls 19218->19221 19219->19212 19226 403c7a 19220->19226 19222 403c13 19221->19222 19222->19219 19223 403c1c WideCharToMultiByte 19222->19223 19225 403c2d 19223->19225 19228 403c36 19223->19228 19224 403c90 FreeEnvironmentStringsA 19224->19212 19411 403071 19225->19411 19226->19224 19228->19219 19230 403937 19229->19230 19231 40393c GetModuleFileNameA 19229->19231 19441 406184 19230->19441 19233 40395f 19231->19233 19234 402fbf 12 API calls 19233->19234 19235 403980 19234->19235 19236 402f76 7 API calls 19235->19236 19237 403990 19235->19237 19236->19237 19237->19168 19239 403879 19238->19239 19241 40387e 19238->19241 19240 406184 19 API calls 19239->19240 19240->19241 19242 402fbf 12 API calls 19241->19242 19243 4038ab 19242->19243 19244 402f76 7 API calls 19243->19244 19250 4038bf 19243->19250 19244->19250 19245 403902 19246 403071 7 API calls 19245->19246 19247 40390e 19246->19247 19247->19170 19248 402fbf 12 API calls 19248->19250 19249 402f76 7 API calls 19249->19250 19250->19245 19250->19248 19250->19249 19252 40381d 19251->19252 19254 403822 19251->19254 19253 406184 19 API calls 19252->19253 19253->19254 19254->19173 19256 402fa4 19255->19256 19257 402fa9 19255->19257 19258 4041f4 7 API calls 19256->19258 19259 40422d 7 API calls 19257->19259 19258->19257 19260 402fb2 ExitProcess 19259->19260 19465 4035dd 19261->19465 19264 403690 19265 40369c 19264->19265 19266 4037c5 UnhandledExceptionFilter 19265->19266 19267 402f68 19265->19267 19266->19267 19291 402d10 19268->19291 19270 403e89 GetVersionExA 19271 403ea5 19270->19271 19272 403ebf GetEnvironmentVariableA 19270->19272 19271->19272 19275 403eb7 19271->19275 19273 403f9c 19272->19273 19276 403ede 19272->19276 19273->19275 19296 403e4f GetModuleHandleA 19273->19296 19275->19185 19275->19186 19277 403f23 GetModuleFileNameA 19276->19277 19278 403f1b 19276->19278 19277->19278 19278->19273 19293 4061a0 19278->19293 19281 4043b7 19280->19281 19281->19189 19283 404c00 HeapAlloc 19282->19283 19284 404bf9 19282->19284 19285 404c1d VirtualAlloc 19283->19285 19286 404c55 19283->19286 19284->19285 19287 404d12 19285->19287 19288 404c3d VirtualAlloc 19285->19288 19286->19189 19287->19286 19289 404d1a HeapFree 19287->19289 19288->19286 19290 404d04 VirtualFree 19288->19290 19289->19286 19290->19287 19292 402d1c 19291->19292 19292->19270 19292->19292 19298 4061b7 19293->19298 19297 403e66 19296->19297 19297->19275 19300 4061cf 19298->19300 19302 4061ff 19300->19302 19305 405376 19300->19305 19301 405376 6 API calls 19301->19302 19302->19301 19304 4061b3 19302->19304 19309 40737b 19302->19309 19304->19273 19306 405388 19305->19306 19307 405394 19305->19307 19306->19300 19315 4066de 19307->19315 19310 4073a6 19309->19310 19313 407389 19309->19313 19311 405376 6 API calls 19310->19311 19312 4073c2 19310->19312 19311->19312 19312->19313 19327 406827 19312->19327 19313->19302 19316 406727 19315->19316 19317 40670f GetStringTypeW 19315->19317 19319 406752 GetStringTypeA 19316->19319 19320 406776 19316->19320 19317->19316 19318 40672b GetStringTypeA 19317->19318 19318->19316 19322 406813 19318->19322 19319->19322 19320->19322 19323 40678c MultiByteToWideChar 19320->19323 19322->19306 19323->19322 19324 4067b0 19323->19324 19324->19322 19325 4067ea MultiByteToWideChar 19324->19325 19325->19322 19326 406803 GetStringTypeW 19325->19326 19326->19322 19328 406857 LCMapStringW 19327->19328 19329 406873 19327->19329 19328->19329 19330 40687b LCMapStringA 19328->19330 19332 4068d9 19329->19332 19333 4068bc LCMapStringA 19329->19333 19330->19329 19331 4069b5 19330->19331 19331->19313 19332->19331 19334 4068ef MultiByteToWideChar 19332->19334 19333->19331 19334->19331 19335 406919 19334->19335 19335->19331 19336 40694f MultiByteToWideChar 19335->19336 19336->19331 19337 406968 LCMapStringW 19336->19337 19337->19331 19338 406983 19337->19338 19339 406989 19338->19339 19341 4069c9 19338->19341 19339->19331 19340 406997 LCMapStringW 19339->19340 19340->19331 19341->19331 19342 406a01 LCMapStringW 19341->19342 19342->19331 19343 406a19 WideCharToMultiByte 19342->19343 19343->19331 19354 402fd1 19345->19354 19348 402f76 19349 402f84 19348->19349 19350 402f7f 19348->19350 19397 40422d 19349->19397 19391 4041f4 19350->19391 19355 402fce 19354->19355 19357 402fd8 19354->19357 19355->19195 19355->19348 19357->19355 19358 402ffd 19357->19358 19359 40300c 19358->19359 19361 403021 19358->19361 19366 40301a 19359->19366 19367 404737 19359->19367 19362 403060 HeapAlloc 19361->19362 19361->19366 19373 404ee4 19361->19373 19363 40306f 19362->19363 19363->19357 19364 40301f 19364->19357 19366->19362 19366->19363 19366->19364 19370 404769 19367->19370 19368 404808 19372 404817 19368->19372 19387 404af1 19368->19387 19370->19368 19370->19372 19380 404a40 19370->19380 19372->19366 19378 404ef2 19373->19378 19374 404fde VirtualAlloc 19379 404faf 19374->19379 19375 4050b3 19376 404bec 5 API calls 19375->19376 19376->19379 19378->19374 19378->19375 19378->19379 19379->19366 19381 404a83 HeapAlloc 19380->19381 19382 404a53 HeapReAlloc 19380->19382 19384 404aa9 VirtualAlloc 19381->19384 19386 404ad3 19381->19386 19383 404a72 19382->19383 19382->19386 19383->19381 19385 404ac3 HeapFree 19384->19385 19384->19386 19385->19386 19386->19368 19388 404b03 VirtualAlloc 19387->19388 19390 404b4c 19388->19390 19390->19372 19392 4041fe 19391->19392 19393 40422b 19392->19393 19394 40422d 7 API calls 19392->19394 19393->19349 19395 404215 19394->19395 19396 40422d 7 API calls 19395->19396 19396->19393 19399 404240 19397->19399 19398 404357 19401 40436a GetStdHandle WriteFile 19398->19401 19399->19398 19400 404280 19399->19400 19405 402f8d 19399->19405 19402 40428c GetModuleFileNameA 19400->19402 19400->19405 19401->19405 19403 4042a4 19402->19403 19406 406548 19403->19406 19405->19195 19407 406555 LoadLibraryA 19406->19407 19409 406597 19406->19409 19408 406566 GetProcAddress 19407->19408 19407->19409 19408->19409 19410 40657d GetProcAddress GetProcAddress 19408->19410 19409->19405 19410->19409 19412 40307d 19411->19412 19420 403099 19411->19420 19413 403087 19412->19413 19414 40309d 19412->19414 19416 4030c9 HeapFree 19413->19416 19417 403093 19413->19417 19415 4030c8 19414->19415 19419 4030b7 19414->19419 19415->19416 19416->19420 19422 40440e 19417->19422 19428 404e9f 19419->19428 19420->19228 19423 40444c 19422->19423 19427 404702 19422->19427 19424 404648 VirtualFree 19423->19424 19423->19427 19425 4046ac 19424->19425 19426 4046bb VirtualFree HeapFree 19425->19426 19425->19427 19426->19427 19427->19420 19429 404ee2 19428->19429 19430 404ecc 19428->19430 19429->19420 19430->19429 19432 404d86 19430->19432 19435 404d93 19432->19435 19433 404e43 19433->19429 19434 404db4 VirtualFree 19434->19435 19435->19433 19435->19434 19437 404d30 VirtualFree 19435->19437 19438 404d4d 19437->19438 19439 404d7d 19438->19439 19440 404d5d HeapFree 19438->19440 19439->19435 19440->19435 19442 40618d 19441->19442 19443 406194 19441->19443 19445 405dc0 19442->19445 19443->19231 19452 405f59 19445->19452 19449 405e03 GetCPInfo 19451 405e17 19449->19451 19450 405f4d 19450->19443 19451->19450 19457 405fff GetCPInfo 19451->19457 19453 405f79 19452->19453 19454 405f69 GetOEMCP 19452->19454 19455 405f7e GetACP 19453->19455 19456 405dd1 19453->19456 19454->19453 19455->19456 19456->19449 19456->19450 19456->19451 19459 406022 19457->19459 19464 4060ea 19457->19464 19458 4066de 6 API calls 19460 40609e 19458->19460 19459->19458 19461 406827 9 API calls 19460->19461 19462 4060c2 19461->19462 19463 406827 9 API calls 19462->19463 19463->19464 19464->19450 19466 4035e9 GetCurrentProcess TerminateProcess 19465->19466 19467 4035fa 19465->19467 19466->19467 19468 402f57 19467->19468 19469 403664 ExitProcess 19467->19469 19468->19264 19470 402142 lstrcmpiW 19471 40d1f1 19470->19471 19472 2e55d27 19473 2e72f06 CreateThread 19472->19473 19475 2e1648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19473->19475 19553 2e142c7 19475->19553 19477 2e164f3 GetTickCount 19478 2e1605a 59 API calls 19477->19478 19479 2e16508 GetVersionExA 19478->19479 19480 2e16549 _memset 19479->19480 19481 2e22fac _malloc 59 API calls 19480->19481 19482 2e16556 19481->19482 19483 2e22fac _malloc 59 API calls 19482->19483 19484 2e16566 19483->19484 19485 2e22fac _malloc 59 API calls 19484->19485 19486 2e16571 19485->19486 19487 2e22fac _malloc 59 API calls 19486->19487 19488 2e1657c 19487->19488 19489 2e22fac _malloc 59 API calls 19488->19489 19490 2e16587 19489->19490 19491 2e22fac _malloc 59 API calls 19490->19491 19492 2e16592 19491->19492 19493 2e22fac _malloc 59 API calls 19492->19493 19494 2e1659d 19493->19494 19495 2e22fac _malloc 59 API calls 19494->19495 19496 2e165ac 6 API calls 19495->19496 19497 2e165ff _memset 19496->19497 19498 2e16618 RtlEnterCriticalSection RtlLeaveCriticalSection 19497->19498 19499 2e22fac _malloc 59 API calls 19498->19499 19500 2e16657 19499->19500 19501 2e22fac _malloc 59 API calls 19500->19501 19502 2e16665 19501->19502 19503 2e22fac _malloc 59 API calls 19502->19503 19504 2e1666c 19503->19504 19505 2e22fac _malloc 59 API calls 19504->19505 19506 2e16692 QueryPerformanceCounter Sleep 19505->19506 19507 2e22fac _malloc 59 API calls 19506->19507 19508 2e166bf 19507->19508 19509 2e22fac _malloc 59 API calls 19508->19509 19545 2e166cc _memset 19509->19545 19510 2e1670e RtlEnterCriticalSection RtlLeaveCriticalSection 19510->19545 19511 2e16708 Sleep 19511->19510 19512 2e172ab InternetOpenA 19513 2e172c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19512->19513 19512->19545 19518 2e17342 _memset 19513->19518 19514 2e17322 InternetOpenUrlA 19515 2e17382 InternetCloseHandle 19514->19515 19514->19518 19515->19545 19516 2e17346 InternetReadFile 19517 2e17377 InternetCloseHandle 19516->19517 19516->19518 19517->19515 19518->19514 19518->19516 19519 2e173e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19520 2e2233c 66 API calls 19519->19520 19520->19545 19521 2e2233c 66 API calls 19521->19545 19522 2e22fac _malloc 59 API calls 19523 2e1749d RtlEnterCriticalSection RtlLeaveCriticalSection 19522->19523 19523->19545 19524 2e1776a RtlEnterCriticalSection RtlLeaveCriticalSection 19524->19545 19525 2e161f5 59 API calls 19525->19545 19526 2e22fac 59 API calls _malloc 19526->19545 19527 2e22418 _sprintf 84 API calls 19527->19545 19528 2e11ba7 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 19528->19545 19529 2e178e2 RtlEnterCriticalSection 19530 2e1790f RtlLeaveCriticalSection 19529->19530 19529->19545 19531 2e13c67 72 API calls 19530->19531 19531->19545 19532 2e1534d 93 API calls 19532->19545 19533 2e22f74 59 API calls _free 19533->19545 19534 2e13d7e 64 API calls 19534->19545 19535 2e1833b 89 API calls 19535->19545 19536 2e235e6 60 API calls _strtok 19536->19545 19537 2e1a725 73 API calls 19537->19545 19538 2e19003 88 API calls 19538->19545 19539 2e23b4c _Allocate 60 API calls 19539->19545 19540 2e183ea 71 API calls 19540->19545 19541 2e22850 _swscanf 59 API calls 19541->19545 19542 2e133b2 86 API calls 19542->19545 19543 2e19737 6 API calls 19543->19545 19544 2e1a84f 60 API calls 19544->19545 19545->19510 19545->19511 19545->19512 19545->19519 19545->19521 19545->19522 19545->19524 19545->19525 19545->19526 19545->19527 19545->19528 19545->19529 19545->19530 19545->19532 19545->19533 19545->19534 19545->19535 19545->19536 19545->19537 19545->19538 19545->19539 19545->19540 19545->19541 19545->19542 19545->19543 19545->19544 19545->19545 19546 2e15119 103 API calls 19545->19546 19547 2e1d117 73 API calls 19545->19547 19548 2e1ac0f 88 API calls 19545->19548 19549 2e176e7 shared_ptr 19545->19549 19550 2e176ec Sleep 19545->19550 19546->19545 19547->19545 19548->19545 19549->19545 19549->19550 19552 2e14100 GetProcessHeap HeapFree 19549->19552 19551 2e218f0 GetProcessHeap HeapFree 19550->19551 19551->19549 19552->19549 19554 2e1f8a3 CreateFileA 19555 2e1f99f 19554->19555 19559 2e1f8d4 19554->19559 19556 2e1f8ec DeviceIoControl 19556->19559 19557 2e1f995 CloseHandle 19557->19555 19558 2e1f961 GetLastError 19558->19557 19558->19559 19559->19556 19559->19557 19559->19558 19559->19559 19561 2e23b4c 19559->19561 19563 2e23b54 19561->19563 19564 2e23b6e 19563->19564 19566 2e23b72 std::exception::exception 19563->19566 19569 2e28204 RtlDecodePointer 19563->19569 19571 2e22fac 19563->19571 19564->19559 19588 2e2455a 19566->19588 19568 2e23b9c 19570 2e28217 19569->19570 19570->19563 19572 2e23027 19571->19572 19582 2e22fb8 19571->19582 19573 2e28204 _malloc RtlDecodePointer 19572->19573 19575 2e2302d 19573->19575 19574 2e22fc3 19574->19582 19591 2e286d4 19574->19591 19600 2e28731 19574->19600 19635 2e2831d 19574->19635 19577 2e25e5b _malloc 58 API calls 19575->19577 19579 2e2301f 19577->19579 19578 2e22feb RtlAllocateHeap 19578->19579 19578->19582 19579->19563 19581 2e23013 19638 2e25e5b 19581->19638 19582->19574 19582->19578 19582->19581 19583 2e28204 _malloc RtlDecodePointer 19582->19583 19586 2e23011 19582->19586 19583->19582 19587 2e25e5b _malloc 58 API calls 19586->19587 19587->19579 19590 2e24579 RaiseException 19588->19590 19590->19568 19641 2e3017e 19591->19641 19593 2e286db 19594 2e286e8 19593->19594 19595 2e3017e __FF_MSGBANNER 59 API calls 19593->19595 19596 2e28731 __NMSG_WRITE 59 API calls 19594->19596 19599 2e2870a 19594->19599 19595->19594 19597 2e28700 19596->19597 19598 2e28731 __NMSG_WRITE 59 API calls 19597->19598 19598->19599 19599->19574 19601 2e2874f __NMSG_WRITE 19600->19601 19602 2e3017e __FF_MSGBANNER 55 API calls 19601->19602 19634 2e28876 19601->19634 19605 2e28762 19602->19605 19603 2e2454b ___crtMessageBoxW 6 API calls 19604 2e288df 19603->19604 19604->19574 19606 2e2887b GetStdHandle 19605->19606 19607 2e3017e __FF_MSGBANNER 55 API calls 19605->19607 19610 2e28889 _strlen 19606->19610 19606->19634 19608 2e28773 19607->19608 19608->19606 19609 2e28785 19608->19609 19609->19634 19685 2e2f53d 19609->19685 19612 2e288c2 WriteFile 19610->19612 19610->19634 19612->19634 19614 2e287b2 GetModuleFileNameW 19616 2e287d2 19614->19616 19622 2e287e2 __NMSG_WRITE 19614->19622 19615 2e288e3 19617 2e24f05 __invoke_watson 8 API calls 19615->19617 19618 2e2f53d __NMSG_WRITE 55 API calls 19616->19618 19619 2e288ed 19617->19619 19618->19622 19620 2e28912 RtlEnterCriticalSection 19619->19620 19737 2e28976 19619->19737 19620->19574 19621 2e28828 19621->19615 19703 2e2f4d1 19621->19703 19622->19615 19622->19621 19694 2e2f5b2 19622->19694 19625 2e28905 19625->19620 19759 2e28440 19625->19759 19628 2e2f4d1 __NMSG_WRITE 55 API calls 19630 2e2885f 19628->19630 19630->19615 19632 2e28866 19630->19632 19712 2e301be RtlEncodePointer 19632->19712 19634->19603 19822 2e282e9 GetModuleHandleExW 19635->19822 19825 2e25c72 GetLastError 19638->19825 19640 2e25e60 19640->19586 19642 2e30188 19641->19642 19643 2e30192 19642->19643 19644 2e25e5b _malloc 59 API calls 19642->19644 19643->19593 19645 2e301ae 19644->19645 19648 2e24ef5 19645->19648 19651 2e24eca RtlDecodePointer 19648->19651 19652 2e24edd 19651->19652 19657 2e24f05 IsProcessorFeaturePresent 19652->19657 19655 2e24eca __commit 8 API calls 19656 2e24f01 19655->19656 19656->19593 19658 2e24f10 19657->19658 19663 2e24d98 19658->19663 19662 2e24ef4 19662->19655 19664 2e24db2 _memset __call_reportfault 19663->19664 19665 2e24dd2 IsDebuggerPresent 19664->19665 19671 2e29528 SetUnhandledExceptionFilter UnhandledExceptionFilter 19665->19671 19668 2e24e96 __call_reportfault 19672 2e2454b 19668->19672 19669 2e24eb9 19670 2e29513 GetCurrentProcess TerminateProcess 19669->19670 19670->19662 19671->19668 19673 2e24553 19672->19673 19674 2e24555 IsProcessorFeaturePresent 19672->19674 19673->19669 19676 2e2958f 19674->19676 19679 2e2953e IsDebuggerPresent 19676->19679 19680 2e29553 __call_reportfault 19679->19680 19681 2e29528 __call_reportfault SetUnhandledExceptionFilter UnhandledExceptionFilter 19680->19681 19682 2e2955b __call_reportfault 19681->19682 19683 2e29513 __invoke_watson GetCurrentProcess TerminateProcess 19682->19683 19684 2e29578 19683->19684 19684->19669 19686 2e2f556 19685->19686 19687 2e2f548 19685->19687 19688 2e25e5b _malloc 59 API calls 19686->19688 19687->19686 19692 2e2f56f 19687->19692 19689 2e2f560 19688->19689 19690 2e24ef5 __commit 9 API calls 19689->19690 19691 2e287a5 19690->19691 19691->19614 19691->19615 19692->19691 19693 2e25e5b _malloc 59 API calls 19692->19693 19693->19689 19698 2e2f5c0 19694->19698 19695 2e2f5c4 19696 2e2f5c9 19695->19696 19697 2e25e5b _malloc 59 API calls 19695->19697 19696->19621 19699 2e2f5f4 19697->19699 19698->19695 19698->19696 19701 2e2f603 19698->19701 19700 2e24ef5 __commit 9 API calls 19699->19700 19700->19696 19701->19696 19702 2e25e5b _malloc 59 API calls 19701->19702 19702->19699 19704 2e2f4eb 19703->19704 19707 2e2f4dd 19703->19707 19705 2e25e5b _malloc 59 API calls 19704->19705 19706 2e2f4f5 19705->19706 19708 2e24ef5 __commit 9 API calls 19706->19708 19707->19704 19710 2e2f517 19707->19710 19709 2e28848 19708->19709 19709->19615 19709->19628 19710->19709 19711 2e25e5b _malloc 59 API calls 19710->19711 19711->19706 19713 2e301f2 ___crtIsPackagedApp 19712->19713 19714 2e302b1 IsDebuggerPresent 19713->19714 19715 2e30201 LoadLibraryExW 19713->19715 19716 2e302d6 19714->19716 19717 2e302bb 19714->19717 19718 2e30218 GetLastError 19715->19718 19719 2e3023e GetProcAddress 19715->19719 19722 2e302db RtlDecodePointer 19716->19722 19727 2e302c9 19716->19727 19721 2e302c2 OutputDebugStringW 19717->19721 19717->19727 19723 2e30227 LoadLibraryExW 19718->19723 19726 2e302ce 19718->19726 19720 2e30252 7 API calls 19719->19720 19719->19726 19724 2e3029a GetProcAddress RtlEncodePointer 19720->19724 19725 2e302ae 19720->19725 19721->19727 19722->19726 19723->19719 19723->19726 19724->19725 19725->19714 19728 2e2454b ___crtMessageBoxW 6 API calls 19726->19728 19727->19726 19731 2e30302 RtlDecodePointer RtlDecodePointer 19727->19731 19735 2e3031a 19727->19735 19733 2e303a0 19728->19733 19729 2e30352 RtlDecodePointer 19730 2e3033e RtlDecodePointer 19729->19730 19734 2e30359 19729->19734 19730->19726 19731->19735 19733->19634 19734->19730 19736 2e3036a RtlDecodePointer 19734->19736 19735->19729 19735->19730 19736->19730 19738 2e28982 __commit 19737->19738 19739 2e289a1 19738->19739 19740 2e286d4 __FF_MSGBANNER 59 API calls 19738->19740 19748 2e289c4 __commit 19739->19748 19766 2e28ab5 19739->19766 19742 2e28990 19740->19742 19744 2e28731 __NMSG_WRITE 59 API calls 19742->19744 19745 2e28997 19744->19745 19749 2e2831d _malloc 3 API calls 19745->19749 19746 2e289ce 19771 2e288ee 19746->19771 19747 2e289bf 19750 2e25e5b _malloc 59 API calls 19747->19750 19748->19625 19749->19739 19750->19748 19752 2e289d5 19753 2e289e2 19752->19753 19754 2e289fa 19752->19754 19778 2e2920c 19753->19778 19781 2e22f74 19754->19781 19757 2e289ee 19787 2e28a16 19757->19787 19760 2e286d4 __FF_MSGBANNER 59 API calls 19759->19760 19761 2e28448 19760->19761 19762 2e28731 __NMSG_WRITE 59 API calls 19761->19762 19763 2e28450 19762->19763 19792 2e284ef 19763->19792 19768 2e28ac3 19766->19768 19767 2e22fac _malloc 59 API calls 19767->19768 19768->19767 19769 2e289b8 19768->19769 19790 2e29505 Sleep 19768->19790 19769->19746 19769->19747 19772 2e28912 RtlEnterCriticalSection 19771->19772 19773 2e288ff 19771->19773 19772->19752 19774 2e28976 __mtinitlocknum 58 API calls 19773->19774 19775 2e28905 19774->19775 19775->19772 19776 2e28440 __amsg_exit 58 API calls 19775->19776 19777 2e28911 19776->19777 19777->19772 19779 2e29229 InitializeCriticalSectionAndSpinCount 19778->19779 19780 2e2921c 19778->19780 19779->19757 19780->19757 19782 2e22f7d HeapFree 19781->19782 19786 2e22fa6 _free 19781->19786 19783 2e22f92 19782->19783 19782->19786 19784 2e25e5b _malloc 57 API calls 19783->19784 19785 2e22f98 GetLastError 19784->19785 19785->19786 19786->19757 19791 2e28a58 RtlLeaveCriticalSection 19787->19791 19789 2e28a1d 19789->19748 19790->19768 19791->19789 19795 2e285a5 19792->19795 19794 2e2845b 19796 2e285b1 __commit 19795->19796 19797 2e288ee __lock 52 API calls 19796->19797 19798 2e285b8 19797->19798 19799 2e285e6 RtlDecodePointer 19798->19799 19802 2e28671 __cinit 19798->19802 19801 2e285fd RtlDecodePointer 19799->19801 19799->19802 19808 2e2860d 19801->19808 19815 2e286bf 19802->19815 19804 2e286ce __commit 19804->19794 19806 2e286b6 19809 2e286bf 19806->19809 19810 2e2831d _malloc 3 API calls 19806->19810 19807 2e2861a RtlEncodePointer 19807->19808 19808->19802 19808->19807 19811 2e2862a RtlDecodePointer RtlEncodePointer 19808->19811 19812 2e286cc 19809->19812 19820 2e28a58 RtlLeaveCriticalSection 19809->19820 19810->19809 19814 2e2863c RtlDecodePointer RtlDecodePointer 19811->19814 19812->19794 19814->19808 19816 2e286c5 19815->19816 19817 2e2869f 19815->19817 19821 2e28a58 RtlLeaveCriticalSection 19816->19821 19817->19804 19819 2e28a58 RtlLeaveCriticalSection 19817->19819 19819->19806 19820->19812 19821->19817 19823 2e28302 GetProcAddress 19822->19823 19824 2e28314 ExitProcess 19822->19824 19823->19824 19839 2e291cb 19825->19839 19827 2e25c87 19828 2e25cd5 SetLastError 19827->19828 19842 2e28a6d 19827->19842 19828->19640 19832 2e25cae 19833 2e25cb4 19832->19833 19834 2e25ccc 19832->19834 19851 2e25ce1 19833->19851 19836 2e22f74 _free 56 API calls 19834->19836 19838 2e25cd2 19836->19838 19837 2e25cbc GetCurrentThreadId 19837->19828 19838->19828 19840 2e291e2 TlsGetValue 19839->19840 19841 2e291de 19839->19841 19840->19827 19841->19827 19844 2e28a74 19842->19844 19845 2e25c9a 19844->19845 19847 2e28a92 19844->19847 19861 2e304b8 19844->19861 19845->19828 19848 2e291ea 19845->19848 19847->19844 19847->19845 19869 2e29505 Sleep 19847->19869 19849 2e29200 19848->19849 19850 2e29204 TlsSetValue 19848->19850 19849->19832 19850->19832 19852 2e25ced __commit 19851->19852 19853 2e288ee __lock 59 API calls 19852->19853 19854 2e25d2a 19853->19854 19870 2e25d82 19854->19870 19857 2e288ee __lock 59 API calls 19858 2e25d4b ___addlocaleref 19857->19858 19873 2e25d8b 19858->19873 19860 2e25d76 __commit 19860->19837 19862 2e304c3 19861->19862 19868 2e304de 19861->19868 19863 2e304cf 19862->19863 19862->19868 19865 2e25e5b _malloc 58 API calls 19863->19865 19864 2e304ee RtlAllocateHeap 19867 2e304d4 19864->19867 19864->19868 19865->19867 19866 2e28204 _malloc RtlDecodePointer 19866->19868 19867->19844 19868->19864 19868->19866 19868->19867 19869->19847 19876 2e28a58 RtlLeaveCriticalSection 19870->19876 19872 2e25d44 19872->19857 19877 2e28a58 RtlLeaveCriticalSection 19873->19877 19875 2e25d92 19875->19860 19876->19872 19877->19875 19913 401f64 FindResourceA 19914 401f86 GetLastError SizeofResource 19913->19914 19915 401f9f 19913->19915 19914->19915 19916 401fa6 LoadResource LockResource GlobalAlloc 19914->19916 19917 401fd2 19916->19917 19918 401ffb GetTickCount 19917->19918 19920 402005 GlobalAlloc 19918->19920 19920->19915 19921 2e4f2c2 19922 2e4f1cc CreateFileA 19921->19922 19924 2e75b24 19922->19924 19878 2e62b6f 19879 2e945e0 19878->19879 19881 2e22fac 59 API calls 19879->19881 19880 2e945e5 19882 2e22fac 59 API calls 19880->19882 19881->19880 19882->19880 19925 2e1104d 19930 2e233a4 19925->19930 19936 2e232a8 19930->19936 19932 2e11057 19933 2e11aa9 InterlockedIncrement 19932->19933 19934 2e11ac5 WSAStartup InterlockedExchange 19933->19934 19935 2e1105c 19933->19935 19934->19935 19937 2e232b4 __commit 19936->19937 19944 2e28593 19937->19944 19943 2e232db __commit 19943->19932 19945 2e288ee __lock 59 API calls 19944->19945 19946 2e232bd 19945->19946 19947 2e232ec RtlDecodePointer RtlDecodePointer 19946->19947 19948 2e232c9 19947->19948 19949 2e23319 19947->19949 19958 2e232e6 19948->19958 19949->19948 19961 2e2915d 19949->19961 19951 2e2337c RtlEncodePointer RtlEncodePointer 19951->19948 19952 2e23350 19952->19948 19955 2e28afc __realloc_crt 62 API calls 19952->19955 19957 2e2336a RtlEncodePointer 19952->19957 19953 2e2332b 19953->19951 19953->19952 19968 2e28afc 19953->19968 19956 2e23364 19955->19956 19956->19948 19956->19957 19957->19951 19995 2e2859c 19958->19995 19962 2e29166 19961->19962 19963 2e2917b RtlSizeHeap 19961->19963 19964 2e25e5b _malloc 59 API calls 19962->19964 19963->19953 19965 2e2916b 19964->19965 19966 2e24ef5 __commit 9 API calls 19965->19966 19967 2e29176 19966->19967 19967->19953 19971 2e28b03 19968->19971 19970 2e28b40 19970->19952 19971->19970 19973 2e303a4 19971->19973 19994 2e29505 Sleep 19971->19994 19974 2e303b8 19973->19974 19975 2e303ad 19973->19975 19976 2e303c0 19974->19976 19986 2e303cd 19974->19986 19977 2e22fac _malloc 59 API calls 19975->19977 19979 2e22f74 _free 59 API calls 19976->19979 19978 2e303b5 19977->19978 19978->19971 19993 2e303c8 _free 19979->19993 19980 2e30405 19982 2e28204 _malloc RtlDecodePointer 19980->19982 19981 2e303d5 RtlReAllocateHeap 19981->19986 19981->19993 19983 2e3040b 19982->19983 19984 2e25e5b _malloc 59 API calls 19983->19984 19984->19993 19985 2e30435 19988 2e25e5b _malloc 59 API calls 19985->19988 19986->19980 19986->19981 19986->19985 19987 2e28204 _malloc RtlDecodePointer 19986->19987 19990 2e3041d 19986->19990 19987->19986 19989 2e3043a GetLastError 19988->19989 19989->19993 19991 2e25e5b _malloc 59 API calls 19990->19991 19992 2e30422 GetLastError 19991->19992 19992->19993 19993->19971 19994->19971 19998 2e28a58 RtlLeaveCriticalSection 19995->19998 19997 2e232eb 19997->19943 19998->19997 19883 40d60d 19884 40d612 19883->19884 19884->19884 19885 40d975 RegQueryValueExA 19884->19885 19885->19884 19886 40d8ce Sleep 19999 40216e 20000 40d877 19999->20000 20003 2e23d0f 20000->20003 20004 2e23d18 20003->20004 20005 2e23d1d 20003->20005 20017 2e2b8e1 20004->20017 20009 2e23d32 20005->20009 20008 40d879 20010 2e23d3e __commit 20009->20010 20014 2e23d8c ___DllMainCRTStartup 20010->20014 20016 2e23de9 __commit 20010->20016 20021 2e23b9d 20010->20021 20012 2e23dc6 20013 2e23b9d __CRT_INIT@12 138 API calls 20012->20013 20012->20016 20013->20016 20014->20012 20015 2e23b9d __CRT_INIT@12 138 API calls 20014->20015 20014->20016 20015->20012 20016->20008 20018 2e2b911 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 20017->20018 20019 2e2b904 20017->20019 20020 2e2b908 20018->20020 20019->20018 20019->20020 20020->20005 20022 2e23ba9 __commit 20021->20022 20023 2e23bb1 20022->20023 20024 2e23c2b 20022->20024 20069 2e281e7 GetProcessHeap 20023->20069 20025 2e23c94 20024->20025 20026 2e23c2f 20024->20026 20029 2e23cf7 20025->20029 20030 2e23c99 20025->20030 20032 2e23c50 20026->20032 20038 2e23bba __commit __CRT_INIT@12 20026->20038 20170 2e2845c 20026->20170 20028 2e23bb6 20028->20038 20070 2e25d94 20028->20070 20029->20038 20201 2e25c24 20029->20201 20031 2e291cb __threadstartex@4 TlsGetValue 20030->20031 20035 2e23ca4 20031->20035 20173 2e28333 RtlDecodePointer 20032->20173 20035->20038 20041 2e28a6d __calloc_crt 59 API calls 20035->20041 20038->20014 20039 2e23bc6 __RTC_Initialize 20039->20038 20046 2e23bd6 GetCommandLineA 20039->20046 20042 2e23cb5 20041->20042 20042->20038 20047 2e291ea __threadstartex@4 TlsSetValue 20042->20047 20043 2e2b57f __ioterm 60 API calls 20045 2e23c61 20043->20045 20048 2e25e0a __mtterm 62 API calls 20045->20048 20091 2e2b97d GetEnvironmentStringsW 20046->20091 20050 2e23ccd 20047->20050 20051 2e23c66 __CRT_INIT@12 20048->20051 20053 2e23cd3 20050->20053 20054 2e23ceb 20050->20054 20197 2e23c7f 20051->20197 20056 2e25ce1 __initptd 59 API calls 20053->20056 20057 2e22f74 _free 59 API calls 20054->20057 20059 2e23cdb GetCurrentThreadId 20056->20059 20057->20038 20058 2e23bf0 20060 2e23bf4 20058->20060 20123 2e2b5d1 20058->20123 20059->20038 20156 2e25e0a 20060->20156 20064 2e23c14 20064->20038 20165 2e2b57f 20064->20165 20069->20028 20209 2e28503 RtlEncodePointer 20070->20209 20072 2e25d99 20214 2e28a1f 20072->20214 20075 2e25da2 20076 2e25e0a __mtterm 62 API calls 20075->20076 20078 2e25da7 20076->20078 20078->20039 20080 2e25dbf 20081 2e28a6d __calloc_crt 59 API calls 20080->20081 20082 2e25dcc 20081->20082 20083 2e25e01 20082->20083 20084 2e291ea __threadstartex@4 TlsSetValue 20082->20084 20085 2e25e0a __mtterm 62 API calls 20083->20085 20086 2e25de0 20084->20086 20087 2e25e06 20085->20087 20086->20083 20088 2e25de6 20086->20088 20087->20039 20089 2e25ce1 __initptd 59 API calls 20088->20089 20090 2e25dee GetCurrentThreadId 20089->20090 20090->20039 20093 2e2b990 WideCharToMultiByte 20091->20093 20096 2e23be6 20091->20096 20094 2e2b9c3 20093->20094 20095 2e2b9fa FreeEnvironmentStringsW 20093->20095 20097 2e28ab5 __malloc_crt 59 API calls 20094->20097 20095->20096 20104 2e2b2cb 20096->20104 20098 2e2b9c9 20097->20098 20098->20095 20099 2e2b9d0 WideCharToMultiByte 20098->20099 20100 2e2b9e6 20099->20100 20101 2e2b9ef FreeEnvironmentStringsW 20099->20101 20102 2e22f74 _free 59 API calls 20100->20102 20101->20096 20103 2e2b9ec 20102->20103 20103->20101 20105 2e2b2d7 __commit 20104->20105 20106 2e288ee __lock 59 API calls 20105->20106 20107 2e2b2de 20106->20107 20108 2e28a6d __calloc_crt 59 API calls 20107->20108 20110 2e2b2ef 20108->20110 20109 2e2b35a GetStartupInfoW 20117 2e2b36f 20109->20117 20120 2e2b49e 20109->20120 20110->20109 20111 2e2b2fa __commit @_EH4_CallFilterFunc@8 20110->20111 20111->20058 20112 2e2b566 20222 2e2b576 20112->20222 20114 2e28a6d __calloc_crt 59 API calls 20114->20117 20115 2e2b4eb GetStdHandle 20115->20120 20116 2e2b4fe GetFileType 20116->20120 20117->20114 20119 2e2b3bd 20117->20119 20117->20120 20118 2e2b3f1 GetFileType 20118->20119 20119->20118 20119->20120 20121 2e2920c __getstream InitializeCriticalSectionAndSpinCount 20119->20121 20120->20112 20120->20115 20120->20116 20122 2e2920c __getstream InitializeCriticalSectionAndSpinCount 20120->20122 20121->20119 20122->20120 20124 2e2b5e4 GetModuleFileNameA 20123->20124 20125 2e2b5df 20123->20125 20127 2e2b611 20124->20127 20232 2e2528a 20125->20232 20226 2e2b684 20127->20226 20129 2e23c00 20129->20064 20134 2e2b800 20129->20134 20131 2e28ab5 __malloc_crt 59 API calls 20132 2e2b64a 20131->20132 20132->20129 20133 2e2b684 _parse_cmdline 59 API calls 20132->20133 20133->20129 20135 2e2b809 20134->20135 20138 2e2b80e _strlen 20134->20138 20136 2e2528a ___initmbctable 71 API calls 20135->20136 20136->20138 20137 2e28a6d __calloc_crt 59 API calls 20146 2e2b844 _strlen 20137->20146 20138->20137 20141 2e23c09 20138->20141 20139 2e2b896 20140 2e22f74 _free 59 API calls 20139->20140 20140->20141 20141->20064 20150 2e2846b 20141->20150 20142 2e28a6d __calloc_crt 59 API calls 20142->20146 20143 2e2b8bd 20144 2e22f74 _free 59 API calls 20143->20144 20144->20141 20146->20139 20146->20141 20146->20142 20146->20143 20147 2e2b8d4 20146->20147 20396 2e26cbc 20146->20396 20148 2e24f05 __invoke_watson 8 API calls 20147->20148 20149 2e2b8e0 20148->20149 20151 2e28477 __IsNonwritableInCurrentImage 20150->20151 20405 2e2d2df 20151->20405 20153 2e28495 __initterm_e 20154 2e233a4 __cinit 68 API calls 20153->20154 20155 2e284b4 __cinit __IsNonwritableInCurrentImage 20153->20155 20154->20155 20155->20064 20157 2e25e14 20156->20157 20159 2e25e1a 20156->20159 20408 2e291ac 20157->20408 20160 2e28938 RtlDeleteCriticalSection 20159->20160 20161 2e28954 20159->20161 20162 2e22f74 _free 59 API calls 20160->20162 20163 2e28973 20161->20163 20164 2e28960 RtlDeleteCriticalSection 20161->20164 20162->20159 20163->20038 20164->20161 20167 2e2b586 20165->20167 20166 2e2b5ce 20166->20060 20167->20166 20168 2e22f74 _free 59 API calls 20167->20168 20169 2e2b59f RtlDeleteCriticalSection 20167->20169 20168->20167 20169->20167 20171 2e285a5 _doexit 59 API calls 20170->20171 20172 2e28467 20171->20172 20172->20032 20174 2e2835f 20173->20174 20175 2e2834d 20173->20175 20176 2e22f74 _free 59 API calls 20174->20176 20175->20174 20177 2e22f74 _free 59 API calls 20175->20177 20178 2e2836c 20176->20178 20177->20175 20179 2e28390 20178->20179 20182 2e22f74 _free 59 API calls 20178->20182 20180 2e22f74 _free 59 API calls 20179->20180 20181 2e2839c 20180->20181 20183 2e22f74 _free 59 API calls 20181->20183 20182->20178 20184 2e283ad 20183->20184 20185 2e22f74 _free 59 API calls 20184->20185 20186 2e283b8 20185->20186 20187 2e283dd RtlEncodePointer 20186->20187 20191 2e22f74 _free 59 API calls 20186->20191 20188 2e283f2 20187->20188 20189 2e283f8 20187->20189 20192 2e22f74 _free 59 API calls 20188->20192 20190 2e2840e 20189->20190 20193 2e22f74 _free 59 API calls 20189->20193 20194 2e23c55 20190->20194 20196 2e22f74 _free 59 API calls 20190->20196 20195 2e283dc 20191->20195 20192->20189 20193->20190 20194->20043 20194->20051 20195->20187 20196->20194 20198 2e23c83 20197->20198 20199 2e23c91 20197->20199 20198->20199 20200 2e25e0a __mtterm 62 API calls 20198->20200 20199->20038 20200->20199 20202 2e25c31 20201->20202 20208 2e25c57 20201->20208 20203 2e291cb __threadstartex@4 TlsGetValue 20202->20203 20205 2e25c3f 20202->20205 20203->20205 20204 2e291ea __threadstartex@4 TlsSetValue 20206 2e25c4f 20204->20206 20205->20204 20411 2e25aef 20206->20411 20208->20038 20210 2e28514 __init_pointers __initp_misc_winsig 20209->20210 20221 2e23a07 RtlEncodePointer 20210->20221 20212 2e2852c __init_pointers 20213 2e2927a 34 API calls 20212->20213 20213->20072 20215 2e28a2b 20214->20215 20216 2e2920c __getstream InitializeCriticalSectionAndSpinCount 20215->20216 20217 2e25d9e 20215->20217 20216->20215 20217->20075 20218 2e2918e 20217->20218 20219 2e291a5 TlsAlloc 20218->20219 20220 2e25db4 20218->20220 20220->20075 20220->20080 20221->20212 20225 2e28a58 RtlLeaveCriticalSection 20222->20225 20224 2e2b57d 20224->20111 20225->20224 20228 2e2b6a6 20226->20228 20231 2e2b70a 20228->20231 20236 2e315d6 20228->20236 20229 2e2b627 20229->20129 20229->20131 20230 2e315d6 _parse_cmdline 59 API calls 20230->20231 20231->20229 20231->20230 20233 2e25293 20232->20233 20234 2e2529a 20232->20234 20292 2e255e7 20233->20292 20234->20124 20239 2e3157c 20236->20239 20242 2e2227b 20239->20242 20243 2e2228c 20242->20243 20249 2e222d9 20242->20249 20250 2e25c5a 20243->20250 20246 2e222b9 20246->20249 20270 2e25541 20246->20270 20249->20228 20251 2e25c72 __getptd_noexit 59 API calls 20250->20251 20252 2e25c60 20251->20252 20253 2e22292 20252->20253 20254 2e28440 __amsg_exit 59 API calls 20252->20254 20253->20246 20255 2e251bf 20253->20255 20254->20253 20256 2e251cb __commit 20255->20256 20257 2e25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20256->20257 20258 2e251d4 20257->20258 20259 2e25203 20258->20259 20260 2e251e7 20258->20260 20261 2e288ee __lock 59 API calls 20259->20261 20262 2e25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20260->20262 20263 2e2520a 20261->20263 20264 2e251ec 20262->20264 20282 2e2523f 20263->20282 20267 2e251fa __commit 20264->20267 20269 2e28440 __amsg_exit 59 API calls 20264->20269 20267->20246 20269->20267 20271 2e2554d __commit 20270->20271 20272 2e25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20271->20272 20273 2e25557 20272->20273 20274 2e288ee __lock 59 API calls 20273->20274 20275 2e25569 20273->20275 20280 2e25587 20274->20280 20277 2e25577 __commit 20275->20277 20279 2e28440 __amsg_exit 59 API calls 20275->20279 20276 2e255b4 20289 2e255de 20276->20289 20277->20249 20279->20277 20280->20276 20281 2e22f74 _free 59 API calls 20280->20281 20281->20276 20283 2e2521e 20282->20283 20284 2e2524a ___addlocaleref ___removelocaleref 20282->20284 20286 2e25236 20283->20286 20284->20283 20285 2e24fc5 ___freetlocinfo 59 API calls 20284->20285 20285->20283 20287 2e28a58 _doexit RtlLeaveCriticalSection 20286->20287 20288 2e2523d 20287->20288 20288->20264 20290 2e28a58 _doexit RtlLeaveCriticalSection 20289->20290 20291 2e255e5 20290->20291 20291->20275 20293 2e255f3 __commit 20292->20293 20294 2e25c5a _LocaleUpdate::_LocaleUpdate 59 API calls 20293->20294 20295 2e255fb 20294->20295 20296 2e25541 _LocaleUpdate::_LocaleUpdate 59 API calls 20295->20296 20297 2e25605 20296->20297 20317 2e252e2 20297->20317 20300 2e28ab5 __malloc_crt 59 API calls 20301 2e25627 20300->20301 20302 2e25754 __commit 20301->20302 20324 2e2578f 20301->20324 20302->20234 20305 2e25764 20305->20302 20307 2e22f74 _free 59 API calls 20305->20307 20311 2e25777 20305->20311 20306 2e2565d 20309 2e22f74 _free 59 API calls 20306->20309 20310 2e2567d 20306->20310 20307->20311 20308 2e25e5b _malloc 59 API calls 20308->20302 20309->20310 20310->20302 20312 2e288ee __lock 59 API calls 20310->20312 20311->20308 20314 2e256ac 20312->20314 20313 2e2573a 20334 2e25759 20313->20334 20314->20313 20316 2e22f74 _free 59 API calls 20314->20316 20316->20313 20318 2e2227b _LocaleUpdate::_LocaleUpdate 59 API calls 20317->20318 20319 2e252f2 20318->20319 20320 2e25313 20319->20320 20321 2e25301 GetOEMCP 20319->20321 20322 2e2532a 20320->20322 20323 2e25318 GetACP 20320->20323 20321->20322 20322->20300 20322->20302 20323->20322 20325 2e252e2 getSystemCP 61 API calls 20324->20325 20326 2e257ac 20325->20326 20329 2e257fd IsValidCodePage 20326->20329 20331 2e257b3 setSBCS 20326->20331 20333 2e25822 _memset __setmbcp_nolock 20326->20333 20327 2e2454b ___crtMessageBoxW 6 API calls 20328 2e2564e 20327->20328 20328->20305 20328->20306 20330 2e2580f GetCPInfo 20329->20330 20329->20331 20330->20331 20330->20333 20331->20327 20337 2e253af GetCPInfo 20333->20337 20395 2e28a58 RtlLeaveCriticalSection 20334->20395 20336 2e25760 20336->20302 20342 2e253e7 20337->20342 20346 2e25491 20337->20346 20339 2e2454b ___crtMessageBoxW 6 API calls 20341 2e2553d 20339->20341 20341->20331 20347 2e2dc1d 20342->20347 20345 2e2dac1 ___crtLCMapStringA 63 API calls 20345->20346 20346->20339 20348 2e2227b _LocaleUpdate::_LocaleUpdate 59 API calls 20347->20348 20349 2e2dc2e 20348->20349 20357 2e2db25 20349->20357 20352 2e2dac1 20353 2e2227b _LocaleUpdate::_LocaleUpdate 59 API calls 20352->20353 20354 2e2dad2 20353->20354 20370 2e2d8bd 20354->20370 20358 2e2db3f 20357->20358 20359 2e2db4c MultiByteToWideChar 20357->20359 20358->20359 20362 2e2db78 20359->20362 20369 2e2db71 20359->20369 20360 2e2454b ___crtMessageBoxW 6 API calls 20361 2e25448 20360->20361 20361->20352 20363 2e2db9a _memset 20362->20363 20364 2e22fac _malloc 59 API calls 20362->20364 20365 2e2dbd6 MultiByteToWideChar 20363->20365 20363->20369 20364->20363 20366 2e2dc00 20365->20366 20367 2e2dbf0 GetStringTypeW 20365->20367 20368 2e2db07 __freea 59 API calls 20366->20368 20367->20366 20368->20369 20369->20360 20371 2e2d8d6 MultiByteToWideChar 20370->20371 20373 2e2d935 20371->20373 20377 2e2d93c 20371->20377 20374 2e2454b ___crtMessageBoxW 6 API calls 20373->20374 20375 2e25469 20374->20375 20375->20345 20376 2e2d99b MultiByteToWideChar 20378 2e2d9b4 20376->20378 20394 2e2da02 20376->20394 20379 2e22fac _malloc 59 API calls 20377->20379 20382 2e2d964 20377->20382 20380 2e2f6e8 __crtLCMapStringA_stat LCMapStringW 20378->20380 20379->20382 20383 2e2d9c8 20380->20383 20381 2e2db07 __freea 59 API calls 20381->20373 20382->20373 20382->20376 20384 2e2da0a 20383->20384 20385 2e2d9de 20383->20385 20383->20394 20389 2e22fac _malloc 59 API calls 20384->20389 20392 2e2da32 20384->20392 20386 2e2f6e8 __crtLCMapStringA_stat LCMapStringW 20385->20386 20385->20394 20386->20394 20387 2e2f6e8 __crtLCMapStringA_stat LCMapStringW 20388 2e2da75 20387->20388 20390 2e2da9d 20388->20390 20393 2e2da8f WideCharToMultiByte 20388->20393 20389->20392 20391 2e2db07 __freea 59 API calls 20390->20391 20391->20394 20392->20387 20392->20394 20393->20390 20394->20381 20395->20336 20397 2e26cd5 20396->20397 20398 2e26cc7 20396->20398 20399 2e25e5b _malloc 59 API calls 20397->20399 20398->20397 20402 2e26ceb 20398->20402 20400 2e26cdc 20399->20400 20401 2e24ef5 __commit 9 API calls 20400->20401 20403 2e26ce6 20401->20403 20402->20403 20404 2e25e5b _malloc 59 API calls 20402->20404 20403->20146 20404->20400 20406 2e2d2e2 RtlEncodePointer 20405->20406 20406->20406 20407 2e2d2fc 20406->20407 20407->20153 20409 2e291c3 TlsFree 20408->20409 20410 2e291bf 20408->20410 20409->20159 20410->20159 20413 2e25afb __commit 20411->20413 20412 2e25b14 20415 2e25b23 20412->20415 20417 2e22f74 _free 59 API calls 20412->20417 20413->20412 20414 2e22f74 _free 59 API calls 20413->20414 20416 2e25c03 __commit 20413->20416 20414->20412 20418 2e25b32 20415->20418 20419 2e22f74 _free 59 API calls 20415->20419 20416->20208 20417->20415 20420 2e25b41 20418->20420 20422 2e22f74 _free 59 API calls 20418->20422 20419->20418 20421 2e25b50 20420->20421 20423 2e22f74 _free 59 API calls 20420->20423 20424 2e25b5f 20421->20424 20425 2e22f74 _free 59 API calls 20421->20425 20422->20420 20423->20421 20426 2e25b6e 20424->20426 20427 2e22f74 _free 59 API calls 20424->20427 20425->20424 20428 2e25b80 20426->20428 20430 2e22f74 _free 59 API calls 20426->20430 20427->20426 20429 2e288ee __lock 59 API calls 20428->20429 20433 2e25b88 20429->20433 20430->20428 20431 2e25bab 20443 2e25c0f 20431->20443 20433->20431 20435 2e22f74 _free 59 API calls 20433->20435 20435->20431 20436 2e288ee __lock 59 API calls 20437 2e25bbf ___removelocaleref 20436->20437 20442 2e25bf0 20437->20442 20446 2e24fc5 20437->20446 20440 2e22f74 _free 59 API calls 20440->20416 20476 2e25c1b 20442->20476 20479 2e28a58 RtlLeaveCriticalSection 20443->20479 20445 2e25bb8 20445->20436 20447 2e2503e 20446->20447 20448 2e24fda 20446->20448 20449 2e2508b 20447->20449 20450 2e22f74 _free 59 API calls 20447->20450 20448->20447 20456 2e22f74 _free 59 API calls 20448->20456 20459 2e2500b 20448->20459 20460 2e250b4 20449->20460 20520 2e2d53d 20449->20520 20452 2e2505f 20450->20452 20454 2e22f74 _free 59 API calls 20452->20454 20461 2e25072 20454->20461 20455 2e22f74 _free 59 API calls 20464 2e25033 20455->20464 20465 2e25000 20456->20465 20457 2e22f74 _free 59 API calls 20457->20460 20458 2e25113 20466 2e22f74 _free 59 API calls 20458->20466 20462 2e22f74 _free 59 API calls 20459->20462 20475 2e25029 20459->20475 20460->20458 20470 2e22f74 59 API calls _free 20460->20470 20463 2e22f74 _free 59 API calls 20461->20463 20467 2e2501e 20462->20467 20468 2e25080 20463->20468 20469 2e22f74 _free 59 API calls 20464->20469 20480 2e2d3da 20465->20480 20472 2e25119 20466->20472 20508 2e2d4d6 20467->20508 20474 2e22f74 _free 59 API calls 20468->20474 20469->20447 20470->20460 20472->20442 20474->20449 20475->20455 20696 2e28a58 RtlLeaveCriticalSection 20476->20696 20478 2e25bfd 20478->20440 20479->20445 20481 2e2d3e9 20480->20481 20507 2e2d4d2 20480->20507 20482 2e22f74 _free 59 API calls 20481->20482 20483 2e2d3fa 20481->20483 20482->20483 20484 2e2d40c 20483->20484 20486 2e22f74 _free 59 API calls 20483->20486 20485 2e2d41e 20484->20485 20487 2e22f74 _free 59 API calls 20484->20487 20488 2e2d430 20485->20488 20489 2e22f74 _free 59 API calls 20485->20489 20486->20484 20487->20485 20490 2e2d442 20488->20490 20491 2e22f74 _free 59 API calls 20488->20491 20489->20488 20492 2e2d454 20490->20492 20494 2e22f74 _free 59 API calls 20490->20494 20491->20490 20493 2e2d466 20492->20493 20495 2e22f74 _free 59 API calls 20492->20495 20496 2e2d478 20493->20496 20497 2e22f74 _free 59 API calls 20493->20497 20494->20492 20495->20493 20498 2e2d48a 20496->20498 20499 2e22f74 _free 59 API calls 20496->20499 20497->20496 20500 2e2d49c 20498->20500 20502 2e22f74 _free 59 API calls 20498->20502 20499->20498 20501 2e2d4ae 20500->20501 20503 2e22f74 _free 59 API calls 20500->20503 20504 2e2d4c0 20501->20504 20505 2e22f74 _free 59 API calls 20501->20505 20502->20500 20503->20501 20506 2e22f74 _free 59 API calls 20504->20506 20504->20507 20505->20504 20506->20507 20507->20459 20509 2e2d4e1 20508->20509 20519 2e2d539 20508->20519 20510 2e22f74 _free 59 API calls 20509->20510 20514 2e2d4f1 20509->20514 20510->20514 20511 2e22f74 _free 59 API calls 20513 2e2d503 20511->20513 20512 2e2d515 20516 2e2d527 20512->20516 20517 2e22f74 _free 59 API calls 20512->20517 20513->20512 20515 2e22f74 _free 59 API calls 20513->20515 20514->20511 20514->20513 20515->20512 20518 2e22f74 _free 59 API calls 20516->20518 20516->20519 20517->20516 20518->20519 20519->20475 20521 2e2d54c 20520->20521 20695 2e250a9 20520->20695 20522 2e22f74 _free 59 API calls 20521->20522 20523 2e2d554 20522->20523 20524 2e22f74 _free 59 API calls 20523->20524 20525 2e2d55c 20524->20525 20526 2e22f74 _free 59 API calls 20525->20526 20527 2e2d564 20526->20527 20528 2e22f74 _free 59 API calls 20527->20528 20529 2e2d56c 20528->20529 20530 2e22f74 _free 59 API calls 20529->20530 20531 2e2d574 20530->20531 20532 2e22f74 _free 59 API calls 20531->20532 20533 2e2d57c 20532->20533 20534 2e22f74 _free 59 API calls 20533->20534 20535 2e2d583 20534->20535 20536 2e22f74 _free 59 API calls 20535->20536 20537 2e2d58b 20536->20537 20538 2e22f74 _free 59 API calls 20537->20538 20539 2e2d593 20538->20539 20540 2e22f74 _free 59 API calls 20539->20540 20541 2e2d59b 20540->20541 20542 2e22f74 _free 59 API calls 20541->20542 20543 2e2d5a3 20542->20543 20544 2e22f74 _free 59 API calls 20543->20544 20545 2e2d5ab 20544->20545 20546 2e22f74 _free 59 API calls 20545->20546 20547 2e2d5b3 20546->20547 20548 2e22f74 _free 59 API calls 20547->20548 20549 2e2d5bb 20548->20549 20550 2e22f74 _free 59 API calls 20549->20550 20551 2e2d5c3 20550->20551 20552 2e22f74 _free 59 API calls 20551->20552 20553 2e2d5cb 20552->20553 20554 2e22f74 _free 59 API calls 20553->20554 20555 2e2d5d6 20554->20555 20556 2e22f74 _free 59 API calls 20555->20556 20557 2e2d5de 20556->20557 20558 2e22f74 _free 59 API calls 20557->20558 20559 2e2d5e6 20558->20559 20560 2e22f74 _free 59 API calls 20559->20560 20561 2e2d5ee 20560->20561 20562 2e22f74 _free 59 API calls 20561->20562 20563 2e2d5f6 20562->20563 20564 2e22f74 _free 59 API calls 20563->20564 20565 2e2d5fe 20564->20565 20566 2e22f74 _free 59 API calls 20565->20566 20567 2e2d606 20566->20567 20568 2e22f74 _free 59 API calls 20567->20568 20569 2e2d60e 20568->20569 20570 2e22f74 _free 59 API calls 20569->20570 20571 2e2d616 20570->20571 20572 2e22f74 _free 59 API calls 20571->20572 20573 2e2d61e 20572->20573 20574 2e22f74 _free 59 API calls 20573->20574 20575 2e2d626 20574->20575 20576 2e22f74 _free 59 API calls 20575->20576 20577 2e2d62e 20576->20577 20578 2e22f74 _free 59 API calls 20577->20578 20579 2e2d636 20578->20579 20580 2e22f74 _free 59 API calls 20579->20580 20581 2e2d63e 20580->20581 20582 2e22f74 _free 59 API calls 20581->20582 20583 2e2d646 20582->20583 20584 2e22f74 _free 59 API calls 20583->20584 20585 2e2d64e 20584->20585 20586 2e22f74 _free 59 API calls 20585->20586 20587 2e2d65c 20586->20587 20588 2e22f74 _free 59 API calls 20587->20588 20589 2e2d667 20588->20589 20590 2e22f74 _free 59 API calls 20589->20590 20591 2e2d672 20590->20591 20592 2e22f74 _free 59 API calls 20591->20592 20593 2e2d67d 20592->20593 20594 2e22f74 _free 59 API calls 20593->20594 20595 2e2d688 20594->20595 20596 2e22f74 _free 59 API calls 20595->20596 20597 2e2d693 20596->20597 20598 2e22f74 _free 59 API calls 20597->20598 20599 2e2d69e 20598->20599 20600 2e22f74 _free 59 API calls 20599->20600 20601 2e2d6a9 20600->20601 20602 2e22f74 _free 59 API calls 20601->20602 20603 2e2d6b4 20602->20603 20604 2e22f74 _free 59 API calls 20603->20604 20605 2e2d6bf 20604->20605 20606 2e22f74 _free 59 API calls 20605->20606 20607 2e2d6ca 20606->20607 20608 2e22f74 _free 59 API calls 20607->20608 20609 2e2d6d5 20608->20609 20610 2e22f74 _free 59 API calls 20609->20610 20611 2e2d6e0 20610->20611 20612 2e22f74 _free 59 API calls 20611->20612 20613 2e2d6eb 20612->20613 20614 2e22f74 _free 59 API calls 20613->20614 20615 2e2d6f6 20614->20615 20616 2e22f74 _free 59 API calls 20615->20616 20617 2e2d701 20616->20617 20618 2e22f74 _free 59 API calls 20617->20618 20619 2e2d70f 20618->20619 20620 2e22f74 _free 59 API calls 20619->20620 20621 2e2d71a 20620->20621 20622 2e22f74 _free 59 API calls 20621->20622 20623 2e2d725 20622->20623 20624 2e22f74 _free 59 API calls 20623->20624 20625 2e2d730 20624->20625 20626 2e22f74 _free 59 API calls 20625->20626 20627 2e2d73b 20626->20627 20628 2e22f74 _free 59 API calls 20627->20628 20629 2e2d746 20628->20629 20630 2e22f74 _free 59 API calls 20629->20630 20631 2e2d751 20630->20631 20632 2e22f74 _free 59 API calls 20631->20632 20633 2e2d75c 20632->20633 20634 2e22f74 _free 59 API calls 20633->20634 20635 2e2d767 20634->20635 20636 2e22f74 _free 59 API calls 20635->20636 20637 2e2d772 20636->20637 20638 2e22f74 _free 59 API calls 20637->20638 20639 2e2d77d 20638->20639 20640 2e22f74 _free 59 API calls 20639->20640 20641 2e2d788 20640->20641 20642 2e22f74 _free 59 API calls 20641->20642 20643 2e2d793 20642->20643 20644 2e22f74 _free 59 API calls 20643->20644 20645 2e2d79e 20644->20645 20646 2e22f74 _free 59 API calls 20645->20646 20647 2e2d7a9 20646->20647 20648 2e22f74 _free 59 API calls 20647->20648 20649 2e2d7b4 20648->20649 20650 2e22f74 _free 59 API calls 20649->20650 20651 2e2d7c2 20650->20651 20652 2e22f74 _free 59 API calls 20651->20652 20653 2e2d7cd 20652->20653 20654 2e22f74 _free 59 API calls 20653->20654 20655 2e2d7d8 20654->20655 20656 2e22f74 _free 59 API calls 20655->20656 20657 2e2d7e3 20656->20657 20658 2e22f74 _free 59 API calls 20657->20658 20659 2e2d7ee 20658->20659 20660 2e22f74 _free 59 API calls 20659->20660 20661 2e2d7f9 20660->20661 20662 2e22f74 _free 59 API calls 20661->20662 20663 2e2d804 20662->20663 20664 2e22f74 _free 59 API calls 20663->20664 20665 2e2d80f 20664->20665 20666 2e22f74 _free 59 API calls 20665->20666 20667 2e2d81a 20666->20667 20668 2e22f74 _free 59 API calls 20667->20668 20669 2e2d825 20668->20669 20670 2e22f74 _free 59 API calls 20669->20670 20671 2e2d830 20670->20671 20672 2e22f74 _free 59 API calls 20671->20672 20673 2e2d83b 20672->20673 20674 2e22f74 _free 59 API calls 20673->20674 20675 2e2d846 20674->20675 20676 2e22f74 _free 59 API calls 20675->20676 20677 2e2d851 20676->20677 20678 2e22f74 _free 59 API calls 20677->20678 20679 2e2d85c 20678->20679 20680 2e22f74 _free 59 API calls 20679->20680 20681 2e2d867 20680->20681 20682 2e22f74 _free 59 API calls 20681->20682 20683 2e2d875 20682->20683 20684 2e22f74 _free 59 API calls 20683->20684 20685 2e2d880 20684->20685 20686 2e22f74 _free 59 API calls 20685->20686 20687 2e2d88b 20686->20687 20688 2e22f74 _free 59 API calls 20687->20688 20689 2e2d896 20688->20689 20690 2e22f74 _free 59 API calls 20689->20690 20691 2e2d8a1 20690->20691 20692 2e22f74 _free 59 API calls 20691->20692 20693 2e2d8ac 20692->20693 20694 2e22f74 _free 59 API calls 20693->20694 20694->20695 20695->20457 20696->20478 20697 2e4e84a DeleteFileA 20698 2e4e857 20697->20698 19887 40da0f 19888 40dad5 VirtualAlloc 19887->19888 19889 2e58ff5 19890 2e6c3f1 19889->19890 19893 2e1f9a7 LoadLibraryA 19890->19893 19894 2e1f9d0 GetProcAddress 19893->19894 19895 2e1fa8a 19893->19895 19896 2e1fa83 FreeLibrary 19894->19896 19898 2e1f9e4 19894->19898 19896->19895 19897 2e1f9f6 GetAdaptersInfo 19897->19898 19898->19897 19899 2e1fa7e 19898->19899 19900 2e23b4c _Allocate 60 API calls 19898->19900 19899->19896 19900->19898 20699 40d071 20702 401f27 20699->20702 20703 401f3c 20702->20703 20706 401a1d 20703->20706 20705 401f45 20707 401a2c 20706->20707 20712 401a4f CreateFileA 20707->20712 20711 401a3e 20711->20705 20713 401a35 20712->20713 20719 401a7d 20712->20719 20720 401b4b LoadLibraryA 20713->20720 20714 401a98 DeviceIoControl 20714->20719 20716 401b3a CloseHandle 20716->20713 20717 401b0e GetLastError 20717->20716 20717->20719 20719->20714 20719->20716 20719->20717 20729 402c76 20719->20729 20732 402c68 20719->20732 20721 401c21 20720->20721 20722 401b6e GetProcAddress 20720->20722 20721->20711 20723 401c18 FreeLibrary 20722->20723 20725 401b85 20722->20725 20723->20721 20724 401b95 GetAdaptersInfo 20724->20725 20725->20724 20726 401c15 20725->20726 20727 402c76 7 API calls 20725->20727 20728 402c68 12 API calls 20725->20728 20726->20723 20727->20725 20728->20725 20730 403071 7 API calls 20729->20730 20731 402c7f 20730->20731 20731->20719 20733 402fd1 12 API calls 20732->20733 20734 402c73 20733->20734 20734->20719 19901 402193 19902 40225b RegOpenKeyExA 19901->19902 19904 4026f4 19902->19904 20735 40d473 CreateDirectoryA 20736 40d6dd 20735->20736 19905 402214 19906 40da70 OpenSCManagerA 19905->19906 20737 402235 CopyFileA 20738 40d363 20737->20738 20739 2e63310 20740 2e63e30 Sleep 20739->20740 19910 2e6083f 19911 2eaee53 WriteFile 19910->19911 19912 40d99a LoadLibraryExA 20741 40227a 20742 40d98a RegCloseKey 20741->20742

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 2e172ab-2e172c3 InternetOpenA 1 2e17389-2e1738f 0->1 2 2e172c9-2e17340 InternetSetOptionA * 3 call 2e24af0 InternetOpenUrlA 0->2 3 2e17391-2e17397 1->3 4 2e173ab-2e173b9 1->4 15 2e17382-2e17383 InternetCloseHandle 2->15 16 2e17342 2->16 6 2e17399-2e1739b 3->6 7 2e1739d-2e173aa call 2e153ec 3->7 8 2e166f4-2e166f6 4->8 9 2e173bf-2e173e3 call 2e24af0 call 2e1439c 4->9 6->4 7->4 13 2e166f8-2e166fd 8->13 14 2e166ff-2e16701 8->14 9->8 33 2e173e9-2e17417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e2233c 9->33 21 2e16708 Sleep 13->21 19 2e16703 14->19 20 2e1670e-2e16742 RtlEnterCriticalSection RtlLeaveCriticalSection 14->20 15->1 22 2e17346-2e1736c InternetReadFile 16->22 19->21 23 2e16792 20->23 24 2e16744-2e16750 20->24 21->20 26 2e17377-2e1737e InternetCloseHandle 22->26 27 2e1736e-2e17375 22->27 29 2e16796 23->29 24->23 28 2e16752-2e1675f 24->28 26->15 27->22 31 2e16761-2e16765 28->31 32 2e16767-2e16768 28->32 29->0 34 2e1676c-2e16790 call 2e24af0 * 2 31->34 32->34 38 2e17419-2e1742b call 2e2233c 33->38 39 2e1746d-2e17488 call 2e2233c 33->39 34->29 38->39 49 2e1742d-2e1743f call 2e2233c 38->49 47 2e17742-2e17754 call 2e2233c 39->47 48 2e1748e-2e17490 39->48 56 2e17756-2e17758 47->56 57 2e1779d-2e177af call 2e2233c 47->57 48->47 51 2e17496-2e17548 call 2e22fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2e24af0 * 5 call 2e1439c * 2 48->51 49->39 59 2e17441-2e17453 call 2e2233c 49->59 112 2e17585 51->112 113 2e1754a-2e1754c 51->113 56->57 60 2e1775a-2e17798 call 2e24af0 RtlEnterCriticalSection RtlLeaveCriticalSection 56->60 70 2e177b1-2e177cb call 2e161f5 call 2e16303 call 2e1640e 57->70 71 2e177d0-2e177e2 call 2e2233c 57->71 59->39 72 2e17455-2e17467 call 2e2233c 59->72 60->8 70->8 81 2e17b00-2e17b12 call 2e2233c 71->81 82 2e177e8-2e177ea 71->82 72->8 72->39 81->8 94 2e17b18-2e17b46 call 2e22fac call 2e24af0 call 2e1439c 81->94 82->81 86 2e177f0-2e17807 call 2e1439c 82->86 86->8 98 2e1780d-2e178db call 2e22418 call 2e11ba7 86->98 120 2e17b48-2e17b4a call 2e1534d 94->120 121 2e17b4f-2e17b56 call 2e22f74 94->121 115 2e178e2-2e17903 RtlEnterCriticalSection 98->115 116 2e178dd call 2e1143f 98->116 122 2e17589-2e175b7 call 2e22fac call 2e24af0 call 2e1439c 112->122 113->112 119 2e1754e-2e17560 call 2e2233c 113->119 117 2e17905-2e1790c 115->117 118 2e1790f-2e17973 RtlLeaveCriticalSection call 2e13c67 call 2e13d7e call 2e1833b 115->118 116->115 117->118 146 2e17ae7-2e17afb call 2e19003 118->146 147 2e17979-2e179c1 call 2e1a725 118->147 119->112 134 2e17562-2e17583 call 2e1439c 119->134 120->121 121->8 144 2e175b9-2e175c8 call 2e235e6 122->144 145 2e175f8-2e17601 call 2e22f74 122->145 134->122 144->145 156 2e175ca 144->156 159 2e17607-2e1761f call 2e23b4c 145->159 160 2e17738-2e1773b 145->160 146->8 157 2e17ab1-2e17ae2 call 2e183ea call 2e133b2 147->157 158 2e179c7-2e179ce 147->158 162 2e175cf-2e175e1 call 2e22850 156->162 157->146 164 2e179d1-2e179d6 158->164 169 2e17621-2e17629 call 2e19737 159->169 170 2e1762b 159->170 160->47 176 2e175e3 162->176 177 2e175e6-2e175f6 call 2e235e6 162->177 164->164 168 2e179d8-2e17a23 call 2e1a725 164->168 168->157 179 2e17a29-2e17a2f 168->179 175 2e1762d-2e176e5 call 2e1a84f call 2e13863 call 2e15119 call 2e13863 call 2e1aaf5 call 2e1ac0f 169->175 170->175 202 2e176e7 call 2e1380b 175->202 203 2e176ec-2e17717 Sleep call 2e218f0 175->203 176->177 177->145 177->162 183 2e17a32-2e17a37 179->183 183->183 186 2e17a39-2e17a74 call 2e1a725 183->186 186->157 192 2e17a76-2e17ab0 call 2e1d117 186->192 192->157 202->203 207 2e17723-2e17731 203->207 208 2e17719-2e17722 call 2e14100 203->208 207->160 210 2e17733 call 2e1380b 207->210 208->207 210->160
                                                                APIs
                                                                • Sleep.KERNEL32(0000EA60), ref: 02E16708
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E16713
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E16724
                                                                • _memset.LIBCMT ref: 02E16779
                                                                • _memset.LIBCMT ref: 02E16788
                                                                • InternetOpenA.WININET(?), ref: 02E172B5
                                                                • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02E172DD
                                                                • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02E172F5
                                                                • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02E1730D
                                                                • _memset.LIBCMT ref: 02E1731D
                                                                • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02E17336
                                                                • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02E17358
                                                                • InternetCloseHandle.WININET(00000000), ref: 02E17378
                                                                • InternetCloseHandle.WININET(00000000), ref: 02E17383
                                                                • _memset.LIBCMT ref: 02E173CB
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E173EE
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E173FF
                                                                • _malloc.LIBCMT ref: 02E17498
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E174AA
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E174B6
                                                                • _memset.LIBCMT ref: 02E174D0
                                                                • _memset.LIBCMT ref: 02E174DF
                                                                • _memset.LIBCMT ref: 02E174EF
                                                                • _memset.LIBCMT ref: 02E17502
                                                                • _memset.LIBCMT ref: 02E17518
                                                                • _malloc.LIBCMT ref: 02E1758E
                                                                • _memset.LIBCMT ref: 02E1759F
                                                                • _strtok.LIBCMT ref: 02E175BF
                                                                • _swscanf.LIBCMT ref: 02E175D6
                                                                • _strtok.LIBCMT ref: 02E175ED
                                                                • _free.LIBCMT ref: 02E175F9
                                                                • Sleep.KERNEL32(000007D0), ref: 02E176F1
                                                                • _memset.LIBCMT ref: 02E17765
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E17772
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E17784
                                                                • _sprintf.LIBCMT ref: 02E17822
                                                                • RtlEnterCriticalSection.NTDLL(00000020), ref: 02E178E6
                                                                • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02E1791A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                • API String ID: 696907137-1839899575
                                                                • Opcode ID: 43a16570958ef70faf21832a9c34c905874eef48f6317a0ea9d243d97194e98f
                                                                • Instruction ID: fbecc5113ec73cc9eaaf4b3cef2120e9bc6a16a34ff5da71eb32618a99a0830c
                                                                • Opcode Fuzzy Hash: 43a16570958ef70faf21832a9c34c905874eef48f6317a0ea9d243d97194e98f
                                                                • Instruction Fuzzy Hash: 763223725C83819FE735AB20DC05BAFBBE6AF85714F10982DF58A87290EB709544CF52

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 213 2e1648b-2e166f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2e142c7 GetTickCount call 2e1605a GetVersionExA call 2e24af0 call 2e22fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2e24af0 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e22fac * 4 QueryPerformanceCounter Sleep call 2e22fac * 2 call 2e24af0 * 2 258 2e166f4-2e166f6 213->258 259 2e166f8-2e166fd 258->259 260 2e166ff-2e16701 258->260 263 2e16708 Sleep 259->263 261 2e16703 260->261 262 2e1670e-2e16742 RtlEnterCriticalSection RtlLeaveCriticalSection 260->262 261->263 264 2e16792 262->264 265 2e16744-2e16750 262->265 263->262 267 2e16796-2e172c3 InternetOpenA 264->267 265->264 266 2e16752-2e1675f 265->266 268 2e16761-2e16765 266->268 269 2e16767-2e16768 266->269 272 2e17389-2e1738f 267->272 273 2e172c9-2e17340 InternetSetOptionA * 3 call 2e24af0 InternetOpenUrlA 267->273 271 2e1676c-2e16790 call 2e24af0 * 2 268->271 269->271 271->267 274 2e17391-2e17397 272->274 275 2e173ab-2e173b9 272->275 286 2e17382-2e17383 InternetCloseHandle 273->286 287 2e17342 273->287 278 2e17399-2e1739b 274->278 279 2e1739d-2e173aa call 2e153ec 274->279 275->258 281 2e173bf-2e173e3 call 2e24af0 call 2e1439c 275->281 278->275 279->275 281->258 296 2e173e9-2e17417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e2233c 281->296 286->272 291 2e17346-2e1736c InternetReadFile 287->291 293 2e17377-2e1737e InternetCloseHandle 291->293 294 2e1736e-2e17375 291->294 293->286 294->291 299 2e17419-2e1742b call 2e2233c 296->299 300 2e1746d-2e17488 call 2e2233c 296->300 299->300 307 2e1742d-2e1743f call 2e2233c 299->307 305 2e17742-2e17754 call 2e2233c 300->305 306 2e1748e-2e17490 300->306 314 2e17756-2e17758 305->314 315 2e1779d-2e177af call 2e2233c 305->315 306->305 309 2e17496-2e17548 call 2e22fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2e24af0 * 5 call 2e1439c * 2 306->309 307->300 317 2e17441-2e17453 call 2e2233c 307->317 370 2e17585 309->370 371 2e1754a-2e1754c 309->371 314->315 318 2e1775a-2e17798 call 2e24af0 RtlEnterCriticalSection RtlLeaveCriticalSection 314->318 328 2e177b1-2e177bf call 2e161f5 call 2e16303 315->328 329 2e177d0-2e177e2 call 2e2233c 315->329 317->300 330 2e17455-2e17467 call 2e2233c 317->330 318->258 346 2e177c4-2e177cb call 2e1640e 328->346 339 2e17b00-2e17b12 call 2e2233c 329->339 340 2e177e8-2e177ea 329->340 330->258 330->300 339->258 352 2e17b18-2e17b46 call 2e22fac call 2e24af0 call 2e1439c 339->352 340->339 344 2e177f0-2e17807 call 2e1439c 340->344 344->258 356 2e1780d-2e178db call 2e22418 call 2e11ba7 344->356 346->258 378 2e17b48-2e17b4a call 2e1534d 352->378 379 2e17b4f-2e17b56 call 2e22f74 352->379 373 2e178e2-2e17903 RtlEnterCriticalSection 356->373 374 2e178dd call 2e1143f 356->374 380 2e17589-2e175b7 call 2e22fac call 2e24af0 call 2e1439c 370->380 371->370 377 2e1754e-2e17560 call 2e2233c 371->377 375 2e17905-2e1790c 373->375 376 2e1790f-2e17973 RtlLeaveCriticalSection call 2e13c67 call 2e13d7e call 2e1833b 373->376 374->373 375->376 404 2e17ae7-2e17afb call 2e19003 376->404 405 2e17979-2e179c1 call 2e1a725 376->405 377->370 392 2e17562-2e17583 call 2e1439c 377->392 378->379 379->258 402 2e175b9-2e175c8 call 2e235e6 380->402 403 2e175f8-2e17601 call 2e22f74 380->403 392->380 402->403 414 2e175ca 402->414 417 2e17607-2e1761f call 2e23b4c 403->417 418 2e17738-2e1773b 403->418 404->258 415 2e17ab1-2e17ae2 call 2e183ea call 2e133b2 405->415 416 2e179c7-2e179ce 405->416 420 2e175cf-2e175e1 call 2e22850 414->420 415->404 422 2e179d1-2e179d6 416->422 427 2e17621-2e17629 call 2e19737 417->427 428 2e1762b 417->428 418->305 434 2e175e3 420->434 435 2e175e6-2e175f6 call 2e235e6 420->435 422->422 426 2e179d8-2e17a23 call 2e1a725 422->426 426->415 437 2e17a29-2e17a2f 426->437 433 2e1762d-2e176e5 call 2e1a84f call 2e13863 call 2e15119 call 2e13863 call 2e1aaf5 call 2e1ac0f 427->433 428->433 460 2e176e7 call 2e1380b 433->460 461 2e176ec-2e17717 Sleep call 2e218f0 433->461 434->435 435->403 435->420 441 2e17a32-2e17a37 437->441 441->441 444 2e17a39-2e17a74 call 2e1a725 441->444 444->415 450 2e17a76-2e17ab0 call 2e1d117 444->450 450->415 460->461 465 2e17723-2e17731 461->465 466 2e17719-2e17722 call 2e14100 461->466 465->418 468 2e17733 call 2e1380b 465->468 466->465 468->418
                                                                APIs
                                                                • RtlInitializeCriticalSection.NTDLL(02E471E0), ref: 02E164BA
                                                                • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02E164D1
                                                                • GetProcAddress.KERNEL32(00000000), ref: 02E164DA
                                                                • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02E164E9
                                                                • GetProcAddress.KERNEL32(00000000), ref: 02E164EC
                                                                • GetTickCount.KERNEL32 ref: 02E164F8
                                                                  • Part of subcall function 02E1605A: _malloc.LIBCMT ref: 02E16068
                                                                • GetVersionExA.KERNEL32(02E47038), ref: 02E16525
                                                                • _memset.LIBCMT ref: 02E16544
                                                                • _malloc.LIBCMT ref: 02E16551
                                                                  • Part of subcall function 02E22FAC: __FF_MSGBANNER.LIBCMT ref: 02E22FC3
                                                                  • Part of subcall function 02E22FAC: __NMSG_WRITE.LIBCMT ref: 02E22FCA
                                                                  • Part of subcall function 02E22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02E22FEF
                                                                • _malloc.LIBCMT ref: 02E16561
                                                                • _malloc.LIBCMT ref: 02E1656C
                                                                • _malloc.LIBCMT ref: 02E16577
                                                                • _malloc.LIBCMT ref: 02E16582
                                                                • _malloc.LIBCMT ref: 02E1658D
                                                                • _malloc.LIBCMT ref: 02E16598
                                                                • _malloc.LIBCMT ref: 02E165A7
                                                                • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02E165BE
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 02E165C7
                                                                • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02E165D6
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 02E165D9
                                                                • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02E165E4
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 02E165E7
                                                                • _memset.LIBCMT ref: 02E165FA
                                                                • _memset.LIBCMT ref: 02E16606
                                                                • _memset.LIBCMT ref: 02E16613
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E16621
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E1662E
                                                                • _malloc.LIBCMT ref: 02E16652
                                                                • _malloc.LIBCMT ref: 02E16660
                                                                • _malloc.LIBCMT ref: 02E16667
                                                                • _malloc.LIBCMT ref: 02E1668D
                                                                • QueryPerformanceCounter.KERNEL32(00000200), ref: 02E166A0
                                                                • Sleep.KERNEL32 ref: 02E166AE
                                                                • _malloc.LIBCMT ref: 02E166BA
                                                                • _malloc.LIBCMT ref: 02E166C7
                                                                • _memset.LIBCMT ref: 02E166DC
                                                                • _memset.LIBCMT ref: 02E166EC
                                                                • Sleep.KERNEL32(0000EA60), ref: 02E16708
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E16713
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E16724
                                                                • _memset.LIBCMT ref: 02E16779
                                                                • _memset.LIBCMT ref: 02E16788
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                • API String ID: 2251652938-2678694477
                                                                • Opcode ID: f41479d85f056863a239c0ec2ea5787de2988175c9ac55526fdc7a8c4fcefbff
                                                                • Instruction ID: cb822799b367c186c5cfa1f4235bfe087d78490869a5116602dcf70c81cda6a6
                                                                • Opcode Fuzzy Hash: f41479d85f056863a239c0ec2ea5787de2988175c9ac55526fdc7a8c4fcefbff
                                                                • Instruction Fuzzy Hash: CB71E8B1DC83509FE710AF31AC49B5BBBE8AF85310F159C29F98597280DBB45844CF96

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 905 401b4b-401b68 LoadLibraryA 906 401c21-401c25 905->906 907 401b6e-401b7f GetProcAddress 905->907 908 401b85-401b8e 907->908 909 401c18-401c1b FreeLibrary 907->909 910 401b95-401ba5 GetAdaptersInfo 908->910 909->906 911 401ba7-401bb0 910->911 912 401bdb-401be3 910->912 913 401bc1-401bd7 call 402c90 call 4018cc 911->913 914 401bb2-401bb6 911->914 915 401be5-401beb call 402c76 912->915 916 401bec-401bf0 912->916 913->912 914->912 919 401bb8-401bbf 914->919 915->916 917 401bf2-401bf6 916->917 918 401c15-401c17 916->918 917->918 922 401bf8-401bfb 917->922 918->909 919->913 919->914 925 401c06-401c13 call 402c68 922->925 926 401bfd-401c03 922->926 925->910 925->918 926->925
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00401B5D
                                                                • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                • API String ID: 514930453-3667123677
                                                                • Opcode ID: 00475e348da22e35b30bb76a6ddbd83b85685abfafb1445622092197d35088d9
                                                                • Instruction ID: b67a46cb0440f0119c2f157d80362e3130a6e0b0221a573a35907ba0cbcda0f7
                                                                • Opcode Fuzzy Hash: 00475e348da22e35b30bb76a6ddbd83b85685abfafb1445622092197d35088d9
                                                                • Instruction Fuzzy Hash: DC21BB70904109AEEF119F65C9487EF7BB8EF41344F14407AD504B21E1E7789985CB69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 956 2e1f9a7-2e1f9ca LoadLibraryA 957 2e1f9d0-2e1f9de GetProcAddress 956->957 958 2e1fa8a-2e1fa91 956->958 959 2e1fa83-2e1fa84 FreeLibrary 957->959 960 2e1f9e4-2e1f9f4 957->960 959->958 961 2e1f9f6-2e1fa02 GetAdaptersInfo 960->961 962 2e1fa04 961->962 963 2e1fa3a-2e1fa42 961->963 966 2e1fa06-2e1fa0d 962->966 964 2e1fa44-2e1fa4a call 2e237a8 963->964 965 2e1fa4b-2e1fa50 963->965 964->965 968 2e1fa52-2e1fa55 965->968 969 2e1fa7e-2e1fa82 965->969 970 2e1fa17-2e1fa1f 966->970 971 2e1fa0f-2e1fa13 966->971 968->969 973 2e1fa57-2e1fa5c 968->973 969->959 975 2e1fa22-2e1fa27 970->975 971->966 974 2e1fa15 971->974 976 2e1fa69-2e1fa74 call 2e23b4c 973->976 977 2e1fa5e-2e1fa66 973->977 974->963 975->975 978 2e1fa29-2e1fa36 call 2e1f6f6 975->978 976->969 983 2e1fa76-2e1fa79 976->983 977->976 978->963 983->961
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02E1F9BD
                                                                • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02E1F9D6
                                                                • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02E1F9FB
                                                                • FreeLibrary.KERNEL32(00000000), ref: 02E1FA84
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                • API String ID: 514930453-3114217049
                                                                • Opcode ID: b65d971bd50b6f98fb5debee42372a8f2260d9286d498badb53155de00762802
                                                                • Instruction ID: 73c3bd21fdedf1e6fa7ba845b983f7582136cf6795239e65bd2f55c57b32de18
                                                                • Opcode Fuzzy Hash: b65d971bd50b6f98fb5debee42372a8f2260d9286d498badb53155de00762802
                                                                • Instruction Fuzzy Hash: 3021E971E80309ABDF10DBA8D8846EEBBF8AF05318F1491B5D505E7650E7388945CBE0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 984 2e1f8a3-2e1f8ce CreateFileA 985 2e1f8d4-2e1f8e9 984->985 986 2e1f99f-2e1f9a6 984->986 987 2e1f8ec-2e1f90e DeviceIoControl 985->987 988 2e1f910-2e1f918 987->988 989 2e1f947-2e1f94f 987->989 992 2e1f921-2e1f926 988->992 993 2e1f91a-2e1f91f 988->993 990 2e1f951-2e1f957 call 2e237a8 989->990 991 2e1f958-2e1f95a 989->991 990->991 995 2e1f995-2e1f99e CloseHandle 991->995 996 2e1f95c-2e1f95f 991->996 992->989 997 2e1f928-2e1f930 992->997 993->989 995->986 999 2e1f961-2e1f96a GetLastError 996->999 1000 2e1f97b-2e1f988 call 2e23b4c 996->1000 1001 2e1f933-2e1f938 997->1001 999->995 1002 2e1f96c-2e1f96f 999->1002 1000->995 1009 2e1f98a-2e1f990 1000->1009 1001->1001 1004 2e1f93a-2e1f946 call 2e1f6f6 1001->1004 1002->1000 1006 2e1f971-2e1f978 1002->1006 1004->989 1006->1000 1009->987
                                                                APIs
                                                                • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02E1F8C2
                                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02E1F900
                                                                • GetLastError.KERNEL32 ref: 02E1F961
                                                                • CloseHandle.KERNEL32(?), ref: 02E1F998
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                • String ID: \\.\PhysicalDrive0
                                                                • API String ID: 4026078076-1180397377
                                                                • Opcode ID: 08c8baec98aed69380d4ee8926a1385eb8b4fb25f9e7a12cfd6ee159e465caec
                                                                • Instruction ID: c79c6d97b780780088894b51a0e6622b51a3ddc7dc80927ba032406c513168a9
                                                                • Opcode Fuzzy Hash: 08c8baec98aed69380d4ee8926a1385eb8b4fb25f9e7a12cfd6ee159e465caec
                                                                • Instruction Fuzzy Hash: 4131AF71D80319BBDB14DF95D884AAEBBB9FF09718F20917AE505A7680C7705A00CBD0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1010 401a4f-401a77 CreateFileA 1011 401b45-401b4a 1010->1011 1012 401a7d-401a91 1010->1012 1013 401a98-401ac0 DeviceIoControl 1012->1013 1014 401ac2-401aca 1013->1014 1015 401af3-401afb 1013->1015 1018 401ad4-401ad9 1014->1018 1019 401acc-401ad2 1014->1019 1016 401b04-401b07 1015->1016 1017 401afd-401b03 call 402c76 1015->1017 1022 401b09-401b0c 1016->1022 1023 401b3a-401b44 CloseHandle 1016->1023 1017->1016 1018->1015 1020 401adb-401af1 call 402c90 call 4018cc 1018->1020 1019->1015 1020->1015 1026 401b27-401b34 call 402c68 1022->1026 1027 401b0e-401b17 GetLastError 1022->1027 1023->1011 1026->1013 1026->1023 1027->1023 1030 401b19-401b1c 1027->1030 1030->1026 1033 401b1e-401b24 1030->1033 1033->1026
                                                                APIs
                                                                • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                • DeviceIoControl.KERNEL32(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                • GetLastError.KERNEL32 ref: 00401B0E
                                                                • CloseHandle.KERNEL32(?), ref: 00401B3D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                • String ID: \\.\PhysicalDrive0
                                                                • API String ID: 4026078076-1180397377
                                                                • Opcode ID: c91871431a88629a506ba55eaf167caaf4980e475801c8b54d75723208b24763
                                                                • Instruction ID: 1dad4aa1e1b79fa7445fcdf25c3e2eccd9a6bfaaabb81a983c64703b045ac466
                                                                • Opcode Fuzzy Hash: c91871431a88629a506ba55eaf167caaf4980e475801c8b54d75723208b24763
                                                                • Instruction Fuzzy Hash: 67318D71D00218EADB21EFA5CD849EFBBB9FF41750F20407AE654B22A0E7745E45CB98

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 471 2e17be9-2e17bfe 472 2e17c00-2e17c07 471->472 473 2e17b86-2e17b8e 471->473 475 2e17b33-2e17b46 call 2e1439c 473->475 476 2e17b2e call 2e24af0 473->476 479 2e17b48-2e17b4a call 2e1534d 475->479 480 2e17b4f-2e17b56 call 2e22f74 475->480 476->475 479->480 484 2e166f4-2e166f6 480->484 485 2e166f8-2e166fd 484->485 486 2e166ff-2e16701 484->486 489 2e16708 Sleep 485->489 487 2e16703 486->487 488 2e1670e-2e16742 RtlEnterCriticalSection RtlLeaveCriticalSection 486->488 487->489 490 2e16792 488->490 491 2e16744-2e16750 488->491 489->488 493 2e16796-2e172c3 InternetOpenA 490->493 491->490 492 2e16752-2e1675f 491->492 494 2e16761-2e16765 492->494 495 2e16767-2e16768 492->495 498 2e17389-2e1738f 493->498 499 2e172c9-2e17340 InternetSetOptionA * 3 call 2e24af0 InternetOpenUrlA 493->499 497 2e1676c-2e16790 call 2e24af0 * 2 494->497 495->497 497->493 500 2e17391-2e17397 498->500 501 2e173ab-2e173b9 498->501 512 2e17382-2e17383 InternetCloseHandle 499->512 513 2e17342 499->513 504 2e17399-2e1739b 500->504 505 2e1739d-2e173aa call 2e153ec 500->505 501->484 507 2e173bf-2e173e3 call 2e24af0 call 2e1439c 501->507 504->501 505->501 507->484 522 2e173e9-2e17417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e2233c 507->522 512->498 517 2e17346-2e1736c InternetReadFile 513->517 519 2e17377-2e1737e InternetCloseHandle 517->519 520 2e1736e-2e17375 517->520 519->512 520->517 525 2e17419-2e1742b call 2e2233c 522->525 526 2e1746d-2e17488 call 2e2233c 522->526 525->526 533 2e1742d-2e1743f call 2e2233c 525->533 531 2e17742-2e17754 call 2e2233c 526->531 532 2e1748e-2e17490 526->532 540 2e17756-2e17758 531->540 541 2e1779d-2e177af call 2e2233c 531->541 532->531 535 2e17496-2e17548 call 2e22fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2e24af0 * 5 call 2e1439c * 2 532->535 533->526 543 2e17441-2e17453 call 2e2233c 533->543 594 2e17585 535->594 595 2e1754a-2e1754c 535->595 540->541 544 2e1775a-2e17798 call 2e24af0 RtlEnterCriticalSection RtlLeaveCriticalSection 540->544 554 2e177b1-2e177cb call 2e161f5 call 2e16303 call 2e1640e 541->554 555 2e177d0-2e177e2 call 2e2233c 541->555 543->526 556 2e17455-2e17467 call 2e2233c 543->556 544->484 554->484 565 2e17b00-2e17b12 call 2e2233c 555->565 566 2e177e8-2e177ea 555->566 556->484 556->526 565->484 578 2e17b18-2e17b2e call 2e22fac call 2e24af0 565->578 566->565 570 2e177f0-2e17807 call 2e1439c 566->570 570->484 582 2e1780d-2e178db call 2e22418 call 2e11ba7 570->582 578->475 596 2e178e2-2e17903 RtlEnterCriticalSection 582->596 597 2e178dd call 2e1143f 582->597 601 2e17589-2e175b7 call 2e22fac call 2e24af0 call 2e1439c 594->601 595->594 600 2e1754e-2e17560 call 2e2233c 595->600 598 2e17905-2e1790c 596->598 599 2e1790f-2e17973 RtlLeaveCriticalSection call 2e13c67 call 2e13d7e call 2e1833b 596->599 597->596 598->599 622 2e17ae7-2e17afb call 2e19003 599->622 623 2e17979-2e179c1 call 2e1a725 599->623 600->594 610 2e17562-2e17583 call 2e1439c 600->610 620 2e175b9-2e175c8 call 2e235e6 601->620 621 2e175f8-2e17601 call 2e22f74 601->621 610->601 620->621 632 2e175ca 620->632 635 2e17607-2e1761f call 2e23b4c 621->635 636 2e17738-2e1773b 621->636 622->484 633 2e17ab1-2e17ae2 call 2e183ea call 2e133b2 623->633 634 2e179c7-2e179ce 623->634 638 2e175cf-2e175e1 call 2e22850 632->638 633->622 640 2e179d1-2e179d6 634->640 645 2e17621-2e17629 call 2e19737 635->645 646 2e1762b 635->646 636->531 652 2e175e3 638->652 653 2e175e6-2e175f6 call 2e235e6 638->653 640->640 644 2e179d8-2e17a23 call 2e1a725 640->644 644->633 655 2e17a29-2e17a2f 644->655 651 2e1762d-2e176e5 call 2e1a84f call 2e13863 call 2e15119 call 2e13863 call 2e1aaf5 call 2e1ac0f 645->651 646->651 678 2e176e7 call 2e1380b 651->678 679 2e176ec-2e17717 Sleep call 2e218f0 651->679 652->653 653->621 653->638 659 2e17a32-2e17a37 655->659 659->659 662 2e17a39-2e17a74 call 2e1a725 659->662 662->633 668 2e17a76-2e17ab0 call 2e1d117 662->668 668->633 678->679 683 2e17723-2e17731 679->683 684 2e17719-2e17722 call 2e14100 679->684 683->636 686 2e17733 call 2e1380b 683->686 684->683 686->636
                                                                APIs
                                                                Strings
                                                                • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02E16739
                                                                • urls, xrefs: 02E17B36
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$CriticalSection$EnterLeaveSleep_free
                                                                • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$urls
                                                                • API String ID: 3315418600-4235545730
                                                                • Opcode ID: 3856763464c84fca33f23e2d2c69458a558ebf7a55c6ffa4a94a2232e68542a8
                                                                • Instruction ID: e04c5b74aae57151d9b154abd9d59ebd6cf728d7d2be2c097318d0b67a6b5df8
                                                                • Opcode Fuzzy Hash: 3856763464c84fca33f23e2d2c69458a558ebf7a55c6ffa4a94a2232e68542a8
                                                                • Instruction Fuzzy Hash: 47219172DC83509FD7119B20AC09BABBBE2AF86724F15E874F5839F281D7615841CB92

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 689 2e17b83-2e17b8e 691 2e17b33-2e17b46 call 2e1439c 689->691 692 2e17b2e call 2e24af0 689->692 695 2e17b48-2e17b4a call 2e1534d 691->695 696 2e17b4f-2e17b56 call 2e22f74 691->696 692->691 695->696 700 2e166f4-2e166f6 696->700 701 2e166f8-2e166fd 700->701 702 2e166ff-2e16701 700->702 705 2e16708 Sleep 701->705 703 2e16703 702->703 704 2e1670e-2e16742 RtlEnterCriticalSection RtlLeaveCriticalSection 702->704 703->705 706 2e16792 704->706 707 2e16744-2e16750 704->707 705->704 709 2e16796-2e172c3 InternetOpenA 706->709 707->706 708 2e16752-2e1675f 707->708 710 2e16761-2e16765 708->710 711 2e16767-2e16768 708->711 714 2e17389-2e1738f 709->714 715 2e172c9-2e17340 InternetSetOptionA * 3 call 2e24af0 InternetOpenUrlA 709->715 713 2e1676c-2e16790 call 2e24af0 * 2 710->713 711->713 713->709 716 2e17391-2e17397 714->716 717 2e173ab-2e173b9 714->717 728 2e17382-2e17383 InternetCloseHandle 715->728 729 2e17342 715->729 720 2e17399-2e1739b 716->720 721 2e1739d-2e173aa call 2e153ec 716->721 717->700 723 2e173bf-2e173e3 call 2e24af0 call 2e1439c 717->723 720->717 721->717 723->700 738 2e173e9-2e17417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2e2233c 723->738 728->714 733 2e17346-2e1736c InternetReadFile 729->733 735 2e17377-2e1737e InternetCloseHandle 733->735 736 2e1736e-2e17375 733->736 735->728 736->733 741 2e17419-2e1742b call 2e2233c 738->741 742 2e1746d-2e17488 call 2e2233c 738->742 741->742 749 2e1742d-2e1743f call 2e2233c 741->749 747 2e17742-2e17754 call 2e2233c 742->747 748 2e1748e-2e17490 742->748 756 2e17756-2e17758 747->756 757 2e1779d-2e177af call 2e2233c 747->757 748->747 751 2e17496-2e17548 call 2e22fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2e24af0 * 5 call 2e1439c * 2 748->751 749->742 759 2e17441-2e17453 call 2e2233c 749->759 810 2e17585 751->810 811 2e1754a-2e1754c 751->811 756->757 760 2e1775a-2e17798 call 2e24af0 RtlEnterCriticalSection RtlLeaveCriticalSection 756->760 770 2e177b1-2e177cb call 2e161f5 call 2e16303 call 2e1640e 757->770 771 2e177d0-2e177e2 call 2e2233c 757->771 759->742 772 2e17455-2e17467 call 2e2233c 759->772 760->700 770->700 781 2e17b00-2e17b12 call 2e2233c 771->781 782 2e177e8-2e177ea 771->782 772->700 772->742 781->700 794 2e17b18-2e17b2e call 2e22fac call 2e24af0 781->794 782->781 786 2e177f0-2e17807 call 2e1439c 782->786 786->700 798 2e1780d-2e178db call 2e22418 call 2e11ba7 786->798 794->691 812 2e178e2-2e17903 RtlEnterCriticalSection 798->812 813 2e178dd call 2e1143f 798->813 817 2e17589-2e175b7 call 2e22fac call 2e24af0 call 2e1439c 810->817 811->810 816 2e1754e-2e17560 call 2e2233c 811->816 814 2e17905-2e1790c 812->814 815 2e1790f-2e17973 RtlLeaveCriticalSection call 2e13c67 call 2e13d7e call 2e1833b 812->815 813->812 814->815 838 2e17ae7-2e17afb call 2e19003 815->838 839 2e17979-2e179c1 call 2e1a725 815->839 816->810 826 2e17562-2e17583 call 2e1439c 816->826 836 2e175b9-2e175c8 call 2e235e6 817->836 837 2e175f8-2e17601 call 2e22f74 817->837 826->817 836->837 848 2e175ca 836->848 851 2e17607-2e1761f call 2e23b4c 837->851 852 2e17738-2e1773b 837->852 838->700 849 2e17ab1-2e17ae2 call 2e183ea call 2e133b2 839->849 850 2e179c7-2e179ce 839->850 854 2e175cf-2e175e1 call 2e22850 848->854 849->838 856 2e179d1-2e179d6 850->856 861 2e17621-2e17629 call 2e19737 851->861 862 2e1762b 851->862 852->747 868 2e175e3 854->868 869 2e175e6-2e175f6 call 2e235e6 854->869 856->856 860 2e179d8-2e17a23 call 2e1a725 856->860 860->849 871 2e17a29-2e17a2f 860->871 867 2e1762d-2e176e5 call 2e1a84f call 2e13863 call 2e15119 call 2e13863 call 2e1aaf5 call 2e1ac0f 861->867 862->867 894 2e176e7 call 2e1380b 867->894 895 2e176ec-2e17717 Sleep call 2e218f0 867->895 868->869 869->837 869->854 875 2e17a32-2e17a37 871->875 875->875 878 2e17a39-2e17a74 call 2e1a725 875->878 878->849 884 2e17a76-2e17ab0 call 2e1d117 878->884 884->849 894->895 899 2e17723-2e17731 895->899 900 2e17719-2e17722 call 2e14100 895->900 899->852 902 2e17733 call 2e1380b 899->902 900->899 902->852
                                                                APIs
                                                                • Sleep.KERNEL32(0000EA60), ref: 02E16708
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E16713
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E16724
                                                                • _memset.LIBCMT ref: 02E16779
                                                                • _memset.LIBCMT ref: 02E16788
                                                                • _memset.LIBCMT ref: 02E17B2E
                                                                • _free.LIBCMT ref: 02E17B50
                                                                  • Part of subcall function 02E1534D: _malloc.LIBCMT ref: 02E1535D
                                                                  • Part of subcall function 02E1534D: SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02E1536F
                                                                Strings
                                                                • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02E16739
                                                                • urls, xrefs: 02E17B36
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memset$CriticalSection$EnterFolderLeavePathSleepSpecial_free_malloc
                                                                • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$urls
                                                                • API String ID: 4141870364-4235545730
                                                                • Opcode ID: e432f4f9ea3c7680ef12c070ba26fbb3cba585551992e6b436d60146c4793a1f
                                                                • Instruction ID: 97d26ef8f66eda45cc608a46e00810fe926e4181ea96d5aa4813b6f7e9cf9629
                                                                • Opcode Fuzzy Hash: e432f4f9ea3c7680ef12c070ba26fbb3cba585551992e6b436d60146c4793a1f
                                                                • Instruction Fuzzy Hash: D22150729C83905FD711AB20AC05BAF7BD6AF86314F05E874F5839B281E7A15844CB96

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 931 401f64-401f84 FindResourceA 932 401f86-401f9d GetLastError SizeofResource 931->932 933 401f9f-401fa1 931->933 932->933 934 401fa6-401fec LoadResource LockResource GlobalAlloc call 4028d0 * 2 932->934 935 402096-40209a 933->935 940 401fee-401ff9 934->940 940->940 941 401ffb-402003 GetTickCount 940->941 942 402032-402038 941->942 943 402005-402007 941->943 944 402053-402083 GlobalAlloc call 401c26 942->944 946 40203a-40204a 942->946 943->944 945 402009-40200f 943->945 953 402088-402093 944->953 945->944 947 402011-402023 945->947 948 40204c 946->948 949 40204e-402051 946->949 951 402025 947->951 952 402027-40202a 947->952 948->949 949->944 949->946 951->952 952->947 954 40202c-40202e 952->954 953->935 954->945 955 402030 954->955 955->944
                                                                APIs
                                                                • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                • GetLastError.KERNEL32 ref: 00401F86
                                                                • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401FBF
                                                                • GetTickCount.KERNEL32 ref: 00401FFB
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00402061
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                • String ID:
                                                                • API String ID: 564119183-0
                                                                • Opcode ID: ecb35f46ac08b85c86e40a6f74cc2cb87793ce4333027e13acb5eebc5c2b3c3e
                                                                • Instruction ID: 13ae6f44a37a28a52dfea32d17f866491a5495f4dfaf43254632cb75a6655b84
                                                                • Opcode Fuzzy Hash: ecb35f46ac08b85c86e40a6f74cc2cb87793ce4333027e13acb5eebc5c2b3c3e
                                                                • Instruction Fuzzy Hash: 8D314E32D00251AFDB105FB59E889AF7B78EB46344F10807AFA46F72C1CA748845C7A8

                                                                Control-flow Graph

                                                                APIs
                                                                • GetVersion.KERNEL32 ref: 00402EA6
                                                                  • Part of subcall function 00403FC4: HeapCreate.KERNEL32(00000000,00001000,00000000,00402EDF,00000000), ref: 00403FD5
                                                                  • Part of subcall function 00403FC4: HeapDestroy.KERNEL32 ref: 00404014
                                                                • GetCommandLineA.KERNEL32 ref: 00402EF4
                                                                • GetStartupInfoA.KERNEL32(?), ref: 00402F1F
                                                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402F42
                                                                  • Part of subcall function 00402F9B: ExitProcess.KERNEL32 ref: 00402FB8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                • String ID:
                                                                • API String ID: 2057626494-0
                                                                • Opcode ID: 640f19aae8e2dc0c9f972c8ba2b6147760cd32077cd20cba4eb12527d876f887
                                                                • Instruction ID: 451b7ccb9f85b76ae3043f674a0dc4b13b2d0cef90b43a070b6402b23a2f3bed
                                                                • Opcode Fuzzy Hash: 640f19aae8e2dc0c9f972c8ba2b6147760cd32077cd20cba4eb12527d876f887
                                                                • Instruction Fuzzy Hash: 88217FB1840715AADB04EFA6DE49A6E7BBCEB44709F10413FF501B72E1DB784600CAA9

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1063 2e11aa9-2e11ac3 InterlockedIncrement 1064 2e11ac5-2e11ad7 WSAStartup InterlockedExchange 1063->1064 1065 2e11add-2e11ae0 1063->1065 1064->1065
                                                                APIs
                                                                • InterlockedIncrement.KERNEL32(02E472B4), ref: 02E11ABA
                                                                • WSAStartup.WS2_32(00000002,00000000), ref: 02E11ACB
                                                                • InterlockedExchange.KERNEL32(02E472B8,00000000), ref: 02E11AD7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Interlocked$ExchangeIncrementStartup
                                                                • String ID:
                                                                • API String ID: 1856147945-0
                                                                • Opcode ID: d67dbf1534b43d3059d7d8db6adb08799942112f02ba2cd0596cbedbbbd7d182
                                                                • Instruction ID: f22ba1fca754976b9e27dac3ae770e0c51220b703b04f75d1f43ed2abe9bb007
                                                                • Opcode Fuzzy Hash: d67dbf1534b43d3059d7d8db6adb08799942112f02ba2cd0596cbedbbbd7d182
                                                                • Instruction Fuzzy Hash: 79D05EB19C061C5BF6106AA5AD0EA78FB2CE706616F800651FDAEC00C0EB60596099FA

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1066 402193-40d1b6 RegOpenKeyExA 1070 40d72f 1066->1070 1071 4026f4-40d4cb 1070->1071 1072 40d735 1070->1072 1071->1070
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,?,00000001), ref: 0040D1AE
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00402821
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                • API String ID: 71445658-2036018995
                                                                • Opcode ID: c1a42f905350ede9604b38abd43315b0d6279d9c9b5f6e80678c4aca503d4b1a
                                                                • Instruction ID: b66fb05af277df70d70cdfdef7c403bb49fdaa83e83900e01f7fe389203fe34f
                                                                • Opcode Fuzzy Hash: c1a42f905350ede9604b38abd43315b0d6279d9c9b5f6e80678c4aca503d4b1a
                                                                • Instruction Fuzzy Hash: 41D09E3564C112E9E65465A04F1DB76525C6700744F304A776A1BB00C1D5FD855F751F

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1074 403fc4-403fe2 HeapCreate 1075 403fe4-403ff1 call 403e7c 1074->1075 1076 40401a-40401c 1074->1076 1079 404000-404003 1075->1079 1080 403ff3-403ffe call 40439b 1075->1080 1082 404005 call 404bec 1079->1082 1083 40401d-404020 1079->1083 1086 40400a-40400c 1080->1086 1082->1086 1086->1083 1087 40400e-404014 HeapDestroy 1086->1087 1087->1076
                                                                APIs
                                                                • HeapCreate.KERNEL32(00000000,00001000,00000000,00402EDF,00000000), ref: 00403FD5
                                                                  • Part of subcall function 00403E7C: GetVersionExA.KERNEL32 ref: 00403E9B
                                                                • HeapDestroy.KERNEL32 ref: 00404014
                                                                  • Part of subcall function 0040439B: HeapAlloc.KERNEL32(00000000,00000140,00403FFD,000003F8), ref: 004043A8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Heap$AllocCreateDestroyVersion
                                                                • String ID:
                                                                • API String ID: 2507506473-0
                                                                • Opcode ID: 2ff4082f180d6afe419acece8820e92a3199e22f767a3484755abbfbee3c62fe
                                                                • Instruction ID: 09a11994fc93feda3d1993d59173a896fcfbc6bc329cfc7f1de74b124d61b4d7
                                                                • Opcode Fuzzy Hash: 2ff4082f180d6afe419acece8820e92a3199e22f767a3484755abbfbee3c62fe
                                                                • Instruction Fuzzy Hash: 79F065F1616301DADF201F71AE8572636949BD4745F20443BF744F91E0EB789581A91D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1088 2e4eeb0-2e75b24 CreateFileA 1093 2e75b26 1088->1093 1093->1093
                                                                APIs
                                                                • CreateFileA.KERNEL32(?,?,2FCB4E59,?,?), ref: 02E6D31D
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 70da82ae8a2dac96bdb0643c8f8544daf14a8bdaede7cd1f3dd7e699ee8882f3
                                                                • Instruction ID: 9386e05dd5cfa5fb325749e59c16f22c358b4bbf3077f204c5b349d27149f0fc
                                                                • Opcode Fuzzy Hash: 70da82ae8a2dac96bdb0643c8f8544daf14a8bdaede7cd1f3dd7e699ee8882f3
                                                                • Instruction Fuzzy Hash: E231D9F3A0D200AFE7145D1AECC4ABAF7E9EFD8720F16853DE5C583744D67058018692

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1094 2e4f14b-2e4f154 1095 2e4f156-2e4f16a 1094->1095 1096 2e4f17f-2e4f180 1094->1096 1095->1096 1097 2e4f1b6-2e75b24 CreateFileA 1096->1097 1098 2e4f182-2e4f183 1096->1098 1105 2e75b26 1097->1105 1101 2e4f185-2e4f188 1098->1101 1103 2e4f189-2e4f19b 1101->1103 1103->1097 1104 2e4f12d-2e4f131 1103->1104 1104->1103 1106 2e4f133-2e4f13d 1104->1106 1105->1105 1107 2e4f10c-2e4f11e 1106->1107 1108 2e4f13f-2e4f149 1106->1108 1107->1101 1108->1094
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d89ace605eca3f181a56253db532e95e8a7870988a8b935c0ed58b8cec495159
                                                                • Instruction ID: f4ecad9a0a72fb0c40e964317ad96ee742ac29750142fd057f00736b2db32955
                                                                • Opcode Fuzzy Hash: d89ace605eca3f181a56253db532e95e8a7870988a8b935c0ed58b8cec495159
                                                                • Instruction Fuzzy Hash: BE3123B394D2409BD7096E3AECD44F8BBE5FFE5620F149B5CC0C24B792DA3164028541
                                                                APIs
                                                                • CreateFileA.KERNEL32(?,?,2FCB4E59,?,?), ref: 02E6D31D
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 172007b465758df3dc4cc590e416f8709e7fbec24bd6746e12b35c1c748cc44a
                                                                • Instruction ID: c2d84059977643eb98c920558df1c280ae282cc065d29065adce5aa8e251ccef
                                                                • Opcode Fuzzy Hash: 172007b465758df3dc4cc590e416f8709e7fbec24bd6746e12b35c1c748cc44a
                                                                • Instruction Fuzzy Hash: 9B210BF3A4D2009FF708AD1BEC855BAF7EAEFE4624F16C52DD5C583745DA3098018552
                                                                APIs
                                                                • CreateFileA.KERNEL32(?,?,2FCB4E59,?,?), ref: 02E6D31D
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 54252343d7fb02b2f502099cd726543ecdf1fae4ed9013cf595ab87f3a6c7ec9
                                                                • Instruction ID: 131e46fa9db2853897a052bd5c15093de571712a90a7f2d607541a0c0b1f957c
                                                                • Opcode Fuzzy Hash: 54252343d7fb02b2f502099cd726543ecdf1fae4ed9013cf595ab87f3a6c7ec9
                                                                • Instruction Fuzzy Hash: F111E9F364D3009FE708AD2BECC49BAB7EAEBE8620F25C62DD5D683744E63058018552
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 136db952921a29e231949d321917ec27f1980297b9e7eb580bf07eb5868a6007
                                                                • Instruction ID: f48a0f995a13410c3dad72aff389232bb1e129ad5ce0c31260ea95a459cfd643
                                                                • Opcode Fuzzy Hash: 136db952921a29e231949d321917ec27f1980297b9e7eb580bf07eb5868a6007
                                                                • Instruction Fuzzy Hash: 1D1150B354D340DFF705AE2AEC845F5B7DAFBA9610F1A953DC5D287241EA3054018642
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateThread
                                                                • String ID:
                                                                • API String ID: 2422867632-0
                                                                • Opcode ID: e9150fcbaed7ec96daa5fbf93b76cc1b3289e35e3880599826b42c35a2c04c0c
                                                                • Instruction ID: 4d2ef14c348e313a7d2e988bdadf9bdc0acd180b67f5bbdc0bfc9760ccab811c
                                                                • Opcode Fuzzy Hash: e9150fcbaed7ec96daa5fbf93b76cc1b3289e35e3880599826b42c35a2c04c0c
                                                                • Instruction Fuzzy Hash: 0CF0F6B255C6049FE301FA6DEC41AB7B7D8EF54711F088829FA81D7680EA31A800C7D3
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectory
                                                                • String ID:
                                                                • API String ID: 4241100979-0
                                                                • Opcode ID: 3b515ba0216dcc1a845d303bb5737d3d5b1c92c0fb27cc228ce63b33552c18f2
                                                                • Instruction ID: 1714731e828f4e1681932144783e1adc0d8b9758032b5b215d3a38ab984ae506
                                                                • Opcode Fuzzy Hash: 3b515ba0216dcc1a845d303bb5737d3d5b1c92c0fb27cc228ce63b33552c18f2
                                                                • Instruction Fuzzy Hash: 83F0A731D0421697C701BF64E995AA9B6A4FA48350320453AE156B25D5CAB80849DB99
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 701eacc3407ecbde2083fac51d551c618c102e32f13984556b45d006a2bebe7f
                                                                • Instruction ID: e19b5e1dc90053ee88c1b4dcb3f74587fe24ed959801770da1013de5715645cb
                                                                • Opcode Fuzzy Hash: 701eacc3407ecbde2083fac51d551c618c102e32f13984556b45d006a2bebe7f
                                                                • Instruction Fuzzy Hash: E9F08CB258C208DBC3106B09EC487BEFBE2EB84320F518A28E2D806600D731A414CB87
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 42b12e6ef96412424d6a226f8bcc113867f66e28c0138205860fb462c7cf233d
                                                                • Instruction ID: 211366929abf32ca3ad9698db02047e72aab009d8399d7302cff375f4688c1a7
                                                                • Opcode Fuzzy Hash: 42b12e6ef96412424d6a226f8bcc113867f66e28c0138205860fb462c7cf233d
                                                                • Instruction Fuzzy Hash: 93E0D8F3989204ABF3252406EC887BAB75ADBD4322F198429D35082300FD350404C4A7
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID:
                                                                • API String ID: 3660427363-0
                                                                • Opcode ID: d473cf97cdb65b5ee0b5f1433544a48ac7f29a990ce865ad0ff3b065f5994a01
                                                                • Instruction ID: 42408a8643adecbb9a43a9354015b933711969c9817f5603f6603ca60312dcaf
                                                                • Opcode Fuzzy Hash: d473cf97cdb65b5ee0b5f1433544a48ac7f29a990ce865ad0ff3b065f5994a01
                                                                • Instruction Fuzzy Hash: CBD023F0D04511E5CB921F604F1C9297274F5443C07110C32C051F3190EBBB0409679E
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectory
                                                                • String ID:
                                                                • API String ID: 4241100979-0
                                                                • Opcode ID: 4c95ebef277e07c54e0247bd33f31fa1b513fdf214b534b08057fb511e6b8923
                                                                • Instruction ID: 46c10517965c68b7a35be8ae26fe24781bc2dd103c10b4eb421535b0943d6600
                                                                • Opcode Fuzzy Hash: 4c95ebef277e07c54e0247bd33f31fa1b513fdf214b534b08057fb511e6b8923
                                                                • Instruction Fuzzy Hash: EEC08C228C2526B2C10136A01A4DA0C2214180D7893204636B102B10E444F9480A56BE
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CopyFile
                                                                • String ID:
                                                                • API String ID: 1304948518-0
                                                                • Opcode ID: 753514afe09845a47b25b8f237fec4c1f1987c7836fefd22d3982560f27935b4
                                                                • Instruction ID: 03b3d23aaef43c5b0458ce678395df1a637e1eaef4fb75fd0d98cf874c367960
                                                                • Opcode Fuzzy Hash: 753514afe09845a47b25b8f237fec4c1f1987c7836fefd22d3982560f27935b4
                                                                • Instruction Fuzzy Hash: 21B09221A4E200D6D21419A05A4D73622286705780B2D84376557B24D1C67C514F360F
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Close
                                                                • String ID:
                                                                • API String ID: 3535843008-0
                                                                • Opcode ID: ae731ede372e65a46975b5c93ca2023c93169ba4aedc82a24b1ac8ba2cd170e3
                                                                • Instruction ID: 067b26d5ffb8333450077b6e4a5c642623288b1adbc392b87fa071f0d2cbd78f
                                                                • Opcode Fuzzy Hash: ae731ede372e65a46975b5c93ca2023c93169ba4aedc82a24b1ac8ba2cd170e3
                                                                • Instruction Fuzzy Hash: 9EB01270C54000DACB000BC08A04E1977306700B0132080379302310E44739440B7E1F
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: ManagerOpen
                                                                • String ID:
                                                                • API String ID: 1889721586-0
                                                                • Opcode ID: a74b40a7d0e3ac49b67eadfa72258b72ce4209c6b7c1fe48151a92310486c430
                                                                • Instruction ID: c2a17047ef734e81f0c1bacf2d3149dbcc15f171e96288fe4e904dee4e1e461f
                                                                • Opcode Fuzzy Hash: a74b40a7d0e3ac49b67eadfa72258b72ce4209c6b7c1fe48151a92310486c430
                                                                • Instruction Fuzzy Hash: BDA001A0648102CAD3815A905EA882926A95610309771467AD683A00948A78848AA92E
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 9714940a7a006f44cdebe0429125152db1ddb0b487ec13cf8ac498c5b98cafb4
                                                                • Instruction ID: 7e2688be82e6dd58f0f24f27c38ba641ed750560046341b936fb9541ce687923
                                                                • Opcode Fuzzy Hash: 9714940a7a006f44cdebe0429125152db1ddb0b487ec13cf8ac498c5b98cafb4
                                                                • Instruction Fuzzy Hash: 7BB01234900311CFD780CF74CA4422937F0BB0930071004399406F2200D73080058B09
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E4A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E4A000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e4a000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: af01726df8c1d57229e81237512b4b1d110a3ef175e3fca4dad04781e6535977
                                                                • Instruction ID: 6b23cfba596647dc795c6adcc7f3794b09530a123af7b4d25fa30e3a6824c047
                                                                • Opcode Fuzzy Hash: af01726df8c1d57229e81237512b4b1d110a3ef175e3fca4dad04781e6535977
                                                                • Instruction Fuzzy Hash: 30F0D4F26497049BE3506E0AEC846BEF7E8EFC8721F16882DD3C547240DA345844CAA6
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: lstrcmpi
                                                                • String ID:
                                                                • API String ID: 1586166983-0
                                                                • Opcode ID: 72c0717bf691efa770fd909c84e7d16f696d1e24f48f09876b07379abd094b50
                                                                • Instruction ID: 44760ef787354fbc8e7e6032d5c5b8420a9c0d6134b01ce0c7ac7bd876715a99
                                                                • Opcode Fuzzy Hash: 72c0717bf691efa770fd909c84e7d16f696d1e24f48f09876b07379abd094b50
                                                                • Instruction Fuzzy Hash: 62C08C30E08102FACA240AD04E04A25A0642605700320C03BB403B00C0CB3CA41EB14F
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000), ref: 0040DAD5
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: b72b30fc312402f5463c6318e78f0423f812eaf0ace22e104fa3b214130d3e91
                                                                • Instruction ID: 4be1883ad5d995b6167b95ed10650d98d0bbc36e8e7c1725468d0457dc26f2e3
                                                                • Opcode Fuzzy Hash: b72b30fc312402f5463c6318e78f0423f812eaf0ace22e104fa3b214130d3e91
                                                                • Instruction Fuzzy Hash: 96B01231D48101EBD20007D04A047143650B708350F1200369603711E08A7C241DBA6B
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 0e4d715b12ea3d4b7267e855ca5644fc6231957a0385d9a0d81740b4f940419d
                                                                • Instruction ID: cc56c12807cb1425a3dcdd18009ba9ea889688568f4d5298963598ed1f986508
                                                                • Opcode Fuzzy Hash: 0e4d715b12ea3d4b7267e855ca5644fc6231957a0385d9a0d81740b4f940419d
                                                                • Instruction Fuzzy Hash: B69002261441119AD10026605F0D75475106304701F11C13A6246740D089B4009A960A
                                                                APIs
                                                                  • Part of subcall function 02E19AD9: __EH_prolog.LIBCMT ref: 02E19ADE
                                                                  • Part of subcall function 02E19AD9: _Allocate.LIBCPMT ref: 02E19B35
                                                                  • Part of subcall function 02E19AD9: _memmove.LIBCMT ref: 02E19B8C
                                                                • _memset.LIBCMT ref: 02E20939
                                                                • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02E209A2
                                                                • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02E209AA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                                • String ID: Unknown error$invalid string position
                                                                • API String ID: 1854462395-1837348584
                                                                • Opcode ID: 931d6d2ba32a9c2f3790244ac48868c37eb295f19bb6db41a30eeb7af28d3164
                                                                • Instruction ID: 7bcb578a620b2401704244aa9394dfed8e9c8262b886c22a6beb5ad9514be3a8
                                                                • Opcode Fuzzy Hash: 931d6d2ba32a9c2f3790244ac48868c37eb295f19bb6db41a30eeb7af28d3164
                                                                • Instruction Fuzzy Hash: 2951B2706883419FEB14DF24C850B2FBBE4BBA8348F90992DF49297691D771D588CF52
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02E24E96,?,?,?,00000001), ref: 02E2952D
                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02E29536
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 2ff6e8c8d0d9a37982c60b0aa6e04eb6bbdac113687975ad68d9f5e7c54b7c1f
                                                                • Instruction ID: b2dadedc30216108ae4b00bb8acd149316c1650743e3dd212abe994d08c99901
                                                                • Opcode Fuzzy Hash: 2ff6e8c8d0d9a37982c60b0aa6e04eb6bbdac113687975ad68d9f5e7c54b7c1f
                                                                • Instruction Fuzzy Hash: BFB092754C420CEBCB012B93EC0DB89BF69EB04663F804850F60D440508B7254A09EA1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CreateService
                                                                • String ID:
                                                                • API String ID: 1592570254-0
                                                                • Opcode ID: fd41c29678de01d59c5637489ec39d5c3ebaa4f41f228a3c004250e3cad5c485
                                                                • Instruction ID: 4777893af973c16578f4ef0244525729de51be78c6a62f5d22f3187e486d4adb
                                                                • Opcode Fuzzy Hash: fd41c29678de01d59c5637489ec39d5c3ebaa4f41f228a3c004250e3cad5c485
                                                                • Instruction Fuzzy Hash: 52B01210548400AAC5501A900E4CC17182C74C1705330083DB043F04C0C5BC8049E529
                                                                APIs
                                                                • StartServiceCtrlDispatcherA.ADVAPI32 ref: 0040D629
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: CtrlDispatcherServiceStart
                                                                • String ID:
                                                                • API String ID: 3789849863-0
                                                                • Opcode ID: 1720c3281397605e0dc9d7581cb6649d0e12f1cfaebfc8b2795ab802fd33cff1
                                                                • Instruction ID: f0defdacfcf0aaa02b1ec90b1de8ca33283067d0744dd37c91003b34a95e0df7
                                                                • Opcode Fuzzy Hash: 1720c3281397605e0dc9d7581cb6649d0e12f1cfaebfc8b2795ab802fd33cff1
                                                                • Instruction Fuzzy Hash:
                                                                APIs
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02E11D11
                                                                • GetLastError.KERNEL32 ref: 02E11D23
                                                                  • Part of subcall function 02E11712: __EH_prolog.LIBCMT ref: 02E11717
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02E11D59
                                                                • GetLastError.KERNEL32 ref: 02E11D6B
                                                                • __beginthreadex.LIBCMT ref: 02E11DB1
                                                                • GetLastError.KERNEL32 ref: 02E11DC6
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E11DDD
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E11DEC
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02E11E14
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E11E1B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                • String ID: thread$thread.entry_event$thread.exit_event
                                                                • API String ID: 831262434-3017686385
                                                                • Opcode ID: 1e5cbccf50279d12045a7b7197197841e1345bf8df184df6f7d65d0c73b9827b
                                                                • Instruction ID: b1507c896c20ebf6297c587445fc30c5045edf37926a84d67d15a237686bfed9
                                                                • Opcode Fuzzy Hash: 1e5cbccf50279d12045a7b7197197841e1345bf8df184df6f7d65d0c73b9827b
                                                                • Instruction Fuzzy Hash: 3B31ADB1A843049FD700EF20C888B2BBBE5EF85355F10896DF9599B290DB709C49CF92
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E124E6
                                                                • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02E124FC
                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 02E1250E
                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 02E1256D
                                                                • SetLastError.KERNEL32(00000000,?,7622DFB0), ref: 02E1257F
                                                                • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,7622DFB0), ref: 02E12599
                                                                • GetLastError.KERNEL32(?,7622DFB0), ref: 02E125A2
                                                                • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02E125F0
                                                                • InterlockedDecrement.KERNEL32(00000002), ref: 02E1262F
                                                                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02E1268E
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E12699
                                                                • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02E126AD
                                                                • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,7622DFB0), ref: 02E126BD
                                                                • GetLastError.KERNEL32(?,7622DFB0), ref: 02E126C7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                • String ID:
                                                                • API String ID: 1213838671-0
                                                                • Opcode ID: d84259935fd461a81415dd8da5e5d8dcf35cf9fb949716898d53e25591c7b75e
                                                                • Instruction ID: ed7bef03b645897e6eadcf46eed438772a13fff2033b0a27f4216b496c319f45
                                                                • Opcode Fuzzy Hash: d84259935fd461a81415dd8da5e5d8dcf35cf9fb949716898d53e25591c7b75e
                                                                • Instruction Fuzzy Hash: C2614FB1980219EFCB10DFA5D998AEEFBB9FF08315F509929E916E3240D7349944CF60
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E14608
                                                                  • Part of subcall function 02E23B4C: _malloc.LIBCMT ref: 02E23B64
                                                                • htons.WS2_32(?), ref: 02E14669
                                                                • htonl.WS2_32(?), ref: 02E1468C
                                                                • htonl.WS2_32(00000000), ref: 02E14693
                                                                • htons.WS2_32(00000000), ref: 02E14747
                                                                • _sprintf.LIBCMT ref: 02E1475D
                                                                  • Part of subcall function 02E1898C: _memmove.LIBCMT ref: 02E189AC
                                                                • htons.WS2_32(?), ref: 02E146B0
                                                                  • Part of subcall function 02E19737: __EH_prolog.LIBCMT ref: 02E1973C
                                                                  • Part of subcall function 02E19737: RtlEnterCriticalSection.NTDLL(00000020), ref: 02E197B7
                                                                  • Part of subcall function 02E19737: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02E197D5
                                                                  • Part of subcall function 02E11BA7: __EH_prolog.LIBCMT ref: 02E11BAC
                                                                  • Part of subcall function 02E11BA7: RtlEnterCriticalSection.NTDLL ref: 02E11BBC
                                                                  • Part of subcall function 02E11BA7: RtlLeaveCriticalSection.NTDLL ref: 02E11BEA
                                                                  • Part of subcall function 02E11BA7: RtlEnterCriticalSection.NTDLL ref: 02E11C13
                                                                  • Part of subcall function 02E11BA7: RtlLeaveCriticalSection.NTDLL ref: 02E11C56
                                                                  • Part of subcall function 02E1DEF3: __EH_prolog.LIBCMT ref: 02E1DEF8
                                                                • htonl.WS2_32(?), ref: 02E1497C
                                                                • htonl.WS2_32(00000000), ref: 02E14983
                                                                • htonl.WS2_32(00000000), ref: 02E149C8
                                                                • htonl.WS2_32(00000000), ref: 02E149CF
                                                                • htons.WS2_32(?), ref: 02E149EF
                                                                • htons.WS2_32(?), ref: 02E149F9
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                • String ID:
                                                                • API String ID: 1645262487-0
                                                                • Opcode ID: 8b18b7cd4f527aac9ba1bf6a6cd910234b29dc37ead8896b38dc3326196027cd
                                                                • Instruction ID: 8d5cea4711c805838d8dbcff5ee44da415c5ac1da5506932d4e65b0d22e487a3
                                                                • Opcode Fuzzy Hash: 8b18b7cd4f527aac9ba1bf6a6cd910234b29dc37ead8896b38dc3326196027cd
                                                                • Instruction Fuzzy Hash: AE025B71C4025DEEEF15DFA4C854BEEBBB9AF08305F10916AE505B7280DB745A88CFA1
                                                                APIs
                                                                • RegisterServiceCtrlHandlerA.ADVAPI32(ED Video Splitter 11.5.45,0040235E), ref: 004023C1
                                                                • SetServiceStatus.ADVAPI32(0040C3D8), ref: 00402420
                                                                • GetLastError.KERNEL32 ref: 00402422
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                • GetLastError.KERNEL32 ref: 00402450
                                                                • SetServiceStatus.ADVAPI32(0040C3D8), ref: 00402480
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                • CloseHandle.KERNEL32 ref: 004024A1
                                                                • SetServiceStatus.ADVAPI32(0040C3D8), ref: 004024CA
                                                                Strings
                                                                • ED Video Splitter 11.5.45, xrefs: 004023BC
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                • String ID: ED Video Splitter 11.5.45
                                                                • API String ID: 3346042915-2499784275
                                                                • Opcode ID: ded491ace497f533465a0e5067496bcee5ab68596654d39f056e0da6551717a8
                                                                • Instruction ID: 1b7a3b9d83d1c3198614615b4922c16984368a4b21f432ac73ea86d2ba3b0ed9
                                                                • Opcode Fuzzy Hash: ded491ace497f533465a0e5067496bcee5ab68596654d39f056e0da6551717a8
                                                                • Instruction Fuzzy Hash: 4021C6B0461244EBC2109F16FFD89567FA9EB86754711823EE944F62B0C7B50445DF6C
                                                                APIs
                                                                • RtlDecodePointer.NTDLL(?), ref: 02E2833B
                                                                • _free.LIBCMT ref: 02E28354
                                                                  • Part of subcall function 02E22F74: HeapFree.KERNEL32(00000000,00000000,?,02E25CD2,00000000,00000104,76230A60), ref: 02E22F88
                                                                  • Part of subcall function 02E22F74: GetLastError.KERNEL32(00000000,?,02E25CD2,00000000,00000104,76230A60), ref: 02E22F9A
                                                                • _free.LIBCMT ref: 02E28367
                                                                • _free.LIBCMT ref: 02E28385
                                                                • _free.LIBCMT ref: 02E28397
                                                                • _free.LIBCMT ref: 02E283A8
                                                                • _free.LIBCMT ref: 02E283B3
                                                                • _free.LIBCMT ref: 02E283D7
                                                                • RtlEncodePointer.NTDLL(00A1B220), ref: 02E283DE
                                                                • _free.LIBCMT ref: 02E283F3
                                                                • _free.LIBCMT ref: 02E28409
                                                                • _free.LIBCMT ref: 02E28431
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 3064303923-0
                                                                • Opcode ID: 853dafe753dcaf0377b803b830d68382d6afeeddb684674b5618f3bdf20ff02a
                                                                • Instruction ID: e853145cf849a47b0080fb7d32d47f1c2bee24fddde14a3d15a72df4b9215eb0
                                                                • Opcode Fuzzy Hash: 853dafe753dcaf0377b803b830d68382d6afeeddb684674b5618f3bdf20ff02a
                                                                • Instruction Fuzzy Hash: 0621857ADC1230CBDB25DF17F84050577E9B7067247999A29E906A3250C734B89ECFA0
                                                                APIs
                                                                • LCMapStringW.KERNEL32(00000000,00000100,00408648,00000001,00000000,00000000,00000103,00000001,00000000,?,004062E7,00200020,00000000,?,00000000,00000000), ref: 00406869
                                                                • LCMapStringA.KERNEL32(00000000,00000100,00408644,00000001,00000000,00000000,?,004062E7,00200020,00000000,?,00000000,00000000,00000001), ref: 00406885
                                                                • LCMapStringA.KERNEL32(?,?,?,?,b@ ,?,00000103,00000001,00000000,?,004062E7,00200020,00000000,?,00000000,00000000), ref: 004068CE
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004062E7,00200020,00000000,?,00000000,00000000), ref: 00406906
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004062E7,00200020,00000000,?,00000000), ref: 0040695E
                                                                • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004062E7,00200020,00000000,?,00000000), ref: 00406974
                                                                • LCMapStringW.KERNEL32(?,?,?,00000000,b@ ,?,?,004062E7,00200020,00000000,?,00000000), ref: 004069A7
                                                                • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004062E7,00200020,00000000,?,00000000), ref: 00406A0F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: String$ByteCharMultiWide
                                                                • String ID: b@
                                                                • API String ID: 352835431-2870702581
                                                                • Opcode ID: d6ed205d6f27410f880971c617d9ae7e3d3234db8dd6f3e06b730b392b7cc922
                                                                • Instruction ID: 2eed4e51dbc74922cdd65925e443f318d88e6218ed6009febdf52fb52fc215ea
                                                                • Opcode Fuzzy Hash: d6ed205d6f27410f880971c617d9ae7e3d3234db8dd6f3e06b730b392b7cc922
                                                                • Instruction Fuzzy Hash: 7E518B71500209EFCF219F94CE45AAF7FB9FB49710F12413AF916B12A0D73A8861DB69
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E14D8B
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E14DB7
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E14DC3
                                                                  • Part of subcall function 02E14BED: __EH_prolog.LIBCMT ref: 02E14BF2
                                                                  • Part of subcall function 02E14BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02E14CF2
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E14E93
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E14E99
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E14EA0
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E14EA6
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E150A7
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E150AD
                                                                • RtlEnterCriticalSection.NTDLL(02E471E0), ref: 02E150B8
                                                                • RtlLeaveCriticalSection.NTDLL(02E471E0), ref: 02E150C1
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                • String ID:
                                                                • API String ID: 2062355503-0
                                                                • Opcode ID: fab1d33dcff42a38a667cb5ea66d58f0c1ceeb0d2543fd6169a36e526dc97bbd
                                                                • Instruction ID: 5614c93994b7bccf90f4ee3c9d08135e260888809cfd1e7152348bfab00f4d90
                                                                • Opcode Fuzzy Hash: fab1d33dcff42a38a667cb5ea66d58f0c1ceeb0d2543fd6169a36e526dc97bbd
                                                                • Instruction Fuzzy Hash: 21B15D71D8025DDFEF11DF90C844BEDBBB5AF04318F20906AE405A6280DB745A89CFA1
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E13428
                                                                • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02E1346B
                                                                • GetProcAddress.KERNEL32(00000000), ref: 02E13472
                                                                • GetLastError.KERNEL32 ref: 02E13486
                                                                • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02E134D7
                                                                • RtlEnterCriticalSection.NTDLL(00000018), ref: 02E134ED
                                                                • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02E13518
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                • String ID: CancelIoEx$KERNEL32
                                                                • API String ID: 2902213904-434325024
                                                                • Opcode ID: d43a2a0529091bbdcb490e5c0af6dd852aba3b14dd91c980e8f3f9c2725cf32b
                                                                • Instruction ID: 062402960e8101c0eec34612baa309891365f91be004794a00d32386d26817fc
                                                                • Opcode Fuzzy Hash: d43a2a0529091bbdcb490e5c0af6dd852aba3b14dd91c980e8f3f9c2725cf32b
                                                                • Instruction Fuzzy Hash: D231ADB1980219DFDB119F64C858BAABBF9FF49315F04C8A9E806AB340D770D900CFA1
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404351,?,Microsoft Visual C++ Runtime Library,00012010,?,0040857C,?,004085CC,?,?,?,Runtime Error!Program: ), ref: 0040655A
                                                                • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00406572
                                                                • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00406583
                                                                • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00406590
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$LibraryLoad
                                                                • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                                • API String ID: 2238633743-4044615076
                                                                • Opcode ID: 19ebb124ec7e8f862f89de470f983aa9b015cec38d5da210499714661836083b
                                                                • Instruction ID: 8772570838fd98622b15f7c5b00028932a622bb5acc664d675e754094482fdf0
                                                                • Opcode Fuzzy Hash: 19ebb124ec7e8f862f89de470f983aa9b015cec38d5da210499714661836083b
                                                                • Instruction Fuzzy Hash: A8015271600201FFC7209FB5AEC092B3AE89B58650306193EB541F2295DA7A88658F6C
                                                                APIs
                                                                • GetStringTypeW.KERNEL32(00000001,00408648,00000001,00000000,00000103,00000001,00000000,004062E7,00200020,00000000,?,00000000,00000000,00000001), ref: 0040671D
                                                                • GetStringTypeA.KERNEL32(00000000,00000001,00408644,00000001,?,?,00000000,00000000,00000001), ref: 00406737
                                                                • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004062E7,00200020,00000000,?,00000000,00000000,00000001), ref: 0040676B
                                                                • MultiByteToWideChar.KERNEL32(b@ ,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004062E7,00200020,00000000,?,00000000,00000000,00000001), ref: 004067A3
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 004067F9
                                                                • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 0040680B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: StringType$ByteCharMultiWide
                                                                • String ID: b@
                                                                • API String ID: 3852931651-2870702581
                                                                • Opcode ID: 7e3f1275a0e4de8813cedf6543deea11426c51c9cac79afb8e26d3e9d91a71a1
                                                                • Instruction ID: bbc674a605be5a2e95d182e211d857c3d4a6945b4104562fc4da82f5469ceb3c
                                                                • Opcode Fuzzy Hash: 7e3f1275a0e4de8813cedf6543deea11426c51c9cac79afb8e26d3e9d91a71a1
                                                                • Instruction Fuzzy Hash: C3418E72501209EFCF209F94DD85AAF3F78FB04754F11493AF912B6290C73989608B99
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040429A
                                                                • GetStdHandle.KERNEL32(000000F4,0040857C,00000000,?,00000000,00000000), ref: 00404370
                                                                • WriteFile.KERNEL32(00000000), ref: 00404377
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: File$HandleModuleNameWrite
                                                                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                • API String ID: 3784150691-4022980321
                                                                • Opcode ID: 0b58330cdcbf6ad55a051fa00656f252bdff3768badffbb613ba9cb878c8a2ae
                                                                • Instruction ID: ae98996771620fc9f3724f1227a912ef72d9ec8fe3f3936e8700f835ee3309f0
                                                                • Opcode Fuzzy Hash: 0b58330cdcbf6ad55a051fa00656f252bdff3768badffbb613ba9cb878c8a2ae
                                                                • Instruction Fuzzy Hash: B0318572600218AEDF20A660CE49F9A776CAF85304F1404BFF685B61D1DAB8AE458A5D
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F04), ref: 00403B8D
                                                                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F04), ref: 00403BA1
                                                                • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F04), ref: 00403BCD
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F04), ref: 00403C05
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F04), ref: 00403C27
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F04), ref: 00403C40
                                                                • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F04), ref: 00403C53
                                                                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403C91
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                • String ID:
                                                                • API String ID: 1823725401-0
                                                                • Opcode ID: d5b58216b226c0c43cf7b12c65e36a01fe2c43e091c445c17dd443725f602506
                                                                • Instruction ID: cd13aa1bea807daf1e36ab921d99cb24673a48b0f7f25a0a2170fbf516e47f86
                                                                • Opcode Fuzzy Hash: d5b58216b226c0c43cf7b12c65e36a01fe2c43e091c445c17dd443725f602506
                                                                • Instruction Fuzzy Hash: 4F3103734082656EE7303F785DC883BBE9CE64534AB12093FF542F3281EA799E4142AD
                                                                APIs
                                                                • OpenEventA.KERNEL32(00100002,00000000,00000000,1A746342), ref: 02E216B0
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E216C5
                                                                • ResetEvent.KERNEL32(00000000,1A746342), ref: 02E216CF
                                                                • CloseHandle.KERNEL32(00000000,1A746342), ref: 02E21704
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,1A746342), ref: 02E2177A
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E2178F
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEventHandle$CreateOpenReset
                                                                • String ID:
                                                                • API String ID: 1285874450-0
                                                                • Opcode ID: 1936c4394c19ef7b5c1099103785a65a079b6e498a7863abffbd64dc6c8c1987
                                                                • Instruction ID: 6cdb9ce65cecbdbb393f8d23d0ea7573790b8ef87996d684c552be83e61e5da1
                                                                • Opcode Fuzzy Hash: 1936c4394c19ef7b5c1099103785a65a079b6e498a7863abffbd64dc6c8c1987
                                                                • Instruction Fuzzy Hash: B4414271D8436CABDF10CFA5C848BADB7B8FF05724F148619E41AAB281D7709A49CB50
                                                                APIs
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E120AC
                                                                • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02E120CD
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E120D8
                                                                • InterlockedDecrement.KERNEL32(?), ref: 02E1213E
                                                                • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02E1217A
                                                                • InterlockedDecrement.KERNEL32(?), ref: 02E12187
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E121A6
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                • String ID:
                                                                • API String ID: 1171374749-0
                                                                • Opcode ID: e01d16388c4cfea04b8322f83894c093459eb85e4e0e43a65db1f16c277ecb4e
                                                                • Instruction ID: 14071ea91f38739f9375dc449e1b0970048e9f83534bddba8ebb64edce87b984
                                                                • Opcode Fuzzy Hash: e01d16388c4cfea04b8322f83894c093459eb85e4e0e43a65db1f16c277ecb4e
                                                                • Instruction Fuzzy Hash: 3B412BB15847059FC311DF26D888A6BBBF9FFC8655F004A2EF99A82250D730E545CFA2
                                                                APIs
                                                                  • Part of subcall function 02E21ED0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02E2172E,?,?), ref: 02E21EFF
                                                                  • Part of subcall function 02E21ED0: CloseHandle.KERNEL32(00000000,?,?,02E2172E,?,?), ref: 02E21F14
                                                                  • Part of subcall function 02E21ED0: SetEvent.KERNEL32(00000000,02E2172E,?,?), ref: 02E21F27
                                                                • OpenEventA.KERNEL32(00100002,00000000,00000000,1A746342), ref: 02E216B0
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E216C5
                                                                • ResetEvent.KERNEL32(00000000,1A746342), ref: 02E216CF
                                                                • CloseHandle.KERNEL32(00000000,1A746342), ref: 02E21704
                                                                • __CxxThrowException@8.LIBCMT ref: 02E21735
                                                                  • Part of subcall function 02E2455A: RaiseException.KERNEL32(?,?,02E1FB5F,?,?,?,?,?,?,?,02E1FB5F,?,02E40F98,?), ref: 02E245AF
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,1A746342), ref: 02E2177A
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E2178F
                                                                  • Part of subcall function 02E21C10: GetCurrentProcessId.KERNEL32(?), ref: 02E21C69
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,1A746342), ref: 02E2179F
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                • String ID:
                                                                • API String ID: 2227236058-0
                                                                • Opcode ID: 19d1d1165db777de6e46264f09d5f747c10f1af8e6aca5235b7cb9e6d05270ea
                                                                • Instruction ID: 9e903cf5666177d994c929285591e0f616cfa96c0a14a32ab4059519ea9a67a9
                                                                • Opcode Fuzzy Hash: 19d1d1165db777de6e46264f09d5f747c10f1af8e6aca5235b7cb9e6d05270ea
                                                                • Instruction Fuzzy Hash: EA319971D803289BDF20CBE4CC48BADB7B9AF45328F149119E81EEF281D7709A49CB51
                                                                APIs
                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 02E12706
                                                                • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02E1272B
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02E35B53), ref: 02E12738
                                                                  • Part of subcall function 02E11712: __EH_prolog.LIBCMT ref: 02E11717
                                                                • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02E12778
                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 02E127D9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                • String ID: timer
                                                                • API String ID: 4293676635-1792073242
                                                                • Opcode ID: f4293ac3131035231cf605e344e452d8ae0af1d4c3681a7bb975e4204cd14c6d
                                                                • Instruction ID: 2d441afb55b314bcbb94f670fac4a92f4a620924dc2d135ce379e6af62f41e15
                                                                • Opcode Fuzzy Hash: f4293ac3131035231cf605e344e452d8ae0af1d4c3681a7bb975e4204cd14c6d
                                                                • Instruction Fuzzy Hash: A031A9B1984715AFD3109F25C848B67BBE8FF48B25F009A2EF91582680E770E810CFA1
                                                                APIs
                                                                • __init_pointers.LIBCMT ref: 02E25D94
                                                                  • Part of subcall function 02E28503: RtlEncodePointer.NTDLL(00000000), ref: 02E28506
                                                                  • Part of subcall function 02E28503: __initp_misc_winsig.LIBCMT ref: 02E28521
                                                                  • Part of subcall function 02E28503: GetModuleHandleW.KERNEL32(kernel32.dll,?,02E41598,00000008,00000003,02E40F7C,?,00000001), ref: 02E29281
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02E29295
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02E292A8
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02E292BB
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02E292CE
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02E292E1
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02E292F4
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02E29307
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02E2931A
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02E2932D
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02E29340
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02E29353
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02E29366
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02E29379
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02E2938C
                                                                  • Part of subcall function 02E28503: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02E2939F
                                                                • __mtinitlocks.LIBCMT ref: 02E25D99
                                                                • __mtterm.LIBCMT ref: 02E25DA2
                                                                  • Part of subcall function 02E25E0A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02E28939
                                                                  • Part of subcall function 02E25E0A: _free.LIBCMT ref: 02E28940
                                                                  • Part of subcall function 02E25E0A: RtlDeleteCriticalSection.NTDLL(02E43978), ref: 02E28962
                                                                • __calloc_crt.LIBCMT ref: 02E25DC7
                                                                • __initptd.LIBCMT ref: 02E25DE9
                                                                • GetCurrentThreadId.KERNEL32 ref: 02E25DF0
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                • String ID:
                                                                • API String ID: 3567560977-0
                                                                • Opcode ID: c7f7d5692bbbe681c4f23269d731274c585d248aacc9fb216c2bb4ce21df2887
                                                                • Instruction ID: c9a8a71fbe637c739712cfd7a535d28ea61af292d92b8b7ab474c97587553d10
                                                                • Opcode Fuzzy Hash: c7f7d5692bbbe681c4f23269d731274c585d248aacc9fb216c2bb4ce21df2887
                                                                • Instruction Fuzzy Hash: 5EF0F0325D83311EEA6CBA367E4974B2782DB01734FB0EA19F067E50C4FF51844949A0
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize), ref: 02E234DB
                                                                • GetProcAddress.KERNEL32(00000000), ref: 02E234E2
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 02E234EE
                                                                • RtlDecodePointer.NTDLL(00000001), ref: 02E2350B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                • String ID: RoInitialize$combase.dll
                                                                • API String ID: 3489934621-340411864
                                                                • Opcode ID: 85ead3df926fb9af1b2cb8cc6a2eb58e61ba3385bfcdfd01f2e1855d18ba7670
                                                                • Instruction ID: c1426bc21e5d3ce9a39041ee08db3f2187d88c3c106066c8acd9ae3f9709ef8a
                                                                • Opcode Fuzzy Hash: 85ead3df926fb9af1b2cb8cc6a2eb58e61ba3385bfcdfd01f2e1855d18ba7670
                                                                • Instruction Fuzzy Hash: CFE0EDB5DD4354AAEB309B72EC0DB0637D9A70270BF809864B406D1180C7B561A98F20
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02E234B0), ref: 02E235B0
                                                                • GetProcAddress.KERNEL32(00000000), ref: 02E235B7
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 02E235C2
                                                                • RtlDecodePointer.NTDLL(02E234B0), ref: 02E235DD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                • String ID: RoUninitialize$combase.dll
                                                                • API String ID: 3489934621-2819208100
                                                                • Opcode ID: 8771d35eb516bdfdb21c029be76d6c7d8ed825012a270ca05680e66159efb879
                                                                • Instruction ID: 9a0d6f0f16fa4f074cb80b9db8e2af6285b0cf11784cda7fde099b5b9b0ff4d7
                                                                • Opcode Fuzzy Hash: 8771d35eb516bdfdb21c029be76d6c7d8ed825012a270ca05680e66159efb879
                                                                • Instruction Fuzzy Hash: D2E04FB5DC0308ABEB204F62AD0CB0537A9B742707F809C50F502D0150CBB461A4DF20
                                                                APIs
                                                                • TlsGetValue.KERNEL32(FFFFFFFF,1A746342,?,?,?,?,00000000,02E36AB8,000000FF,02E221CA), ref: 02E21F6A
                                                                • TlsSetValue.KERNEL32(FFFFFFFF,02E221CA,?,?,00000000), ref: 02E21FD7
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02E22001
                                                                • HeapFree.KERNEL32(00000000), ref: 02E22004
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: HeapValue$FreeProcess
                                                                • String ID:
                                                                • API String ID: 1812714009-0
                                                                • Opcode ID: 502d130cd8a24b775b13f333aabd61906860b63969aa43fb66c5752b680be2b7
                                                                • Instruction ID: 50733f68d4bad9c694a9c691c046eea0eaa2fbbdd789dc904eb7934ccba653ad
                                                                • Opcode Fuzzy Hash: 502d130cd8a24b775b13f333aabd61906860b63969aa43fb66c5752b680be2b7
                                                                • Instruction Fuzzy Hash: 7D51C3719843289FD720CF25C448F16BBE5FF44768F49D658E92A9B281D731EC08CB91
                                                                APIs
                                                                • _ValidateScopeTableHandlers.LIBCMT ref: 02E35790
                                                                • __FindPESection.LIBCMT ref: 02E357AA
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FindHandlersScopeSectionTableValidate
                                                                • String ID:
                                                                • API String ID: 876702719-0
                                                                • Opcode ID: 5818ddf79974f92d4b4151ce0ffbff6fca830fc911273ceddb8010eb20c48e22
                                                                • Instruction ID: 5ef1ae7332df5494c1bbbae64a5baed26a4f2b112fc57f075229e4210eb1a6b3
                                                                • Opcode Fuzzy Hash: 5818ddf79974f92d4b4151ce0ffbff6fca830fc911273ceddb8010eb20c48e22
                                                                • Instruction Fuzzy Hash: A1A1C171EC07158FCB12CF19D8887A9B7A5EB4832AF95E669DC15A7350E730E841CF90
                                                                APIs
                                                                • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02E11CB1
                                                                • CloseHandle.KERNEL32(?), ref: 02E11CBA
                                                                • InterlockedExchangeAdd.KERNEL32(02E4727C,00000000), ref: 02E11CC6
                                                                • TerminateThread.KERNEL32(?,00000000), ref: 02E11CD4
                                                                • QueueUserAPC.KERNEL32(02E11E7C,?,00000000), ref: 02E11CE1
                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02E11CEC
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                • String ID:
                                                                • API String ID: 1946104331-0
                                                                • Opcode ID: d63003635dec07e43db4f6afd120b3217f1a9de55188cec890a6cf6596b0160d
                                                                • Instruction ID: 32e16a854c568dfeefd57f43cc955bda900e8413fe6d8ffc0e05cef19dc791da
                                                                • Opcode Fuzzy Hash: d63003635dec07e43db4f6afd120b3217f1a9de55188cec890a6cf6596b0160d
                                                                • Instruction Fuzzy Hash: 9CF081715C0208BFDB104B96ED0DD97FBBCEB45722B408659F66A82190DB709950CF60
                                                                APIs
                                                                • WSASetLastError.WS2_32(00000000), ref: 02E12BE4
                                                                • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02E12C07
                                                                  • Part of subcall function 02E1A509: WSAGetLastError.WS2_32(00000000,?,?,02E12A51), ref: 02E1A517
                                                                • WSASetLastError.WS2_32 ref: 02E12CD3
                                                                • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02E12CE7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$Recvselect
                                                                • String ID: 3'
                                                                • API String ID: 886190287-280543908
                                                                • Opcode ID: de96e3a3db9c1e9370baec839ea04d95216688b1a49e38bb00885d56bd496f0a
                                                                • Instruction ID: de22e67440f0d05546f549a7291a4e01e450ed1b2fa0c17f5de795a6fd8f0438
                                                                • Opcode Fuzzy Hash: de96e3a3db9c1e9370baec839ea04d95216688b1a49e38bb00885d56bd496f0a
                                                                • Instruction Fuzzy Hash: 4941AFB09843158FD7209F64C8147ABBBE9AF84358F149D2EFA99C7280EB70C444CB92
                                                                APIs
                                                                • GetVersionExA.KERNEL32 ref: 00403E9B
                                                                • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403ED0
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F30
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentFileModuleNameVariableVersion
                                                                • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                • API String ID: 1385375860-4131005785
                                                                • Opcode ID: c49599c386d9347682e8d442f13128af04f95ffda7694f9c3ba21515aeb4ea8d
                                                                • Instruction ID: 0ae61e5988087329277cd4ed863bece906a5998b987e16a8ea652649fd254f9b
                                                                • Opcode Fuzzy Hash: c49599c386d9347682e8d442f13128af04f95ffda7694f9c3ba21515aeb4ea8d
                                                                • Instruction Fuzzy Hash: 4431F371D402896DEB359A309C45ADA7F7C9B02709F2400FBE185F62C2D6388B998B19
                                                                APIs
                                                                • std::exception::exception.LIBCMT ref: 02E2197F
                                                                  • Part of subcall function 02E224D3: std::exception::_Copy_str.LIBCMT ref: 02E224EC
                                                                  • Part of subcall function 02E20D50: __CxxThrowException@8.LIBCMT ref: 02E20DAE
                                                                • std::exception::exception.LIBCMT ref: 02E219DE
                                                                Strings
                                                                • $, xrefs: 02E219E3
                                                                • boost unique_lock has no mutex, xrefs: 02E2196E
                                                                • boost unique_lock owns already the mutex, xrefs: 02E219CD
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                • API String ID: 2140441600-46888669
                                                                • Opcode ID: 4c5eaea79194a47360eaa50068708e286640c04074bfb7ef5df103f34afba53f
                                                                • Instruction ID: d88e99295fff04bfdca869ff68810b06c9bd04c893f8ae8b9ee6d1a4ac96a405
                                                                • Opcode Fuzzy Hash: 4c5eaea79194a47360eaa50068708e286640c04074bfb7ef5df103f34afba53f
                                                                • Instruction Fuzzy Hash: 812148B15883909FD721DF24C54874BBBE5BF88708F409E5DF4A68B280D7B59908CF92
                                                                APIs
                                                                • __getptd_noexit.LIBCMT ref: 02E24A80
                                                                  • Part of subcall function 02E25C72: GetLastError.KERNEL32(76230A60,7622F550,02E25E60,02E23033,7622F550,?,02E1606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02E16508), ref: 02E25C74
                                                                  • Part of subcall function 02E25C72: __calloc_crt.LIBCMT ref: 02E25C95
                                                                  • Part of subcall function 02E25C72: __initptd.LIBCMT ref: 02E25CB7
                                                                  • Part of subcall function 02E25C72: GetCurrentThreadId.KERNEL32 ref: 02E25CBE
                                                                  • Part of subcall function 02E25C72: SetLastError.KERNEL32(00000000,02E1606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02E16508), ref: 02E25CD6
                                                                • __calloc_crt.LIBCMT ref: 02E24AA3
                                                                • __get_sys_err_msg.LIBCMT ref: 02E24AC1
                                                                • __invoke_watson.LIBCMT ref: 02E24ADE
                                                                Strings
                                                                • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 02E24A8B, 02E24AB1
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                                • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                • API String ID: 109275364-798102604
                                                                • Opcode ID: c8b1975902186ea79357a66225006800ff681912a930a9b2759233eb59a4e5b7
                                                                • Instruction ID: 9ea543ac73b81802fe3d16f8c7e5f65a6efd2155919e6b11232969d2799466e0
                                                                • Opcode Fuzzy Hash: c8b1975902186ea79357a66225006800ff681912a930a9b2759233eb59a4e5b7
                                                                • Instruction Fuzzy Hash: ADF050B35C07346BEF22E51A4C4166B72CDDB40AE4B01F415FD4796580F721DC089698
                                                                APIs
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E12350
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E12360
                                                                • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02E12370
                                                                • GetLastError.KERNEL32 ref: 02E1237A
                                                                  • Part of subcall function 02E11712: __EH_prolog.LIBCMT ref: 02E11717
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                • String ID: pqcs
                                                                • API String ID: 1619523792-2559862021
                                                                • Opcode ID: e392dbc6397f38518fb206eef37112784b653e4434610a6dc4d425395979b08c
                                                                • Instruction ID: 52230289436b068ce7f2ed7e9669ea16b26890b4da0a1e0a0b51c8f5928a0b2d
                                                                • Opcode Fuzzy Hash: e392dbc6397f38518fb206eef37112784b653e4434610a6dc4d425395979b08c
                                                                • Instruction Fuzzy Hash: 38F030B09C0319ABDB20AF759D0DBABBBACEF05706B409569F906D3140E770D9548B91
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E14035
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 02E14042
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 02E14049
                                                                • std::exception::exception.LIBCMT ref: 02E14063
                                                                  • Part of subcall function 02E1A6CA: __EH_prolog.LIBCMT ref: 02E1A6CF
                                                                  • Part of subcall function 02E1A6CA: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02E1A6DE
                                                                  • Part of subcall function 02E1A6CA: __CxxThrowException@8.LIBCMT ref: 02E1A6FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                • String ID: bad allocation
                                                                • API String ID: 3112922283-2104205924
                                                                • Opcode ID: 2380c345c8e0d177cc443ecc7885c6fad68b573d695bbab45113a357a7f5d0a2
                                                                • Instruction ID: a315f745fc884a0cdda869ceb633cbe6865dc2031f1d66845141d771ff2ca089
                                                                • Opcode Fuzzy Hash: 2380c345c8e0d177cc443ecc7885c6fad68b573d695bbab45113a357a7f5d0a2
                                                                • Instruction Fuzzy Hash: 8AF058B1E84209ABDB01EFE0C91DBEEB779EB08306F809569F915A2280DB344218CF51
                                                                APIs
                                                                • GetStartupInfoA.KERNEL32(?), ref: 00403CFD
                                                                • GetFileType.KERNEL32(00000800), ref: 00403DA3
                                                                • GetStdHandle.KERNEL32(-000000F6), ref: 00403DFC
                                                                • GetFileType.KERNEL32(00000000), ref: 00403E0A
                                                                • SetHandleCount.KERNEL32 ref: 00403E41
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: FileHandleType$CountInfoStartup
                                                                • String ID:
                                                                • API String ID: 1710529072-0
                                                                • Opcode ID: a9a358eacb036e5c7f2c751d65c32119dcdbcb6e592f6baa985201e73d43223e
                                                                • Instruction ID: b135b53a8ae0a867f29db5b866262301a58dff7277888bb89693f6f6d4513a23
                                                                • Opcode Fuzzy Hash: a9a358eacb036e5c7f2c751d65c32119dcdbcb6e592f6baa985201e73d43223e
                                                                • Instruction Fuzzy Hash: 965134316043418BD7218F28CD88B667FA8AF02322F15473EE4A6FB3E0C7389A45D749
                                                                APIs
                                                                  • Part of subcall function 02E21A50: CloseHandle.KERNEL32(00000000,1A746342), ref: 02E21AA1
                                                                  • Part of subcall function 02E21A50: WaitForSingleObject.KERNEL32(?,000000FF,1A746342,?,?,?,?,1A746342,02E21A23,1A746342), ref: 02E21AB8
                                                                • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02E21D1E
                                                                • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02E21D3E
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02E21D77
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02E21DCB
                                                                • SetEvent.KERNEL32(?), ref: 02E21DD2
                                                                  • Part of subcall function 02E1418C: CloseHandle.KERNEL32(00000000,?,02E21D05), ref: 02E141B0
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                • String ID:
                                                                • API String ID: 4166353394-0
                                                                • Opcode ID: 8c12c09f3ade09bd6f8e4db9f676de0357edeea0a383e47bd18c86c24ec38be6
                                                                • Instruction ID: 7c9e928dc9b1f801bef69dabd7758eeab69b8f490338f05208923d85d483ca76
                                                                • Opcode Fuzzy Hash: 8c12c09f3ade09bd6f8e4db9f676de0357edeea0a383e47bd18c86c24ec38be6
                                                                • Instruction Fuzzy Hash: D2413471680321DBDB268F29CC8071777E4EF46729F149668EC1EDF282D734D9098B91
                                                                APIs
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E120AC
                                                                • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02E120CD
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E120D8
                                                                • InterlockedDecrement.KERNEL32(?), ref: 02E1213E
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E121A6
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                                • String ID:
                                                                • API String ID: 1611172436-0
                                                                • Opcode ID: 0f82f662227e4e93037305a19bd767321daaedd0741c42b179d2ed5242324103
                                                                • Instruction ID: 5dd1514b9ece8e20cc690cdc63c4eab4b1b57a8b09c30d9302ff3087ae6dfefe
                                                                • Opcode Fuzzy Hash: 0f82f662227e4e93037305a19bd767321daaedd0741c42b179d2ed5242324103
                                                                • Instruction Fuzzy Hash: 00319A726847059FC311DF25C888A6BB7F9EFC8614F044A2EF99A83250D730E946CFA1
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E1E0FD
                                                                  • Part of subcall function 02E11A01: TlsGetValue.KERNEL32 ref: 02E11A0A
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E1E17C
                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 02E1E198
                                                                • InterlockedIncrement.KERNEL32(02E45190), ref: 02E1E1BD
                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 02E1E1D2
                                                                  • Part of subcall function 02E127F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02E1284E
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                • String ID:
                                                                • API String ID: 1578506061-0
                                                                • Opcode ID: 885a0c989619a8f7e1c5a425f0b8f14ba91e2b5e209276061a8842927c0a13ea
                                                                • Instruction ID: ae3415c3584575d4dd4584b95a44c9df454f983f1792f1870da1677bacda154e
                                                                • Opcode Fuzzy Hash: 885a0c989619a8f7e1c5a425f0b8f14ba91e2b5e209276061a8842927c0a13ea
                                                                • Instruction Fuzzy Hash: CC3149B19813089FCB10DFA9C5486AEBBF9FF08314F04856EE849D7640E774A604CFA0
                                                                APIs
                                                                • WSASetLastError.WS2_32(00000000), ref: 02E12A3B
                                                                • closesocket.WS2_32 ref: 02E12A42
                                                                • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02E12A89
                                                                • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02E12A97
                                                                • closesocket.WS2_32 ref: 02E12A9E
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastclosesocket$ioctlsocket
                                                                • String ID:
                                                                • API String ID: 1561005644-0
                                                                • Opcode ID: 5eb6a1c3e797de9d932caf4f3b0dad7005c85ec456e1c453797d22ab4d4a401e
                                                                • Instruction ID: 7a1566cce395d3aa5afc967d892b9cdcf0949a6199178f40b37ac2e36269cfd9
                                                                • Opcode Fuzzy Hash: 5eb6a1c3e797de9d932caf4f3b0dad7005c85ec456e1c453797d22ab4d4a401e
                                                                • Instruction Fuzzy Hash: 6421DBB1A802199BDF209BB4DD4876AB6E9AF44319F14D979FD45D32C0FB70C944CB50
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E11BAC
                                                                • RtlEnterCriticalSection.NTDLL ref: 02E11BBC
                                                                • RtlLeaveCriticalSection.NTDLL ref: 02E11BEA
                                                                • RtlEnterCriticalSection.NTDLL ref: 02E11C13
                                                                • RtlLeaveCriticalSection.NTDLL ref: 02E11C56
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave$H_prolog
                                                                • String ID:
                                                                • API String ID: 1633115879-0
                                                                • Opcode ID: 583ebcfd56d1da954f317c5ec82aa70fb38a9e53b6e8cc9f6f44aa52d7401dd5
                                                                • Instruction ID: ebadafcefb06e13fd419df3422070d34d000f04e0000e208a8be8c93dbeb265e
                                                                • Opcode Fuzzy Hash: 583ebcfd56d1da954f317c5ec82aa70fb38a9e53b6e8cc9f6f44aa52d7401dd5
                                                                • Instruction Fuzzy Hash: 9B21BCB5A80204EFCB14CF68C488BAABBB5FF48315F10C599E9499B301D7B4E901CBE0
                                                                APIs
                                                                • _malloc.LIBCMT ref: 02E303B0
                                                                  • Part of subcall function 02E22FAC: __FF_MSGBANNER.LIBCMT ref: 02E22FC3
                                                                  • Part of subcall function 02E22FAC: __NMSG_WRITE.LIBCMT ref: 02E22FCA
                                                                  • Part of subcall function 02E22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02E22FEF
                                                                • _free.LIBCMT ref: 02E303C3
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap_free_malloc
                                                                • String ID:
                                                                • API String ID: 1020059152-0
                                                                • Opcode ID: bb216dcc5c56c497dd9e5a59fb88f11b3d333d45bf14a93eeac03d71ea29058d
                                                                • Instruction ID: d9c74fbcedf0ded74b34bdac64d27512b9bb863e323ef88539da610899f66dbc
                                                                • Opcode Fuzzy Hash: bb216dcc5c56c497dd9e5a59fb88f11b3d333d45bf14a93eeac03d71ea29058d
                                                                • Instruction Fuzzy Hash: E01129728C4625ABDF263F70E84C79A37999F0037AF00E435F90B9A150DB30C990CEA0
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E121DA
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E121ED
                                                                • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02E12224
                                                                • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02E12237
                                                                • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02E12261
                                                                  • Part of subcall function 02E12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E12350
                                                                  • Part of subcall function 02E12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E12360
                                                                  • Part of subcall function 02E12341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02E12370
                                                                  • Part of subcall function 02E12341: GetLastError.KERNEL32 ref: 02E1237A
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                • String ID:
                                                                • API String ID: 1856819132-0
                                                                • Opcode ID: 080ffcf3ad4f13b80af3f79171dd7ca5d5070842290dbca2143a7859c75a41a0
                                                                • Instruction ID: aade1a51006bcb88f7b12b1ac8d406b6040ac40c6ab3447f6dd6544d83728e5b
                                                                • Opcode Fuzzy Hash: 080ffcf3ad4f13b80af3f79171dd7ca5d5070842290dbca2143a7859c75a41a0
                                                                • Instruction Fuzzy Hash: 1911AFB1D80128EBCB159FA9DC086AEFBBAFF54314F00892AFD19A2290D7714651DF80
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E1229D
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E122B0
                                                                • TlsGetValue.KERNEL32 ref: 02E122E7
                                                                • TlsSetValue.KERNEL32(?), ref: 02E12300
                                                                • TlsSetValue.KERNEL32(?,?,?), ref: 02E1231C
                                                                  • Part of subcall function 02E12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E12350
                                                                  • Part of subcall function 02E12341: InterlockedExchange.KERNEL32(?,00000001), ref: 02E12360
                                                                  • Part of subcall function 02E12341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02E12370
                                                                  • Part of subcall function 02E12341: GetLastError.KERNEL32 ref: 02E1237A
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                • String ID:
                                                                • API String ID: 1856819132-0
                                                                • Opcode ID: 0d301adb117f88ebaa4c2e9cd99f912533ac5d6e241abe78967538e114242c02
                                                                • Instruction ID: ec06428e2e70525a30942e5fbe7452eab64a45d5eb4a83bdb95b8b03502bb4de
                                                                • Opcode Fuzzy Hash: 0d301adb117f88ebaa4c2e9cd99f912533ac5d6e241abe78967538e114242c02
                                                                • Instruction Fuzzy Hash: AA115EB1D80129ABCB119FA5DC446AEFFBAFF58310F40842AF805A3250D7714A51DF90
                                                                APIs
                                                                  • Part of subcall function 02E1B165: __EH_prolog.LIBCMT ref: 02E1B16A
                                                                • __CxxThrowException@8.LIBCMT ref: 02E1BD2F
                                                                  • Part of subcall function 02E2455A: RaiseException.KERNEL32(?,?,02E1FB5F,?,?,?,?,?,?,?,02E1FB5F,?,02E40F98,?), ref: 02E245AF
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02E41DB4,?,00000001), ref: 02E1BD45
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E1BD58
                                                                • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02E41DB4,?,00000001), ref: 02E1BD68
                                                                • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02E1BD76
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                • String ID:
                                                                • API String ID: 2725315915-0
                                                                • Opcode ID: e5be1c8d7a47ef8bcb1a6caa7c099e7e41cc84e4c5ad901af3404f57b11320e8
                                                                • Instruction ID: d75ef5126cfaa66ec599f9f2e37b6a637cee608cd54883023e8067f03ef339c5
                                                                • Opcode Fuzzy Hash: e5be1c8d7a47ef8bcb1a6caa7c099e7e41cc84e4c5ad901af3404f57b11320e8
                                                                • Instruction Fuzzy Hash: BA0186B6AC02086FDB109BA4DC8DF8A77ADAB04719F008529F626D6190D770E8448F20
                                                                APIs
                                                                • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02E12432
                                                                • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02E12445
                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 02E12454
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E12469
                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 02E12470
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                • String ID:
                                                                • API String ID: 747265849-0
                                                                • Opcode ID: 5d59513b5878f36f7fa71eeb29475e2ff83510d77d18d5a74345982ad150e977
                                                                • Instruction ID: 4d863af0b60e9c4f60c0b2515cdedaf5e73911e8339caa1ff54673abf8cf2f80
                                                                • Opcode Fuzzy Hash: 5d59513b5878f36f7fa71eeb29475e2ff83510d77d18d5a74345982ad150e977
                                                                • Instruction Fuzzy Hash: D4F030B26C0218BBDB049AA1ED4DFD6B72CFB45716F804425F701D6480D771E960CFA1
                                                                APIs
                                                                • InterlockedIncrement.KERNEL32(?), ref: 02E11ED2
                                                                • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02E11EEA
                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 02E11EF9
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E11F0E
                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 02E11F15
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                • String ID:
                                                                • API String ID: 830998967-0
                                                                • Opcode ID: 3422aeda0bb0632279239d466311f888bf68faeb0da7481cc8eeb47589413df3
                                                                • Instruction ID: 2cf95c5354ae4e00932a801e7b4ad63e2e49e333c40860061df5e05ec90fe972
                                                                • Opcode Fuzzy Hash: 3422aeda0bb0632279239d466311f888bf68faeb0da7481cc8eeb47589413df3
                                                                • Instruction Fuzzy Hash: FEF017B2681609BBD700AFA2ED88FD6BB6DFF04746F404426F60186440D771AAA5CFA0
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID: invalid string position$string too long
                                                                • API String ID: 4104443479-4289949731
                                                                • Opcode ID: b1a3d211300b2521f205453c2df6357ff45d7ff3b55378a9ed73edf8b3ad9ec1
                                                                • Instruction ID: 02d1e74f5be262ace5862b2a157ae044e7cd1d484e3e436caca2f374f30b642b
                                                                • Opcode Fuzzy Hash: b1a3d211300b2521f205453c2df6357ff45d7ff3b55378a9ed73edf8b3ad9ec1
                                                                • Instruction Fuzzy Hash: 17410631780304ABE738DE69DC94E56B7AAEF41758B04A93DF856C7381CB70E844CBA0
                                                                APIs
                                                                • WSASetLastError.WS2_32(00000000), ref: 02E130C3
                                                                • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02E13102
                                                                • _memcmp.LIBCMT ref: 02E13141
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressErrorLastString_memcmp
                                                                • String ID: 255.255.255.255
                                                                • API String ID: 1618111833-2422070025
                                                                • Opcode ID: 1eeea600c1643062b6df3b7914ce678c34beea7c0bd0025a8aa3154b1b440f63
                                                                • Instruction ID: 76055d25e6057480abc109e6d5428bb12e997ee0edc227bb5a1f5c37fa93cae4
                                                                • Opcode Fuzzy Hash: 1eeea600c1643062b6df3b7914ce678c34beea7c0bd0025a8aa3154b1b440f63
                                                                • Instruction Fuzzy Hash: 2331D371B803189FDB309F64C89076EB7B6BF45328F10D9B9E855A7280E7719945CBA0
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E11F5B
                                                                • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02E11FC5
                                                                • GetLastError.KERNEL32(?,00000000), ref: 02E11FD2
                                                                  • Part of subcall function 02E11712: __EH_prolog.LIBCMT ref: 02E11717
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                • String ID: iocp
                                                                • API String ID: 998023749-976528080
                                                                • Opcode ID: 9236f3ca6742ddd05013b269851bcbb810af5d205e682840eb73f61d1b5f0a18
                                                                • Instruction ID: c032b2750a12aa6a2b8c1987ee7e3805a268bb24177fc114213f274e405b1763
                                                                • Opcode Fuzzy Hash: 9236f3ca6742ddd05013b269851bcbb810af5d205e682840eb73f61d1b5f0a18
                                                                • Instruction Fuzzy Hash: F22104B1841B448FC720DF6AC50455BFBF8FFA4720B108A1FE4A687AA0D7B0A604CF91
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004062E7,00200020,00000000,?,00000000), ref: 0040695E
                                                                • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004062E7,00200020,00000000,?,00000000), ref: 00406974
                                                                • LCMapStringW.KERNEL32(?,?,?,00000000,b@ ,?,?,004062E7,00200020,00000000,?,00000000), ref: 004069A7
                                                                • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004062E7,00200020,00000000,?,00000000), ref: 00406A0F
                                                                • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,b@ ,?,00000000,00000000,?,00000000,?,004062E7,00200020,00000000,?,00000000), ref: 00406A34
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: String$ByteCharMultiWide
                                                                • String ID: b@
                                                                • API String ID: 352835431-2870702581
                                                                • Opcode ID: c27102524ac63b2afc797942247bbc739c6a725d4fab299d5fe348ac5619d8bb
                                                                • Instruction ID: f49dcd02869ab473186236745d21691e701aa8701ced8745f36c19202e89519c
                                                                • Opcode Fuzzy Hash: c27102524ac63b2afc797942247bbc739c6a725d4fab299d5fe348ac5619d8bb
                                                                • Instruction Fuzzy Hash: D1111C72900209AFCF228F94CE45ADEBBB6FF48750F16816AFD15721A0D3368D61DB64
                                                                APIs
                                                                • _malloc.LIBCMT ref: 02E23B64
                                                                  • Part of subcall function 02E22FAC: __FF_MSGBANNER.LIBCMT ref: 02E22FC3
                                                                  • Part of subcall function 02E22FAC: __NMSG_WRITE.LIBCMT ref: 02E22FCA
                                                                  • Part of subcall function 02E22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02E22FEF
                                                                • std::exception::exception.LIBCMT ref: 02E23B82
                                                                • __CxxThrowException@8.LIBCMT ref: 02E23B97
                                                                  • Part of subcall function 02E2455A: RaiseException.KERNEL32(?,?,02E1FB5F,?,?,?,?,?,?,?,02E1FB5F,?,02E40F98,?), ref: 02E245AF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                • String ID: bad allocation
                                                                • API String ID: 3074076210-2104205924
                                                                • Opcode ID: 684ebf7d90b7bd93f27e44665e690e2e4d6c8ac9abf71d27adb09fbbb63ff22c
                                                                • Instruction ID: 85be1109d0432a7dde0c912e5d13e9ae9591a55abff82e3ac63107b0972f5bed
                                                                • Opcode Fuzzy Hash: 684ebf7d90b7bd93f27e44665e690e2e4d6c8ac9abf71d27adb09fbbb63ff22c
                                                                • Instruction Fuzzy Hash: CAE0A0309C022AA6DF00FF64CC159AF77A9AB00305F50E1A5BC16A6180DB708E0CCE91
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E137B6
                                                                • __localtime64.LIBCMT ref: 02E137C1
                                                                  • Part of subcall function 02E22600: __gmtime64_s.LIBCMT ref: 02E22613
                                                                • std::exception::exception.LIBCMT ref: 02E137D9
                                                                  • Part of subcall function 02E224D3: std::exception::_Copy_str.LIBCMT ref: 02E224EC
                                                                  • Part of subcall function 02E1A528: __EH_prolog.LIBCMT ref: 02E1A52D
                                                                  • Part of subcall function 02E1A528: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02E1A53C
                                                                  • Part of subcall function 02E1A528: __CxxThrowException@8.LIBCMT ref: 02E1A55B
                                                                Strings
                                                                • could not convert calendar time to UTC time, xrefs: 02E137CE
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                • String ID: could not convert calendar time to UTC time
                                                                • API String ID: 1963798777-2088861013
                                                                • Opcode ID: c3cefa7d67bae1b150864dad66505692f341c37a54d128e5be2ed37a82cc2b6b
                                                                • Instruction ID: db6defe4aad8552db11fbd3fb1455b5903373df2ec208f4bdcdb17a77d2fcd83
                                                                • Opcode Fuzzy Hash: c3cefa7d67bae1b150864dad66505692f341c37a54d128e5be2ed37a82cc2b6b
                                                                • Instruction Fuzzy Hash: B8E039B1D842099BCB01EFA4D8096EFB77AEF04305F40E5A9E811A6240DB344609CF94
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(KERNEL32,00402E3A), ref: 0040312F
                                                                • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040313F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                • API String ID: 1646373207-3105848591
                                                                • Opcode ID: 71abc02f20cfcba5d384490cb572458c45eb061567bca513928383499afa5897
                                                                • Instruction ID: 10463dafef7914ae779aadcf297a0813ac380c99966ca61e2e6a65bbc852e44d
                                                                • Opcode Fuzzy Hash: 71abc02f20cfcba5d384490cb572458c45eb061567bca513928383499afa5897
                                                                • Instruction Fuzzy Hash: 0EC08C70382B05A2EA202FB20F09B27290C2B48F03F28007EB889F40C0CE7DC208903D
                                                                APIs
                                                                • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040400A), ref: 00404C0D
                                                                • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040400A), ref: 00404C31
                                                                • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040400A), ref: 00404C4B
                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040400A), ref: 00404D0C
                                                                • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040400A), ref: 00404D23
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual$FreeHeap
                                                                • String ID:
                                                                • API String ID: 714016831-0
                                                                • Opcode ID: aa48dc0927069a6a9cc3df55c71244c1c5228263c027305997a67c385ecee80e
                                                                • Instruction ID: 6daff540c01be944b3b70ba9d222be6cdb7ebc4a8e2d7ff112ba70eed9ede596
                                                                • Opcode Fuzzy Hash: aa48dc0927069a6a9cc3df55c71244c1c5228263c027305997a67c385ecee80e
                                                                • Instruction Fuzzy Hash: 3E31F2B1641702ABE3208F24EE85B62B7E0EB84754F11463FE695B72E1D778A840CB4C
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AdjustPointer_memmove
                                                                • String ID:
                                                                • API String ID: 1721217611-0
                                                                • Opcode ID: 077a01a87fbc5a47e3651acf3edab5d6c46947b500f533e5a1bc750420fc70bd
                                                                • Instruction ID: b6aa26dcc2edf2b44e796fd6d56e061a1f599e06f03a8841f2e57705fc7d11ff
                                                                • Opcode Fuzzy Hash: 077a01a87fbc5a47e3651acf3edab5d6c46947b500f533e5a1bc750420fc70bd
                                                                • Instruction Fuzzy Hash: AE41C3766C83166AEB255F64E840BBE33A99F41358F35F11FF8478A1D0DB21D588CA20
                                                                APIs
                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02E14149), ref: 02E213BF
                                                                  • Part of subcall function 02E13FDC: __EH_prolog.LIBCMT ref: 02E13FE1
                                                                  • Part of subcall function 02E13FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02E13FF3
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E213B4
                                                                • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02E14149), ref: 02E21400
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02E14149), ref: 02E214D1
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandle$Event$CreateH_prolog
                                                                • String ID:
                                                                • API String ID: 2825413587-0
                                                                • Opcode ID: ba3e6418dfe6506224ac882dc737cabc6eabf6a55598bb8f1d0d0c46c4e1c63c
                                                                • Instruction ID: 5faae1f031419a9515610dde22b9be2d047d5428039bd0c32f747691c7d0efaa
                                                                • Opcode Fuzzy Hash: ba3e6418dfe6506224ac882dc737cabc6eabf6a55598bb8f1d0d0c46c4e1c63c
                                                                • Instruction Fuzzy Hash: 6451D2B16403158BDF21CF28C88479AB7E5BF4832CF159628F86E9B281D735DA09CF81
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                • String ID:
                                                                • API String ID: 2782032738-0
                                                                • Opcode ID: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                                • Instruction ID: a46c1fa8df1729502d0e6851e98c57af85d6a58484d785fbf42cb84d294be385
                                                                • Opcode Fuzzy Hash: a9937a16b76c58c94b28bf15a68adb4139bcec099db716b101ad8f61a228703e
                                                                • Instruction Fuzzy Hash: C341E571B4072A9BDF1C8E69C8805AEB7A6EF40358B14E1BEE407CB280D778D9498F40
                                                                APIs
                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02E2FF4B
                                                                • __isleadbyte_l.LIBCMT ref: 02E2FF79
                                                                • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02E2FFA7
                                                                • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02E2FFDD
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                • String ID:
                                                                • API String ID: 3058430110-0
                                                                • Opcode ID: 1cea540049c5ee2023d51c6b3b5a043acd7edd436c5660d03251f82a8ef453b9
                                                                • Instruction ID: b38e6e040392741940951aba24ebfdc732f5d32c1c6613644f865f91f0ae7534
                                                                • Opcode Fuzzy Hash: 1cea540049c5ee2023d51c6b3b5a043acd7edd436c5660d03251f82a8ef453b9
                                                                • Instruction Fuzzy Hash: D2310631680266AFEF21CF36C844BAABBB5FF42318F159518F81687590D730D899CB90
                                                                APIs
                                                                • htons.WS2_32(?), ref: 02E13DA2
                                                                  • Part of subcall function 02E13BD3: __EH_prolog.LIBCMT ref: 02E13BD8
                                                                  • Part of subcall function 02E13BD3: std::bad_exception::bad_exception.LIBCMT ref: 02E13BED
                                                                • htonl.WS2_32(00000000), ref: 02E13DB9
                                                                • htonl.WS2_32(00000000), ref: 02E13DC0
                                                                • htons.WS2_32(?), ref: 02E13DD4
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                • String ID:
                                                                • API String ID: 3882411702-0
                                                                • Opcode ID: 76df39793c33bff1ce9798a07f66ef3b7125a5e4ec271cabbdd27a824174c609
                                                                • Instruction ID: 77badc389fa42dec9269f4492a1f5390b82ec1fa4240b7a892c364014f35b969
                                                                • Opcode Fuzzy Hash: 76df39793c33bff1ce9798a07f66ef3b7125a5e4ec271cabbdd27a824174c609
                                                                • Instruction Fuzzy Hash: 26118276940209EFCF019F64D889A9AB7B9FF09315F00C4A6FC08DF205D6719A54CBA1
                                                                APIs
                                                                • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02E123D0
                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 02E123DE
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E12401
                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 02E12408
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                • String ID:
                                                                • API String ID: 4018804020-0
                                                                • Opcode ID: 0093adb45e189914b4160f94fe9c9b6829a6fbfe9f2aff31036818f93ee50bf0
                                                                • Instruction ID: 9e674309f1544406fbdf5d5a901a23c2a7762c78866fb7dedb6dc831a4a9f621
                                                                • Opcode Fuzzy Hash: 0093adb45e189914b4160f94fe9c9b6829a6fbfe9f2aff31036818f93ee50bf0
                                                                • Instruction Fuzzy Hash: FC118271580309ABD7109F61DD49B6ABBB9FF44709F1084BDFA019B140D7B1E951CFA0
                                                                APIs
                                                                • WSASetLastError.WS2_32(00000000), ref: 02E12EEE
                                                                • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02E12EFD
                                                                • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02E12F0C
                                                                • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02E12F36
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$Socketsetsockopt
                                                                • String ID:
                                                                • API String ID: 2093263913-0
                                                                • Opcode ID: 1465c8ca7efb5240fe9b7f630f7f5e1e4846a5c38a66de17e5ca27931662e5ed
                                                                • Instruction ID: 83f40f47fea9ec8c7d87aa070b413b2d6fb30c8715bfdfd5350f5e5295855b6a
                                                                • Opcode Fuzzy Hash: 1465c8ca7efb5240fe9b7f630f7f5e1e4846a5c38a66de17e5ca27931662e5ed
                                                                • Instruction Fuzzy Hash: 77018DB1A90218BBDB305F66DC48F5ABBA9EB89762F04C565F908D7181D7708800CB70
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                • String ID:
                                                                • API String ID: 3016257755-0
                                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                • Instruction ID: dd088b2d14a40faed45682605a144f14a3b02be419219f5a08c69fada9a40c74
                                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                • Instruction Fuzzy Hash: FA01603208005DBBCF1A5E84DC418EE3F63BB08348B25E516FA1A55030D336D5B5AB81
                                                                APIs
                                                                • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02E124A9
                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 02E124B8
                                                                • InterlockedExchange.KERNEL32(?,00000001), ref: 02E124CD
                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 02E124D4
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                • String ID:
                                                                • API String ID: 4018804020-0
                                                                • Opcode ID: 83f8bddae8258a58b7d6c3cae906d86e2cfae142ff57625adffa2a35a9c82ac2
                                                                • Instruction ID: 8b061dbb6c60295ec60d4673ad638fede1b88eaf344399a764cb25fce259fcda
                                                                • Opcode Fuzzy Hash: 83f8bddae8258a58b7d6c3cae906d86e2cfae142ff57625adffa2a35a9c82ac2
                                                                • Instruction Fuzzy Hash: 1DF031B2580209AFD7009F55EC48F9ABBACFF55715F408429FA05C6141D771E560CFA0
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E12009
                                                                • RtlDeleteCriticalSection.NTDLL(?), ref: 02E12028
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E12037
                                                                • CloseHandle.KERNEL32(00000000), ref: 02E1204E
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                • String ID:
                                                                • API String ID: 2456309408-0
                                                                • Opcode ID: 67a06950d80c568e7f67f86decc0f3fae82987cbd472de5b5ec5bd6bdbec1bb4
                                                                • Instruction ID: 0f8fe3e76b59e2a64185c04c972690dcf941e56d48f35ceee6250c58224e6d74
                                                                • Opcode Fuzzy Hash: 67a06950d80c568e7f67f86decc0f3fae82987cbd472de5b5ec5bd6bdbec1bb4
                                                                • Instruction Fuzzy Hash: C601ADB15806189BC729AF54E90879ABBF4FF0870AF409A6DF94682590CB746548CF90
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Event$H_prologSleep
                                                                • String ID:
                                                                • API String ID: 1765829285-0
                                                                • Opcode ID: b57af53d67ac3cc13b0c19663671084eabca703d739a694e03b2e4e8b39cf3b0
                                                                • Instruction ID: 44815fd5d79b13f231b98507bc400c975be8cbd2e82e97ddc5a0c0515ba9ef03
                                                                • Opcode Fuzzy Hash: b57af53d67ac3cc13b0c19663671084eabca703d739a694e03b2e4e8b39cf3b0
                                                                • Instruction Fuzzy Hash: A1F03075680114DFCB009F94D8C8B88BBA4FF0D312F4081A9F5199B390C7759994DF51
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog_memmove
                                                                • String ID: &'
                                                                • API String ID: 3529519853-655172784
                                                                • Opcode ID: 07f0b9b618b456c598ac3732e9588e11fb9528f6816767b1a92d964604feb9ec
                                                                • Instruction ID: 705a5d69480ead547a119a6f09c5973c7462c520b00a613f19eddf4680fb920c
                                                                • Opcode Fuzzy Hash: 07f0b9b618b456c598ac3732e9588e11fb9528f6816767b1a92d964604feb9ec
                                                                • Instruction Fuzzy Hash: 8F619A71D40209DBDF20EFA4C990AEEFBB6AF48714F14917AE509AB280D7709A44CF61
                                                                APIs
                                                                • GetCPInfo.KERNEL32(?,00000000), ref: 00406013
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: Info
                                                                • String ID: $
                                                                • API String ID: 1807457897-3032137957
                                                                • Opcode ID: 534c697f40ec98626997e4239109541f6fdc1c2c7d487d8cd355074cdbd69a8d
                                                                • Instruction ID: a9121de5a2a9d6bf325699c581476cb58e31926cf8a37165714e84e9bd5b6d97
                                                                • Opcode Fuzzy Hash: 534c697f40ec98626997e4239109541f6fdc1c2c7d487d8cd355074cdbd69a8d
                                                                • Instruction Fuzzy Hash: 95419C31400158AEEB219714DD89FFB7FA9DB06700F2505F6D187FB1D3C23A49648BAA
                                                                APIs
                                                                  • Part of subcall function 02E12D39: WSASetLastError.WS2_32(00000000), ref: 02E12D47
                                                                  • Part of subcall function 02E12D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02E12D5C
                                                                • WSASetLastError.WS2_32(00000000), ref: 02E12E6D
                                                                • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02E12E83
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$Sendselect
                                                                • String ID: 3'
                                                                • API String ID: 2958345159-280543908
                                                                • Opcode ID: 019948fd575f389d1833bd3860c67e8a2d1150389e1355b8fac9620beecc1280
                                                                • Instruction ID: 6225be4ac374649b450678f36b9479ad329ef8850a8bd6db5ac40da1d2e7106e
                                                                • Opcode Fuzzy Hash: 019948fd575f389d1833bd3860c67e8a2d1150389e1355b8fac9620beecc1280
                                                                • Instruction Fuzzy Hash: 4231E4B0E902299FDB11DF60CC147EEBBA5AF05358F04D46AEE0597280E7B19544CFA0
                                                                APIs
                                                                • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02E183D3,?,?,00000000), ref: 02E196D0
                                                                • getsockname.WS2_32(?,?,?), ref: 02E196E6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastgetsockname
                                                                • String ID: &'
                                                                • API String ID: 566540725-655172784
                                                                • Opcode ID: 793ecda17a38242d7aea1288668d1990d99766307dfb258958be18fdb5b34da8
                                                                • Instruction ID: ec73b6a2b260341e69e5536ab8073e30cb4f58a15becf5ddd5f541635958c745
                                                                • Opcode Fuzzy Hash: 793ecda17a38242d7aea1288668d1990d99766307dfb258958be18fdb5b34da8
                                                                • Instruction Fuzzy Hash: 382151B6A402489BDB10DF68D854ADEF7F5FF48324F10D56AF918EB281E730A9458B60
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E1CCB4
                                                                  • Part of subcall function 02E1D290: std::exception::exception.LIBCMT ref: 02E1D2BF
                                                                  • Part of subcall function 02E1DA46: __EH_prolog.LIBCMT ref: 02E1DA4B
                                                                  • Part of subcall function 02E23B4C: _malloc.LIBCMT ref: 02E23B64
                                                                  • Part of subcall function 02E1D2EF: __EH_prolog.LIBCMT ref: 02E1D2F4
                                                                Strings
                                                                • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02E1CCF1
                                                                • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02E1CCEA
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog$_mallocstd::exception::exception
                                                                • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                • API String ID: 1953324306-1943798000
                                                                • Opcode ID: 86e440b06c9d6c2344893c41c9a1e3f94ee4060d0a58952a156384c772222e9a
                                                                • Instruction ID: 97792b6c96bb57b7bbdb115eb4367e6bfc6ae4bdc10588a34c8609ca8b8b9472
                                                                • Opcode Fuzzy Hash: 86e440b06c9d6c2344893c41c9a1e3f94ee4060d0a58952a156384c772222e9a
                                                                • Instruction Fuzzy Hash: 3A21B1B1E802149BDF14EFE8D954AEDBBB9EF54704F0494ADF809A7280DB705A04CF95
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E1CDA9
                                                                  • Part of subcall function 02E1D367: std::exception::exception.LIBCMT ref: 02E1D394
                                                                  • Part of subcall function 02E1DB7D: __EH_prolog.LIBCMT ref: 02E1DB82
                                                                  • Part of subcall function 02E23B4C: _malloc.LIBCMT ref: 02E23B64
                                                                  • Part of subcall function 02E1D3C4: __EH_prolog.LIBCMT ref: 02E1D3C9
                                                                Strings
                                                                • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02E1CDE6
                                                                • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02E1CDDF
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog$_mallocstd::exception::exception
                                                                • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                • API String ID: 1953324306-412195191
                                                                • Opcode ID: 7f02fec0e5193e5f2255ab01e75f7b2d70b55619664e4baa8635a9c610b7300c
                                                                • Instruction ID: 52d708f882de6ca7e1ba8be6934a8499deac3ad4e50e95c3d766e23707654817
                                                                • Opcode Fuzzy Hash: 7f02fec0e5193e5f2255ab01e75f7b2d70b55619664e4baa8635a9c610b7300c
                                                                • Instruction Fuzzy Hash: CA21B1B5E80218DBDB14EFE4D814AEDBBB5EF04704F14956DF80AAB280DB705A04CF91
                                                                APIs
                                                                • WSASetLastError.WS2_32(00000000), ref: 02E12AEA
                                                                • connect.WS2_32(?,?,?), ref: 02E12AF5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastconnect
                                                                • String ID: 3'
                                                                • API String ID: 374722065-280543908
                                                                • Opcode ID: 918fe681cc5867e480174f7246c8e5787208b39add7a86a98a1f019d16b0d788
                                                                • Instruction ID: c03a06981d1d50a9a3cc1ac1fcdc131ad4790f87b87a93c963084a3c66146afb
                                                                • Opcode Fuzzy Hash: 918fe681cc5867e480174f7246c8e5787208b39add7a86a98a1f019d16b0d788
                                                                • Instruction Fuzzy Hash: 3E21CC71E501189BCF24EF74D824AAEB7FAEF44324F04D5A9ED19A7380EB7445058F91
                                                                APIs
                                                                • _malloc.LIBCMT ref: 02E1535D
                                                                  • Part of subcall function 02E22FAC: __FF_MSGBANNER.LIBCMT ref: 02E22FC3
                                                                  • Part of subcall function 02E22FAC: __NMSG_WRITE.LIBCMT ref: 02E22FCA
                                                                  • Part of subcall function 02E22FAC: RtlAllocateHeap.NTDLL(00980000,00000000,00000001), ref: 02E22FEF
                                                                • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02E1536F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                • String ID: \save.dat
                                                                • API String ID: 4128168839-3580179773
                                                                • Opcode ID: 218bb98cd287ee4bbe4fe9327f81723a4715fd6a6f252491b5a1b0579f2dfb30
                                                                • Instruction ID: 3f914e18a72ac9360b36203aeb6fb21db5e5b698e86f7476830db4df0a0fcf98
                                                                • Opcode Fuzzy Hash: 218bb98cd287ee4bbe4fe9327f81723a4715fd6a6f252491b5a1b0579f2dfb30
                                                                • Instruction Fuzzy Hash: 8C1190729842146BDB268E258C84D6FFF67DFC2754B5491FCF84567205D7A20D06C6B0
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E1396A
                                                                • std::runtime_error::runtime_error.LIBCPMT ref: 02E139C1
                                                                  • Part of subcall function 02E11410: std::exception::exception.LIBCMT ref: 02E11428
                                                                  • Part of subcall function 02E1A61E: __EH_prolog.LIBCMT ref: 02E1A623
                                                                  • Part of subcall function 02E1A61E: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02E1A632
                                                                  • Part of subcall function 02E1A61E: __CxxThrowException@8.LIBCMT ref: 02E1A651
                                                                Strings
                                                                • Day of month is not valid for year, xrefs: 02E139AC
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                • String ID: Day of month is not valid for year
                                                                • API String ID: 1404951899-1521898139
                                                                • Opcode ID: d48113e529c1fd55a71a37f17fe81853f2e371fc3b4e56f4ff0e80dff33d57a5
                                                                • Instruction ID: 76c0a80a148459026c95c9848f801fe0c2d8a83919e7e4ecc6f3c74f4d7edb6c
                                                                • Opcode Fuzzy Hash: d48113e529c1fd55a71a37f17fe81853f2e371fc3b4e56f4ff0e80dff33d57a5
                                                                • Instruction Fuzzy Hash: 4501B176954209AADF01EFA4C805AFEB779FF18B11F40A02AFC0493300EB704B55CBA5
                                                                APIs
                                                                • std::exception::exception.LIBCMT ref: 02E1FB17
                                                                • __CxxThrowException@8.LIBCMT ref: 02E1FB2C
                                                                  • Part of subcall function 02E23B4C: _malloc.LIBCMT ref: 02E23B64
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                • String ID: bad allocation
                                                                • API String ID: 4063778783-2104205924
                                                                • Opcode ID: bbf6bb1920792df20e205d6dcbb09a9f59d8f2385f1835849c372d5730f7ec02
                                                                • Instruction ID: 9c9b2e92bf58878b9fcb987b9afc16d8ac08f26f1c7e151de42b0bf8f2bc76fd
                                                                • Opcode Fuzzy Hash: bbf6bb1920792df20e205d6dcbb09a9f59d8f2385f1835849c372d5730f7ec02
                                                                • Instruction Fuzzy Hash: D3F0AE707C0319669F04EA5898659BF73EC9F04719B50A5B9F911D3180EF70E904C5A5
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E13C1B
                                                                • std::bad_exception::bad_exception.LIBCMT ref: 02E13C30
                                                                  • Part of subcall function 02E224B7: std::exception::exception.LIBCMT ref: 02E224C1
                                                                  • Part of subcall function 02E1A657: __EH_prolog.LIBCMT ref: 02E1A65C
                                                                  • Part of subcall function 02E1A657: __CxxThrowException@8.LIBCMT ref: 02E1A685
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                • String ID: bad cast
                                                                • API String ID: 1300498068-3145022300
                                                                • Opcode ID: 7d061e70dda6633ce339bc0c2f2f05c1c6bb78deaac62fb6a922a58d859eb504
                                                                • Instruction ID: c1c8046ecac281cc7a8ca95ea960a30e6a546e5cea975727482a445822ad2cd0
                                                                • Opcode Fuzzy Hash: 7d061e70dda6633ce339bc0c2f2f05c1c6bb78deaac62fb6a922a58d859eb504
                                                                • Instruction Fuzzy Hash: B2F0A7729401048BC709EF58D4449EAB775EF55715F10806EFD065B341CB729946CA90
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E138D2
                                                                • std::runtime_error::runtime_error.LIBCPMT ref: 02E138F1
                                                                  • Part of subcall function 02E11410: std::exception::exception.LIBCMT ref: 02E11428
                                                                  • Part of subcall function 02E1898C: _memmove.LIBCMT ref: 02E189AC
                                                                Strings
                                                                • Year is out of valid range: 1400..10000, xrefs: 02E138E0
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                • String ID: Year is out of valid range: 1400..10000
                                                                • API String ID: 3258419250-2344417016
                                                                • Opcode ID: ae1899437f453e064b43f4d5336c5e8a0e7fae63107591602eb35c1db399b274
                                                                • Instruction ID: 8700c75dc691f318c0464f89a68da1507f42ff8a1bc8ef83051ac726a76e6334
                                                                • Opcode Fuzzy Hash: ae1899437f453e064b43f4d5336c5e8a0e7fae63107591602eb35c1db399b274
                                                                • Instruction Fuzzy Hash: A4E0D872BC01185BD715FB94CC1A7EDB775DF09B11F00A45AF906672C0DAB11940CB95
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E13886
                                                                • std::runtime_error::runtime_error.LIBCPMT ref: 02E138A5
                                                                  • Part of subcall function 02E11410: std::exception::exception.LIBCMT ref: 02E11428
                                                                  • Part of subcall function 02E1898C: _memmove.LIBCMT ref: 02E189AC
                                                                Strings
                                                                • Day of month value is out of range 1..31, xrefs: 02E13894
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                • String ID: Day of month value is out of range 1..31
                                                                • API String ID: 3258419250-1361117730
                                                                • Opcode ID: 4a375347ec5215406fc569507b9688f7b5563299200316cfb137b040ab967c17
                                                                • Instruction ID: 535a9fed656a1bb5517cb6cff11acd9e11c23a641888b051474478940a43cd3a
                                                                • Opcode Fuzzy Hash: 4a375347ec5215406fc569507b9688f7b5563299200316cfb137b040ab967c17
                                                                • Instruction Fuzzy Hash: 5DE09272A8010857D715EB98C81A7EDB775DB09B11F40A05AF80567280DAB11944CB95
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E1391E
                                                                • std::runtime_error::runtime_error.LIBCPMT ref: 02E1393D
                                                                  • Part of subcall function 02E11410: std::exception::exception.LIBCMT ref: 02E11428
                                                                  • Part of subcall function 02E1898C: _memmove.LIBCMT ref: 02E189AC
                                                                Strings
                                                                • Month number is out of range 1..12, xrefs: 02E1392C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                • String ID: Month number is out of range 1..12
                                                                • API String ID: 3258419250-4198407886
                                                                • Opcode ID: c0f8bb4442346628a3b7ee46bafbb032b819a3cac5da567fa80cef77f8a23ff5
                                                                • Instruction ID: b8e8d9d3a24e033a61de8d3a71c1b5f0fee6cba9f8f9f91a9668f2a4cd7f68c4
                                                                • Opcode Fuzzy Hash: c0f8bb4442346628a3b7ee46bafbb032b819a3cac5da567fa80cef77f8a23ff5
                                                                • Instruction Fuzzy Hash: 52E0D872BC010897D715FB98CC1A7EDB7B5DF08B11F00A05AF805672C0DAB11944CBD5
                                                                APIs
                                                                • TlsAlloc.KERNEL32 ref: 02E119CC
                                                                • GetLastError.KERNEL32 ref: 02E119D9
                                                                  • Part of subcall function 02E11712: __EH_prolog.LIBCMT ref: 02E11717
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocErrorH_prologLast
                                                                • String ID: tss
                                                                • API String ID: 249634027-1638339373
                                                                • Opcode ID: 898668435b6eb588e61d4888dfb682135be3f3c63750c7d64b4b4371df0b9945
                                                                • Instruction ID: 6b76d47c42468ab4cd0bcc10cc83f6394bda9eaf976a91a07167296fc0b9da47
                                                                • Opcode Fuzzy Hash: 898668435b6eb588e61d4888dfb682135be3f3c63750c7d64b4b4371df0b9945
                                                                • Instruction Fuzzy Hash: 02E04F729942155B82107A79D80908BFBA49A45275F10DB66FDA9972D0EA3089508FC2
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 02E13BD8
                                                                • std::bad_exception::bad_exception.LIBCMT ref: 02E13BED
                                                                  • Part of subcall function 02E224B7: std::exception::exception.LIBCMT ref: 02E224C1
                                                                  • Part of subcall function 02E1A657: __EH_prolog.LIBCMT ref: 02E1A65C
                                                                  • Part of subcall function 02E1A657: __CxxThrowException@8.LIBCMT ref: 02E1A685
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3372353570.0000000002E11000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E11000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e11000_hdvideoconverterfox125.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                • String ID: bad cast
                                                                • API String ID: 1300498068-3145022300
                                                                • Opcode ID: 7225f9afb1d9c28c29bcf5e2d60da2328ec4cccd88de41dc6041006859d3a83c
                                                                • Instruction ID: 796a82bd64266a502ab5a537708d888407fcc272dda57e18d8ec38b73b27e50a
                                                                • Opcode Fuzzy Hash: 7225f9afb1d9c28c29bcf5e2d60da2328ec4cccd88de41dc6041006859d3a83c
                                                                • Instruction Fuzzy Hash: 46E09A719801089BC705EF54C405BF9B775EF14705F00D0A8AD0647380CB354906CE81
                                                                APIs
                                                                • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404808,?,?,?,00000100,?,00000000), ref: 00404A68
                                                                • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404808,?,?,?,00000100,?,00000000), ref: 00404A9C
                                                                • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404808,?,?,?,00000100,?,00000000), ref: 00404AB6
                                                                • HeapFree.KERNEL32(00000000,?,?,00000000,00404808,?,?,?,00000100,?,00000000), ref: 00404ACD
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.3370326106.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000005.00000002.3370326106.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_hdvideoconverterfox125.jbxd
                                                                Similarity
                                                                • API ID: AllocHeap$FreeVirtual
                                                                • String ID:
                                                                • API String ID: 3499195154-0
                                                                • Opcode ID: 6626a71af44025c9ade4ae239101c0eedbd9d78fa39f50a00c46d0f32c352403
                                                                • Instruction ID: c6e1a272a9e9bbfdd096ccef0c7e525a5b24f88bbc22f4cf330cfb0033d2dc1c
                                                                • Opcode Fuzzy Hash: 6626a71af44025c9ade4ae239101c0eedbd9d78fa39f50a00c46d0f32c352403
                                                                • Instruction Fuzzy Hash: D8114CB0241200DFD7218F19EE869227BB6FBC4760711863EE692E65F0C771A956CF5C